home.social

#procedures — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #procedures, aggregated by home.social.

  1. europesays.com/iran/102218/ 1,600 Ships Are Still Trapped in the Strait of Hormuz. Iran Says There Are “New Procedures.” The U.S. Says Project Freedom Is Paused. The Sailors Say: What About Us? #1600 #about #are #freedom #Hormuz #in #Iran #is #new #of #paused #PersianGulf #procedures #project #sailors #say #says #ships #Still #strait #the #there #trapped #US #what

  2. Plans, Policies, and Procedures: Equipment Disposal
    The plan for responsibly managing assets that are no longer needed, ensuring proper data sanitization, and adhering to legal and environmental regulations.

    blackcatwhitehatsecurity.com

    #Plans #Policies #Procedures #Equipment #Disposal #Programming

  3. Plans, Policies, and Procedures: Equipment Disposal
    The plan for responsibly managing assets that are no longer needed, ensuring proper data sanitization, and adhering to legal and environmental regulations.

    blackcatwhitehatsecurity.com

    #Plans #Policies #Procedures #Equipment #Disposal #Programming

  4. Plans, Policies, and Procedures: Equipment Disposal
    The plan for responsibly managing assets that are no longer needed, ensuring proper data sanitization, and adhering to legal and environmental regulations.

    blackcatwhitehatsecurity.com

    #Plans #Policies #Procedures #Equipment #Disposal #Programming

  5. Plans, Policies, and Procedures: Equipment Disposal
    The plan for responsibly managing assets that are no longer needed, ensuring proper data sanitization, and adhering to legal and environmental regulations.

    blackcatwhitehatsecurity.com

    #Plans #Policies #Procedures #Equipment #Disposal #Programming

  6. Plans, Policies, and Procedures: Equipment Disposal
    The plan for responsibly managing assets that are no longer needed, ensuring proper data sanitization, and adhering to legal and environmental regulations.

    blackcatwhitehatsecurity.com

    #Plans #Policies #Procedures #Equipment #Disposal #Programming

  7. Plans, Policies, and Procedures: Data Retention
    Formal set of rules defining how long an organization keeps different types of data and how it is securely managed and eventually disposed of.

    blackcatwhitehatsecurity.com

    #Plans #Policies #Procedures #Data #Retention #Programming

  8. Plans, Policies, and Procedures: COSO
    An organization that develops guidelines for businesses to evaluate internal controls, risk management, and fraud deterrence.

    blackcatwhitehatsecurity.com

    #Plans #Policies #Procedures #COSO #Programming

  9. Plans, Policies, and Procedures: CMMC 2.0
    A revised program designed to ensure Department of Defense (DoD) contractors and subcontractors adequately protect sensitive information (FCI and CUI) by streamlining requirements.

    blackcatwhitehatsecurity.com

    #Plans #Policies #Procedures #CMMC #Programming

  10. Plans, Policies, and Procedures: BYOD
    Allows employees to use their personal devices (like smartphones, laptops, or tablets) for work-related activities.

    blackcatwhitehatsecurity.com

    #Plans #Policies #Procedures #BYOD #Programming

  11. Plans, Policies, and Procedures: Acceptable Use
    A set of rules and guidelines for using an organization's technology resources, including networks, websites, and other digital assets.

    blackcatwhitehatsecurity.com

    #Plans #Policies #Procedures #Acceptable #Use #Programming

  12. Plans, Policies, and Procedures: Acceptable Use
    A set of rules and guidelines for using an organization's technology resources, including networks, websites, and other digital assets.

    blackcatwhitehatsecurity.com

    #Plans #Policies #Procedures #Acceptable #Use #Programming

  13. Plans, Policies, and Procedures: Acceptable Use
    A set of rules and guidelines for using an organization's technology resources, including networks, websites, and other digital assets.

    blackcatwhitehatsecurity.com

    #Plans #Policies #Procedures #Acceptable #Use #Programming

  14. Plans, Policies, and Procedures: Acceptable Use
    A set of rules and guidelines for using an organization's technology resources, including networks, websites, and other digital assets.

