Zusammenfassung der Ressource
Critical Security Controls
- Inventory of Authorized and Unauthorized
DevicesInventory of Authorized and
Unauthorized Devices
- Inventory of Authorized and Unauthorized Software
- Secure Configurations for Hardware and Software on Mobile
Devices, Laptops, Workstations, and Servers
- Continuous Vulnerability Assessment and
Remediation
- Malware Defenses
- Application Software Security
- Wireless Access Control
- Data Recovery Capability
- Security Skills Assessment and Appropriate Training to Fill Gaps
- Secure Configurations for Network Devices such as Firewalls, Routers, and Switches
- Limitation and Control of Network Ports, Protocols, and Services
- Controlled Use of Administrative Privileges
- Boundary/ Perimeter Defense
- Account Monitoring and Control
- Data Protection
- Secure Network Engineering
- Incident Response and Management
- Maintenance, Monitoring, and Analysis of Audit Logs
- Controlled Access Based on the Need to Know
- Penetration Tests and Red TeamPenetration Tests and Red Team Exercises Exercises