Skip to content

Instantly share code, notes, and snippets.

@opexxx
Created February 2, 2022 18:37
Show Gist options
  • Save opexxx/d37c1fdda9a75df4636cb88a7ccdde71 to your computer and use it in GitHub Desktop.
Save opexxx/d37c1fdda9a75df4636cb88a7ccdde71 to your computer and use it in GitHub Desktop.
InformationSecurity_Programme
802.1X authentication
Access to sufficient data sources and tools
Access to systems and data by service providers
Account lockouts
Account unlocks
Active, malicious and suspicious content
Administrative interfaces for wireless access points
After travelling overseas with mobile devices
Aggregation of database contents
Allowing access to specific content types
Allowing access to specific websites
Annual reporting of system security status
Antivirus scanning
Antivirus software
Application control
Application management
Application selection
Application versions
Approval for use
Approval of security documentation
Approved asymmetric/public key algorithms
Approved symmetric encryption algorithms
Archive and container files
Audio secure rooms
Authenticating to systems
Authentication mechanisms
Automated dynamic analysis
Automated remote access
Availability planning and monitoring for online services
Backup access and modification
Before travelling overseas with mobile devices
Blocking access to specific websites
Blocking anonymity network traffic
Blocking suspicious emails
Bluetooth functionality
Bringing Radio Frequency and infrared devices into facilities
Cable colour non-conformance
Cable colours
Cable inspectability
Cable labelling processes and procedures
Cable register
Cables in party walls
Cables in walls
Cabling infrastructure standards
Caching 802.1X authentication outcomes
Centralised email gateways
Centralised logging facility
Cessation of support
Change management processes and procedures
Choosing wireless devices
Classifying ICT equipment
Classifying media
Cloud-based hosting of online services
Common cable reticulation systems and conduits
Communication of security documentation
Communications between database servers and web servers
Communications encryption
Confidentiality and integrity of wireless network traffic
Configuring Secure Shell
Connecting cable reticulation systems to cabinets
Connecting mobile devices to the internet
Connecting multifunction devices to both networks and digital telephone systems
Connecting multifunction devices to networks
Consultation when implementing or modifying a Cross Domain Solution
Content conversion and transformation
Content filtering
Content sanitisation
Content validation
Continuous monitoring plan
Contractual security requirements
Contributing to business continuity and disaster recovery planning
Control of Australian systems
Coordinating cyber security
Copying documents on multifunction devices
Cordless telephone systems
Covers for enclosed cable reticulation systems
Cryptographic algorithms for use with High Assurance Cryptographic Equipment
Cryptographic equipment
Cyber security incident register
Cyber security strategy
Cyber supply chain risk management
Data backup and restoration processes and procedures
Data integrity
Data recovery
Data transfer approval
Data transfer processes and procedures
Database administrator accounts
Database register
Dedicated administration zones and communication restrictions
Default accounts for network devices
Default settings
Degaussing magnetic media
Delivery of evaluated products
Demilitarised zones
Denial of service strategies
Developing a cyber security communications strategy
Developing a denial of service response plan
Development environments
Device access control software
Diffie-Hellman groups
Digital preservation policy
Disabling unused physical ports on network devices
Disposal of media
Domain name registrar locking
Domain-based Message Authentication, Reporting and Conformance
DomainKeys Identified Mail
Early identification of emanation security controls
Electromagnetic interference/electromagnetic compatibility standards
Email content filtering
Email distribution lists
Email gateway maintenance activities
Email server transport encryption
Email usage policy
Emanation security threat assessments in Australia
Emanation security threat assessments outside Australia
Emergency access to systems
Enclosed cable reticulation systems
Encrypted data
Encrypting data at rest
Encrypting data in transit
Encrypting highly sensitive data at rest
Encrypting highly sensitive data in transit
Evaluated product selection
Evaluation of 802.1X authentication implementation
Event log auditing processes and procedures
Event log details
Event log protection
Event log retention
Event logging
Event logging policy
