Safeguarding information
eBay
Heartland payment systems
Marriott International
Uber
Yahoo
Security continuity
implementation
information processing facilities
planning information
redundancies
verification
Security requirements
access level
encryption
secure development policy
service delivery team
session management
test data
Senior management support
Social security numbers (SSN)
Standard operating procedures (SOP)
Statement of Applicability (SOA)
section A.5 (policy documents)
section A.6 (information security roles and responsibilities)
section A.7 (Human resource security)
section A.8 (Asset management)
section A.9 (access control)
section A.10 (cryptography)
section A.11 (physical and environmental security)
section A.12 (operation security)
section A.13 (communication security)
section A.14 (System Acquisition Development and Maintenance)
section A.15 (Supplies relationships)
section A.16 (information security incident management)
section A.17 (business continuity management)
section A.17 (compliance)
Strength, Weakness, Opportunity, and Threats (SWOT)
Subject matter experts (SMEs)
Supplier relationship management policy
Supplier relationships
addressing security
information and communications technology
information security policy
monitoring and review
service changes
System and application access control
password
program source code
restriction
secure log-on procedures
utility program