Threat Modeling
Controls Bibliothek
Alle Sicherheitsmassnahmen mit Mapping auf CIS v8 und NIST CSF. Filter nach Framework um relevante Controls anzuzeigen.
API Asset Inventory
Infrastructure as Code (IaC) Scanning
SaaS Security Posture Management (SSPM)
Hardware Asset Tagging
External Attack Surface Management (EASM)
API Documentation & Inventory
AI Plugin Sandboxing
PowerShell Constrained Language Mode
Device Compliance Policies
Remote Wipe (Selective)
Secret Scanning in Code-Repositories
Endpoint Compliance (Intune)
Cloud Resource Locking
Partner Account Deprovisioning
Jailbreak & Root Detection
Regular Access Reviews
Adaptive MFA (Risk-based)
Break-Glass Accounts
Privileged Access Workstation (PAW)
Privileged Identity Management (PIM)
Tiered Administration Model
Mutual TLS (mTLS)
Terms of Use (B2B)
IAM Permissions Boundaries
MFA for Deletion Operations
Conditional Access Policies
FIDO2 Enforcement
Mailbox Delegation Monitoring
Automated Offboarding Workflow
Centralized Secrets Vaulting
Guest Invitation Governance
Least Privilege Principle
Modern Auth Enforcement
MFA for Windows Sign-in
Tenant Restrictions
Fine-Grained RBAC / ABAC
Strict Transport Security (TLS 1.3)
API Security Audit (Logging)
Immutable Audit Logs
Unified Audit Log (UAL)
SIEM Integration
Anti-Phishing & Anti-Spam Policies
Email Authentication (SPF, DKIM, DMARC)
Mailflow Rules (Transport Rules)
ATP Safe Links & Attachments
B2B IP Allowlisting
Rate Limiting & Throttling
Zero Trust Network Access (ZTNA)
Automated Certificate Rotation
Trusted Certificate Profiles
Bot Management & Anti-Scraping
CAPTCHA / Proof-of-Work
Egress Filtering (SSRF Protection)
Automatic Data Classification
Exact Data Matching (EDM)
Endpoint DLP Policies
OCR for DLP
Data Loss Prevention (DLP)
Datenlöschprozess (Recht auf Löschung)
Sensitivity Labels (Purview)
External Sharing Governance
Mobile Application Management (MAM)
App Protection - Screen Capture Block
Collaboration Governance
OSINT Hygiene & Informationsminimierung
Partner Security Assessment (Supply Chain)
Strict Schema Validation
Advanced Threat Protection (WAF)
DDoS-Schutz & Rate Limiting
Code Scanning (SAST / Secret Scanning)
Restricted App Consent
CORS Configuration
Content Security Policy (CSP)
Security Headers (X-Frame / Content-Type)
HTTP Strict Transport Security (HSTS)
Input Validation & Sanitization
Software Composition Analysis (SCA)
Subresource Integrity (SRI)
Virtual Patching via WAF
AI Usage Policies
Dark Web & Credential Leak Monitoring
Auftragsverarbeitungsvertrag (AVV)
Privacy by Design Guardrails
Incident Response Playbook (Admin-Kompromittierung)
Incident Response Playbook (BYOD-Sicherheitsvorfall)
Incident Response Playbook (Partner-Kompromittierung)
Continuous AI Red Teaming
Dynamic Application Security Testing (DAST)
Manual Business Logic Review
Regular Penetration Testing