    blackcatwhitehatsecurity.com

    #Plans #Policies #Procedures #Acceptable #Use #Programming

  15. Plans, Policies, and Procedures: Acceptable Use
    A set of rules and guidelines for using an organization's technology resources, including networks, websites, and other digital assets.

    blackcatwhitehatsecurity.com

    #Plans #Policies #Procedures #Acceptable #Use #Programming

  16. Plans, Policies, and Procedures: 3rd Party
    A document outlining how an organization manages the security risks introduced by its vendors, suppliers, and other external partners.

    blackcatwhitehatsecurity.com

    #Plans #Policies #Procedures #3rd #Party #Programming

  17. Plans, Policies, and Procedures: 3rd Party
    A document outlining how an organization manages the security risks introduced by its vendors, suppliers, and other external partners.

    blackcatwhitehatsecurity.com

    #Plans #Policies #Procedures #3rd #Party #Programming

  18. Plans, Policies, and Procedures: 3rd Party
    A document outlining how an organization manages the security risks introduced by its vendors, suppliers, and other external partners.

    blackcatwhitehatsecurity.com

    #Plans #Policies #Procedures #3rd #Party #Programming

  19. Plans, Policies, and Procedures: 3rd Party
    A document outlining how an organization manages the security risks introduced by its vendors, suppliers, and other external partners.

    blackcatwhitehatsecurity.com

    #Plans #Policies #Procedures #3rd #Party #Programming

  20. Plans, Policies, and Procedures: 3rd Party
    A document outlining how an organization manages the security risks introduced by its vendors, suppliers, and other external partners.

    blackcatwhitehatsecurity.com

    #Plans #Policies #Procedures #3rd #Party #Programming

  21. Plans, Policies, and Procedures: 3rd Party
    A document outlining how an organization manages the security risks introduced by its vendors, suppliers, and other external partners.

    blackcatwhitehatsecurity.com

    #Plans #Policies #Procedures #3rd #Party #Programming

  22. Plans, Policies, and Procedures: SOC 2
    Designed to help organizations demonstrate that they have implemented appropriate controls to protect customer data and systems.

    blackcatwhitehatsecurity.com

    #Plans #Policies #Procedures #SOC2 #Programming

  23. Plans, Policies, and Procedures: NIST AI RMF
    A set of industry-neutral guidelines released by the National Institute of Standards and Technology (NIST).

    blackcatwhitehatsecurity.com

    #Plans #Policies #Procedures #NIST #AI #RMF #Programming

  24. Plans, Policies, and Procedures: NIST AI RMF
    A set of industry-neutral guidelines released by the National Institute of Standards and Technology (NIST).

    blackcatwhitehatsecurity.com

    #Plans #Policies #Procedures #NIST #AI #RMF #Programming

  25. Plans, Policies, and Procedures: NIST AI RMF
    A set of industry-neutral guidelines released by the National Institute of Standards and Technology (NIST).

    blackcatwhitehatsecurity.com

    #Plans #Policies #Procedures #NIST #AI #RMF #Programming

  26. Plans, Policies, and Procedures: NIST AI RMF
    A set of industry-neutral guidelines released by the National Institute of Standards and Technology (NIST).

    blackcatwhitehatsecurity.com

    #Plans #Policies #Procedures #NIST #AI #RMF #Programming

  27. Plans, Policies, and Procedures: NIST AI RMF
    A set of industry-neutral guidelines released by the National Institute of Standards and Technology (NIST).

    blackcatwhitehatsecurity.com

    #Plans #Policies #Procedures #NIST #AI #RMF #Programming

  28. Plans, Policies, and Procedures: Acceptable Use
    A set of rules and guidelines for using an organization's technology resources, including networks, websites, and other digital assets.

    blackcatwhitehatsecurity.com

    #Plans #Policies #Procedures #Acceptable #Use #CyberSecurity

  29. Plans, Policies, and Procedures: Acceptable Use
    A set of rules and guidelines for using an organization's technology resources, including networks, websites, and other digital assets.

    blackcatwhitehatsecurity.com

    #Plans #Policies #Procedures #Acceptable #Use #CyberSecurity

  30. Plans, Policies, and Procedures: Acceptable Use
    A set of rules and guidelines for using an organization's technology resources, including networks, websites, and other digital assets.