Events to be logged
Exploit protection
Export of data
Fast Basic Service Set Transition
Fax machine and multifunction device usage policy
Floor plan diagrams
Fly lead installation
Functional separation between computing environments
Functional separation between database servers and web servers
Functional separation between servers
Gateway administration
Gateway architecture and configuration
Gateway authentication
Gateway operation
Gateway testing
Generating and issuing certificates for authentication
Handling ICT equipment
Handling and containing data spills
Handling and containing intrusions
Handling and containing malicious code infections
Handling emails with inappropriate, invalid or missing protective markings
Handling encrypted ICT equipment and media
Handling media
Hardening and configuration
Hardening application configurations
Hashed Message Authentication Code algorithms
High Assurance Cryptographic Equipment
Host-based Intrusion Prevention System
How to patch security vulnerabilities
ICT equipment authentication
ICT equipment management policy
ICT equipment register
ICT equipment sanitisation and disposal processes and procedures
Import of data
Incident response plan
Insecure authentication methods
Inspection of ICT equipment following maintenance and repairs
Inspection of Transport Layer Security traffic
Installation and configuration of evaluated products
Integrity of evidence
Interference between wireless networks
Internet Key Exchange Extended Authentication
Internet Protocol phones in public areas
Internet Security Association Key Management Protocol modes
Intrusion detection and prevention policy
Jump servers
Key exchange
Labelling ICT equipment
Labelling building management cables
Labelling cables
Labelling cables for foreign systems in Australian facilities
Labelling conduits
Labelling high assurance ICT equipment
Labelling media
Labelling wall outlet boxes
Local administrator accounts
Location policies for online services
Logon banner
Maintaining control of mobile devices
Maintaining mobile device security
Maintenance and repairs of high assurance ICT equipment
Maintenance of security documentation
Management traffic
Media Access Control address filtering
Media destruction equipment
Media destruction methods
Media destruction processes and procedures
Media disposal processes and procedures
Media management policy
Media sanitisation processes and procedures
Media that cannot be sanitised
Media that cannot be successfully sanitised
Microphones and webcams
Microsoft Office macros
Mobile device emergency sanitisation processes and procedures
Mobile device management policy
Mobile device usage policy
Mode of operation
Monitoring data import and export
Monitoring with real-time alerting for online services
Multi-factor authentication
Network access controls
Network device register
Network documentation
Network environment
Network segmentation and segregation
Non-volatile electrically erasable programmable read-only memory media sanitisation
Non-volatile erasable programmable read-only memory media sanitisation
Non-volatile flash memory media sanitisation
Non-volatile magnetic media sanitisation
Observing fax machine and multifunction device use
Off-hook audio protection
Off-site maintenance and repairs
On-site maintenance and repairs
Open Web Application Security Project
Open relay email servers
Operating system configuration
Operating system releases and versions
Organisation-owned mobile devices
Outsourced cloud services
Outsourcing media destruction
Overseeing cyber security awareness raising
Overseeing cyber security personnel
Overseeing incident response activities
Overseeing the cyber security program
Paging, message services and messaging apps
Patch management processes and procedures
Perfect Forward Secrecy
Performing and retaining backups
Personnel awareness
Physical access to network devices in public areas
Physical access to servers, network devices and cryptographic equipment
Physical access to systems
Physical separation of cabinets and patch panels
Plan of action and milestones
Posting personal information to online services
Posting work information to online services
Power reticulation
PowerShell
Preparing for service continuity
Preventing export of highly sensitive data to foreign systems
Preventing observation by unauthorised people
Privately-owned mobile devices
Privileged access to systems
Privileged access to systems by foreign nationals
Protecting authentication credentials in databases
Protecting conversations
Protecting credentials
Protecting database contents
Protecting database server contents
Protecting databases
Protecting management frames on wireless networks
Protecting systems and their resources
