The average rating of the page This property is pre-deployed (also known as special property) and comes with additional administrative privileges but can be used just like any other user-defined property.Usage273previous 202050100250500next 20Filter<p>The <a target="_blank" rel="nofollow noreferrer noopener" class="external text" href="https://www.semantic-mediawiki.org/wiki/Help:Property_page/Filter">search filter</a> allows the inclusion of <a target="_blank" rel="nofollow noreferrer noopener" class="external text" href="https://www.semantic-mediawiki.org/wiki/Help:Query_expressions">query expressions</a> such as <code>~</code> or <code>!</code>. The selected <a target="_blank" rel="nofollow noreferrer noopener" class="external text" href="https://www.semantic-mediawiki.org/wiki/Query_engine">query engine</a> might also support case insensitive matching or other short expressions like:</p><ul><li><code>in:</code> result should include the term, e.g. '<code>in:Foo</code>'</li></ul><ul><li><code>not:</code> result should to not include the term, e.g. '<code>not:Bar</code>'</li></ul>Showing 20 pages using this property.CControls/A.5.11 Return of assets +0 +Controls/A.5.12 Classification of information +0 +Controls/A.5.13 Labelling of information +0 +Controls/A.5.14 Information transfer +0 +Controls/A.5.15 Access control +0 +Controls/A.5.16 Identity management +0 +Controls/A.5.17 Authentication information +0 +Controls/A.5.18 Access rights +0 +Controls/A.5.19 Information security in supplier relationships +0 +Controls/A.5.20 Addressing information security within supplier agreements +0 +Controls/A.5.21 Managing information security in the ICT supply chain +0 +Controls/A.5.22 Monitoring, review and change management of supplier services +0 +Controls/A.5.23 Information security for use of cloud services +0 +Controls/A.5.24 Information security incident management planning and preparation +0 +Controls/A.5.25 Assessment and decision on information security events +0 +Controls/A.5.26 Response to information security incidents +0 +Controls/A.5.27 Learning from information security incidents +0 +Controls/A.5.28 Collection of evidence +0 +Controls/A.5.29 Information security during disruption +0 +Controls/A.5.3 Segregation of duties +0 +