| ▾Name | ▾Size | ▾Last modification |
|---|---|---|
| 12.0 MiB | 2026-03-08 07:33:02 +13:00 a week ago | |
| 10.5 MiB | 2026-03-08 07:33:02 +13:00 a week ago | |
| 11.2 MiB | 2026-03-08 07:33:02 +13:00 a week ago | |
4 - A.8.3 Information Access Restriction.mp4▾10.6 MiB▾a week ago | 10.6 MiB | 2026-03-08 07:33:02 +13:00 a week ago |
| 10.7 MiB | 2026-03-08 07:33:02 +13:00 a week ago | |
| 9.7 MiB | 2026-03-08 07:33:02 +13:00 a week ago | |
| 10.6 MiB | 2026-03-08 07:33:02 +13:00 a week ago | |
| 9.7 MiB | 2026-03-08 07:33:02 +13:00 a week ago | |
9 - A.8.8 Management of Technical Vulnerabilities.mp4▾12.4 MiB▾a week ago | 12.4 MiB | 2026-03-08 07:33:02 +13:00 a week ago |
| 10.5 MiB | 2026-03-08 07:33:02 +13:00 a week ago | |
| 11.2 MiB | 2026-03-08 07:33:02 +13:00 a week ago | |
| 10.0 MiB | 2026-03-08 07:33:02 +13:00 a week ago | |
| 9.7 MiB | 2026-03-08 07:33:02 +13:00 a week ago | |
| 11.1 MiB | 2026-03-08 07:33:02 +13:00 a week ago | |
15 - A.8.14 Redundancy of Information Processing Facilities.mp4▾11.2 MiB▾a week ago | 11.2 MiB | 2026-03-08 07:33:02 +13:00 a week ago |
| 11.1 MiB | 2026-03-08 07:33:02 +13:00 a week ago | |
| 9.7 MiB | 2026-03-08 07:33:02 +13:00 a week ago | |
| 10.5 MiB | 2026-03-08 07:33:02 +13:00 a week ago | |
19 - A.8.18 Use of Privileged Utility Programs.mp4▾8.5 MiB▾a week ago | 8.5 MiB | 2026-03-08 07:33:02 +13:00 a week ago |
20 - A.8.19 Installation of Software on Operational Systems.mp4▾9.0 MiB▾a week ago | 9.0 MiB | 2026-03-08 07:33:02 +13:00 a week ago |
| 9.8 MiB | 2026-03-08 07:33:02 +13:00 a week ago | |
22 - A.8.21 Security of Network Services.mp4▾9.5 MiB▾a week ago | 9.5 MiB | 2026-03-08 07:33:02 +13:00 a week ago |
| 8.9 MiB | 2026-03-08 07:33:02 +13:00 a week ago | |
| 8.1 MiB | 2026-03-08 07:33:02 +13:00 a week ago | |
| 8.0 MiB | 2026-03-08 07:33:02 +13:00 a week ago | |
26 - A.8.25 Secure Development Life Cycle.mp4▾9.7 MiB▾a week ago | 9.7 MiB | 2026-03-08 07:33:02 +13:00 a week ago |
27 - A.8.26 Application Security Requirements.mp4▾9.9 MiB▾a week ago | 9.9 MiB | 2026-03-08 07:33:02 +13:00 a week ago |
28 - A.8.27 Secure System Architecture and Engineering Principles.mp4▾17.0 MiB▾a week ago | 17.0 MiB | 2026-03-08 07:33:02 +13:00 a week ago |
| 14.6 MiB | 2026-03-08 07:33:02 +13:00 a week ago | |
30 - A.8.29 Security Testing in Development and Acceptance.mp4▾12.8 MiB▾a week ago | 12.8 MiB | 2026-03-08 07:33:02 +13:00 a week ago |
| 12.3 MiB | 2026-03-08 07:33:02 +13:00 a week ago | |
32 - A.8.31 Separation of Development, Test and Production Environments.mp4▾13.4 MiB▾a week ago | 13.4 MiB | 2026-03-08 07:33:02 +13:00 a week ago |
| 12.5 MiB | 2026-03-08 07:33:02 +13:00 a week ago | |
| 12.2 MiB | 2026-03-08 07:33:02 +13:00 a week ago | |
35 - A.8.34 Protection of Information Systems During Audit Testing.mp4▾11.5 MiB▾a week ago | 11.5 MiB | 2026-03-08 07:33:02 +13:00 a week ago |
Starting upload...