    blackcatwhitehatsecurity.com

    #Plans #Policies #Procedures #Acceptable #Use #CyberSecurity

  31. Plans, Policies, and Procedures: 3rd Party
    A document outlining how an organization manages the security risks introduced by its vendors, suppliers, and other external partners.

    blackcatwhitehatsecurity.com

    #Plans #Policies #Procedures #3rd #Party #CyberSecurity

  32. Plans, Policies, and Procedures: NIST AI RMF
    A set of industry-neutral guidelines released by the National Institute of Standards and Technology (NIST).
    blackcatwhitehatsecurity.com
    #Plans #Policies #Procedures #NIST #AI #RMF #technology

  33. Plans, Policies, and Procedures: NIST AI RMF
    A set of industry-neutral guidelines released by the National Institute of Standards and Technology (NIST).
    blackcatwhitehatsecurity.com
    #Plans #Policies #Procedures #NIST #AI #RMF #technology

  34. Plans, Policies, and Procedures: NIST AI RMF
    A set of industry-neutral guidelines released by the National Institute of Standards and Technology (NIST).
    blackcatwhitehatsecurity.com
    #Plans #Policies #Procedures #NIST #AI #RMF #technology

  35. Plans, Policies, and Procedures: NIST AI RMF
    A set of industry-neutral guidelines released by the National Institute of Standards and Technology (NIST).
    blackcatwhitehatsecurity.com
    #Plans #Policies #Procedures #NIST #AI #RMF #technology

  36. Plans, Policies, and Procedures: CISA SCuBA Gear M365
    The Secure Cloud Business Applications project provides guidance to secure agencies cloud business application environments and protect federal information.
    blackcatwhitehatsecurity.com
    #Plans #Policies #Procedures #CISA #SCuBAGear #M365

  37. Plans, Policies, and Procedures: CISA SCuBA Gear M365
    The Secure Cloud Business Applications project provides guidance to secure agencies cloud business application environments and protect federal information.
    blackcatwhitehatsecurity.com
    #Plans #Policies #Procedures #CISA #SCuBAGear #M365

  38. Plans, Policies, and Procedures: Acceptable Use
    A set of rules and guidelines for using an organization's technology resources, including networks, websites, and other digital assets.
    blackcatwhitehatsecurity.com
    #Plans #Policies #Procedures #Acceptable #Use #technology #cats

  39. Plans, Policies, and Procedures: Acceptable Use
    A set of rules and guidelines for using an organization's technology resources, including networks, websites, and other digital assets.
    blackcatwhitehatsecurity.com
    #Plans #Policies #Procedures #Acceptable #Use #technology #cats

  40. Plans, Policies, and Procedures: Acceptable Use
    A set of rules and guidelines for using an organization's technology resources, including networks, websites, and other digital assets.
    blackcatwhitehatsecurity.com
    #Plans #Policies #Procedures #Acceptable #Use #technology #cats

  41. Plans, Policies, and Procedures: Equipment Disposal
    The plan for responsibly managing assets that are no longer needed, ensuring proper data sanitization, and adhering to legal and environmental regulations.
    blackcatwhitehatsecurity.com
    #Plans #Policies #Procedures #Equipment #Disposal #technology

  42. As I perform final assembly of various glider parts (landing gear, flight controls, etc.) I am replacing many temporary/keeper parts, such as nuts, and some bolts. (see photo)

    The many silver-colored nuts (zinc plated) are ordinary hardware store parts. They are not locknuts.

    The few gold colored nuts (cadmium plated?) have a small rounded top where a nylon insert has been added. These are nylon lock nuts...nylocks. Those are the parts I want for most final assembly tasks. (Landing gear locknuts will use cotter pins or safety wire. They withstand greater shock loads and nylocks are insufficient.)

    Note that some of the bolts in the photo are threaded along the entire length. Those are not suitable for connecting parts that are subject to shear loads. Instead, you want a bolt with a smooth shank. I am checking every bolt to make sure I have the correct shank length.)

    #AvGeek #Aviation #ElectricAircraft #ExperimentalAviation #Homebuilt #Glider #DIY #Procedures #Nuts #Bolts