Technical
Technical reference documentation and standards
Overview
Technical documentation for consultants covering security tools, compliance requirements, and implementation standards.
Documentation Categories
Security Technologies
| Category |
Topics |
| Endpoint Security |
EDR platforms, AV solutions, configuration standards |
| Network Security |
Firewalls, SIEM, network monitoring |
| Identity & Access |
IAM, MFA, privileged access management |
| Cloud Security |
AWS/Azure/GCP security controls, CSPM |
| Email Security |
Secure email gateways, DMARC/SPF/DKIM |
Compliance Technical Requirements
| Framework |
Key Technical Controls |
| HIPAA |
Access controls, encryption, audit logs, backup |
| SOC 2 |
All TSC controls technical implementation |
| ISO 27001 |
Annex A controls technical mapping |
| NIST CSF |
Framework core technical implementation |
| CMMC |
Practice-specific technical requirements |
See Compliance Frameworks for framework details.
Implementation Standards
| Standard |
Purpose |
| Configuration baselines |
Secure defaults for common platforms |
| Hardening guides |
OS, application, network hardening |
| Assessment methodologies |
Pen testing, vulnerability assessment |
| Architecture patterns |
Reference architectures for common needs |
Quick Reference
| Tool |
Purpose |
Notes |
| Nessus/Qualys |
Vulnerability scanning |
Licensed |
| Burp Suite |
Web app testing |
Licensed |
| Nmap |
Network scanning |
Open source |
| Wireshark |
Packet analysis |
Open source |
Compliance Quick Lookup
| Question |
Framework Reference |
| What encryption is required? |
HIPAA 164.312(a)(2)(iv), SOC 2 CC6.1 |
| MFA requirements? |
All frameworks require, specifics vary |
| Log retention? |
HIPAA 6 years, SOC 2 per policy, PCI 1 year |