Pranay Paine
| Select | Document Name | Document Type | Business Unit | Applicable Controls | Document Owner | Status |
|---|---|---|---|---|---|---|
| Cyber Security Policy | Policy | Legal |
|
Compliant | ||
| Cyber Security Policy | Policy | Legal |
|
Compliant | ||
| Cyber Security Policy | Policy | Legal |
|
Compliant |
| Control Number | Control Question | Implementation Group | Applicable Document | Document Status | Compliance Level |
|---|---|---|---|---|---|
| 1.1 | Establish and Maintain Detailed Enterprise Asset Inventory | IG1 | Enterprise Asset Management Policy | Partially Written | Non-Compliant |
| 1.2 | Address Unauthorized Assets | IG1 | Enterprise Asset Management Policy | Partially Written | Non-Compliant |
| 1.3 | Utilize an Active Discovery Tool | IG2 | Enterprise Asset Management Policy | Written Policy | Non-Compliant |
| 1.4 | Use Dynamic Host Configuration Protocol (DHCP) Logging to Update Enterprise Asset Inventory | IG2 |
Select Status
|
NA | NA |
| 1.5 | Use a Passive Asset Discovery Tool | IG3 | Enterprise Asset Management Policy | Approved Written Policy | Compliant |
| Control Number | Control Question | Applicable Document | Compliance Level |
|---|---|---|---|
| 2.1 | Establish and Maintain Detailed Enterprise Asset Inventory | Enterprise Asset Management Policy | Compliant |
| 2.2 | Establish and Maintain Detailed Enterprise Asset Inventory | Enterprise Asset Management Policy | Non-Compliant |
| Control Number | Control Question | Applicable Document | Compliance Level |
|---|---|---|---|
| 3.1 | Establish and Maintain Detailed Enterprise Asset Inventory | Enterprise Asset Management Policy | Compliant |
| 3.2 | Establish and Maintain Detailed Enterprise Asset Inventory | Enterprise Asset Management Policy | Non-Compliant |