- AR5
 - -AF021
 
Windows System Time Modification - AR5
Contributor: David Larsen @ Principal IT Auditor, CERT ITPM - Section AF021
- AR2
 - -ME027
 
Unmanaged Credential Storage - AR2
Contributor: David Larsen @ Principal IT Auditor, CERT ITPM - Section ME027
- AR3
 - -PR027
 - -PR027.001
 
Deepfake or Synthetic Identity Use in Hiring - AR3
Contributor: David Larsen @ Principal IT Auditor, CERT ITPM - Subsection PR027.001
- AR3
 - -PR003
 - -PR003.012
 
Installation of Dark Web-Capable Browsers - AR3
Contributor: David Larsen @ Principal IT Auditor, CERT ITPM - Subsection PR003.012
- AR4
 - -IF009
 - -IF009.007
 
Installation of Unapproved Browser Extensions - AR4
Contributor: David Larsen @ Principal IT Auditor, CERT ITPM - Subsection IF009.007
- AR3
 - -PR027
 - -PR027.005
 
Service Desk Impersonation for Credential Manipulation - AR3
Contributor: David Larsen @ Principal IT Auditor, CERT ITPM - Subsection PR027.005
- AR5
 - -AF029
 - -AF029.001
 
Browser or System Proxy Configuration - AR5
Contributor: David Larsen @ Principal IT Auditor, CERT ITPM - Subsection AF029.001
- AR3
 - -PR018
 - -PR018.008
 
Bypassing Network Segmentation - AR3
Contributor: David Larsen @ Principal IT Auditor, CERT ITPM - Subsection PR018.008
- Preventions
 - -PV074
 
Network Segmentation - PV074
Contributor: David Larsen @ Principal IT Auditor, CERT ITPM - Prevention PV074
- Preventions
 - -PV075
 
Centralized Asset Inventory Control - PV075
Contributor: David Larsen @ Principal IT Auditor, CERT ITPM - Prevention PV075