CARVIEW |
Select Language
HTTP/2 200
content-type: text/html; charset=UTF-8
access-control-allow-origin: *
cache-control: private, no-cache, no-store, must-revalidate, max-age=0, s-maxage=0
content-encoding: gzip
content-security-policy: default-src 'none'; style-src 'self' 'unsafe-inline' https:; img-src 'self' https: data:; font-src 'self'; script-src 'nonce-eOZrB3ULXU0UCIvCQ8HRfw' 'strict-dynamic' 'self' 'unsafe-eval'; form-action 'self'; media-src 'self' *.first.org; connect-src 'self' *.first.org; object-src 'none'; frame-src https:; frame-ancestors 'self'; base-uri 'self'
last-modified: Mon, 06 Oct 2025 16:45:25 GMT
referrer-policy: same-origin
server: nginx
x-content-type-options: nosniff
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
accept-ranges: bytes
date: Tue, 07 Oct 2025 06:19:55 GMT
via: 1.1 varnish
x-served-by: cache-bom-vanm7210032-BOM
x-cache: MISS
x-cache-hits: 0
x-timer: S1759817995.780757,VS0,VE1182
vary: accept-encoding, Accept-Encoding
strict-transport-security: max-age=31557600
alt-svc: h3=":443";ma=86400,h3-29=":443";ma=86400,h3-27=":443";ma=86400
content-length: 8565
CERT-BAM
- About FIRST
- Mission Statement
- Strategy Framework
- History
- Sustainable Development Goals
- Organization
- FIRST Policies
- Anti-Corruption Policy
- Antitrust Policy
- Bylaws
- Board duties
- Bug Bounty Program
- Code of Conduct
- Conflict of Interest Policy
- Document Record Retention and Destruction Policy
- FIRST Press Policy
- General Event Registration Refund Policy
- Guidelines for Site Selection for all FIRST events
- Identity & Logo Usage
- Mailing List Policy
- Media Policy
- Privacy Policy
- Registration Terms & Conditions
- Services Terms of Use
- Standards Policy
- Statement on Diversity & Inclusion
- Translation Policy
- Travel Policy
- Uniform IPR Policy
- Whistleblower Protection Policy
- Partnerships
- Newsroom
- Procurement
- Jobs
- Contact
- Membership
- Initiatives
- Special Interest Groups (SIGs)
- SIGs Framework
- Academic Security SIG
- AI Security SIG
- Automation SIG
- Cybersecurity Communications SIG
- Common Vulnerability Scoring System (CVSS-SIG)
- CSIRT Framework Development SIG
- Cyber Insurance SIG
- Cyber Threat Intelligence SIG
- Curriculum
- Introduction
- Introduction to CTI as a General topic
- Methods and Methodology
- Priority Intelligence Requirement (PIR)
- Source Evaluation and Information Reliability
- Machine and Human Analysis Techniques (and Intelligence Cycle)
- Threat Modelling
- Training
- Standards
- Glossary
- Communicating Uncertainties in CTI Reporting
- Webinars and Online Training
- Building a CTI program and team
- Curriculum
- Detection Engineering & Threat Hunting SIG
- Digital Safety SIG
- DNS Abuse SIG
- Stakeholder Advice
- Detection
- Cache Poisoning
- Creation of Malicious Subdomains Under Dynamic DNS Providers
- DGA Domains
- DNS As a Vector for DoS
- DNS Beacons - C2 Communication
- DNS Rebinding
- DNS Server Compromise
- DNS Tunneling
- DoS Against the DNS
- Domain Name Compromise
- Dynamic DNS (as obfuscation technique)
- Fast Flux (as obfuscation technique)
- Infiltration and exfiltration via the DNS
- Lame Delegations
- Local Resolver Hijacking
- Malicious registration of (effective) second level domains
- On-path DNS Attack
- Stub Resolver Hijacking
- Detection
- Code of Conduct & Other Policies
- Examples of DNS Abuse
- Stakeholder Advice
- Ethics SIG
- Exploit Prediction Scoring System (EPSS)
- FIRST Multi-Stakeholder Ransomware SIG
- Human Factors in Security SIG
- Industrial Control Systems SIG (ICS-SIG)
- Information Exchange Policy SIG (IEP-SIG)
- Information Sharing SIG
- Law Enforcement SIG
- Malware Analysis SIG
- Metrics SIG
- NETSEC SIG
- Public Policy SIG
- PSIRT SIG
- Red Team SIG
- Security Lounge SIG
- Security Operations Center SIG
- Threat Intel Coalition SIG
- Traffic Light Protocol (TLP-SIG)
- Transportation and Mobility SIG
- Vulnerability Coordination
- Vulnerability Reporting and Data eXchange SIG (VRDX-SIG)
- Women of FIRST
- CCB Initiatives
- FIRST CORE
- Internet Governance
- IR Database
- Fellowship Program
- Mentorship Program
- IR Hall of Fame
- Victim Notification
- Volunteers at FIRST
- Previous Activities
- Special Interest Groups (SIGs)
- Standards & Publications
- Events
- Education
- Blog
CERT-BAM
Team Information | |
---|---|
Team name | CERT-BAM |
Official team name | The Security Incident Response Team of BANK AL-MAGHRIB |
Member since | January 28, 2021 |
Host organization | BANK AL-MAGHRIB (Central Bank of Morocco) |
Country of team | Morocco MA |
Date of establishment | 2015-06-01 |
Website | https://www.bkam.ma/Cert-bam |
Team Contact Information | |
---|---|
Facsimile number | +212537818111 |
Business Hours | |
---|---|
Timezone | GMT+1 |
Description of business hours | 8H-18H |
How to contact outside business hours | Email / Emergency phone number. |
Constituency | |
---|---|
Type of Constituency | Financial sector |
Source of Constituency | Internal to host |
Description of Constituency | The constituency is internal to the "Central Bank of Morocco |
Internet Domain Address | bkam.ma |
Country of Constituency | Morocco MA |
Cryptography | |
---|---|
PGP key id | 0xDFE12980F4A63015 |
PGP fingerprint | CCA33056884385FD52D52A33DFE12980F4A63015 |
Team PGP public key | -----BEGIN PGP PUBLIC KEY BLOCK-----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=MhfR
-----END PGP PUBLIC KEY BLOCK----- |
Team contact information provided for Incident Response purposes only. FIRST strictly prohibits the use of contact information for solicitation or marketing.
FIRST follows the ISO 3166-1 standard for country code and name listings.