IAN LANE
12. INFORMATION PROTECTION OPERATIONS
12.1 Information Protection Principles - Information Protection Principles
12.2 Rules of Engagement - Operational Law Handbook
12.3 Assessment and Authorization - Assessment and Authorization and Event Response
12.4 Security Patch Implementation - CISM 2020: IT Security Policies
12.5 Malicious Logic Protection - Defending Against Malicious Cyber Activity Originating from Tor | CISA & Malicious Logic Protection
12.6 Deploy Security Patches - Patch Management
12.7 Intel Driven Patching- Intelligence - Driven Cybersecurity
Issued on
March 10, 2025
Expires on
Does not expire