000 02029nam  2200421zi 4500
0019.914160
003CaOODSP
00520230103152518
006m     o  d f      
007cr cn|||||||||
008220804s2022    onc     ob   f000 0 eng d
020 |a9780660448985
040 |aCaOODSP|beng|erda|cCaOODSP
043 |an-cn---
0861 |aD97-4/10-095-2022E-PDF
24500|aTop 10 IT security actions : |bno. 10 implement application allow lists.
264 1|a[Ottawa] : |bCommunications Security Establishment = Centre de la sécurité des telecommunications, |c2022.
300 |a1 online resource (20 pages)
336 |atext|btxt|2rdacontent
337 |acomputer|bc|2rdamedia
338 |aonline resource|bcr|2rdacarrier
4901 |aManagement ; |vITSM.10.095
500 |aIssued also in French under title: Les 10 mesures de sécurité des TI : no. 10, mettre en place une liste d'applications autorisées.
500 |aCover title.
500 |a"Unclassified / Non classifié."
500 |a"This publication takes effect on August 11, 2022."
500 |a"Canadian Centre for Cyber Security."
500 |aIssued also in HTML format.
504 |aIncludes bibliographical references (page 18).
650 0|aApplication software|xComputer networks|xSecurity measures|zCanada.
650 0|aComputer networks|xSecurity measures|zCanada.
7102 |aCommunications Security Establishment (Canada), |eissuing body.
7102 |aCanadian Centre for Cyber Security, |eissuing body.
77508|tLes 10 mesures de sécurité des TI : |w(CaOODSP)9.914159
830#0|aManagement series, information technology security guidance (Communications Security Establishment (Canada))|vITSM.10.095.|w(CaOODSP)9.842856
85640|qPDF|s769 KB|uhttps://publications.gc.ca/collections/collection_2022/cstc-csec/D97-4-10-095-2022-eng.pdf
8564 |qHTML|sN/A|uhttps://cyber.gc.ca/en/top-top-10-it-security-action-items-no-10-implement-application-allow-lists-itsm10095