Protecting video conferencing and Internet Protocol telephony traffic
Protective marking tools
Protective markings for emails
Protocol selection
Providing cyber security awareness training
Providing cyber security leadership and guidance
Receiving and managing a dedicated cyber security budget
Receiving fax messages
Reclassifying media
Recording authorisation for personnel to access systems
Remote Authentication Dial-In User Service authentication
Removable media register
Removable media usage policy
Reporting cyber security incidents
Reporting cyber security incidents to the ACSC
Reporting on cyber security
Reporting suspicious contact via online services
Restricting privileges
Restriction of management traffic flows
SSH-agent
Sanitisation and disposal of ICT equipment
Sanitisation and disposal of highly sensitive ICT equipment
Sanitisation and disposal of printers and multifunction devices
Sanitising fax machines
Sanitising media before first use
Sanitising network devices
Sanitising televisions and computer monitors
Scanning for missing patches
Sealing cable reticulation systems and conduits
Secure programming practices
Secure software design
Securing ICT equipment and media
Security assessment report
Security association lifetimes
Segregation of critical online services
Sender Policy Framework
Sending and receiving files via online services
Sending fax messages
Separate privileged operating environments
Separation of data flows
Separation of production, test and development database servers
Separation of production, test and development databases
Session and screen locking
Session termination
Setting and resetting credentials for service accounts
Setting and resetting credentials for user accounts
Shared ownership of gateways
Single-factor authentication
Software bill of materials
Software firewall
Software testing
Speakerphones
Standard Operating Environments
Static addressing
Storage encryption
Supervision of accountable material destruction
Supervision of destruction
Suspension of access to systems
System access requirements
System administration processes and procedures
System ownership and oversight
System security plan
Telephone system usage policy
Temporary access to systems
Temporary installation files and logs
Terminating cable groups on patch panels
Terminating cables in cabinets
Testing restoration of backups
Traffic separation
Transport Layer Security filtering
Treatment of media waste particles
Treatment of non-volatile erasable and electrically erasable programmable read-only memory media following sanitisation
Treatment of non-volatile flash memory media following sanitisation
Treatment of non-volatile magnetic media following sanitisation
Treatment of volatile media following sanitisation
Trusted insider program
Undeliverable messages
Unprivileged access to systems
Unprivileged access to systems by foreign nationals
Use of Simple Network Management Protocol
Use of fibre-optic cables
Use of high assurance ICT equipment in unevaluated configurations
User identification
User responsibilities
User training
Using ASD Approved Cryptographic Algorithms
Using ASD Approved Cryptographic Protocols
Using Diffie-Hellman
Using Elliptic Curve Cryptography
Using Elliptic Curve Diffie-Hellman
Using Internet Protocol version 6
Using Network-based Intrusion Detection and Prevention Systems
Using Rivest-Shamir-Adleman
Using Secure/Multipurpose Internet Mail Extension
Using Transport Layer Security
Using Virtual Local Area Networks
Using content delivery networks
Using diodes
Using firewalls
Using media for data transfers
Using mobile devices in public spaces
Using peripheral switches
Using the Digital Signature Algorithm
Using the Elliptic Curve Digital Signature Algorithm
Using web content filters
Using web proxies
Video conferencing and Internet Protocol telephony infrastructure hardening
Video conferencing unit and Internet Protocol phone authentication
Video-aware and voice-aware firewalls
Volatile media sanitisation
Volume checking
Vulnerability disclosure program
Wall outlet box colours
Wall outlet box covers
Wall outlet boxes
Wall penetrations
Web application frameworks
Web application input handling
Web application interaction with databases
Web application interactions
Web application output encoding
Web browser-based security controls
Web proxy authentication and logging
Web usage policy
Webmail services
When to implement a Cross Domain Solution
When to patch security vulnerabilities
While travelling overseas with mobile devices
Wireless network footprint
Wireless networks for public access
Working with suppliers and service providers
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment