- AR5
- -AF021
Windows System Time Modification - AR5
Contributor: David Larsen @ Principal IT Auditor, CERT ITPM - Section AF021
- AR2
- -ME027
Unmanaged Credential Storage - AR2
Contributor: David Larsen @ Principal IT Auditor, CERT ITPM - Section ME027
- AR3
- -PR027
- -PR027.001
Deepfake or Synthetic Identity Use in Hiring - AR3
Contributor: David Larsen @ Principal IT Auditor, CERT ITPM - Subsection PR027.001
- AR3
- -PR003
- -PR003.012
Installation of Dark Web-Capable Browsers - AR3
Contributor: David Larsen @ Principal IT Auditor, CERT ITPM - Subsection PR003.012
- AR4
- -IF009
- -IF009.007
Installation of Unapproved Browser Extensions - AR4
Contributor: David Larsen @ Principal IT Auditor, CERT ITPM - Subsection IF009.007
- AR3
- -PR027
- -PR027.005
Service Desk Impersonation for Credential Manipulation - AR3
Contributor: David Larsen @ Principal IT Auditor, CERT ITPM - Subsection PR027.005
- AR5
- -AF029
- -AF029.001
Browser or System Proxy Configuration - AR5
Contributor: David Larsen @ Principal IT Auditor, CERT ITPM - Subsection AF029.001
- AR3
- -PR018
- -PR018.008
Bypassing Network Segmentation - AR3
Contributor: David Larsen @ Principal IT Auditor, CERT ITPM - Subsection PR018.008
- Preventions
- -PV074
Network Segmentation - PV074
Contributor: David Larsen @ Principal IT Auditor, CERT ITPM - Prevention PV074
- Preventions
- -PV075
Centralized Asset Inventory Control - PV075
Contributor: David Larsen @ Principal IT Auditor, CERT ITPM - Prevention PV075