Critical Security Controls

Descripción

Information security Controls for effective governance.
Viki J
Mapa Mental por Viki J, actualizado hace más de 1 año
Viki J
Creado por Viki J hace alrededor de 9 años
13
0

Resumen del Recurso

Critical Security Controls
  1. Inventory of Authorized and Unauthorized DevicesInventory of Authorized and Unauthorized Devices
    1. Inventory of Authorized and Unauthorized Software
      1. Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
        1. Continuous Vulnerability Assessment and Remediation
          1. Malware Defenses
            1. Application Software Security
              1. Wireless Access Control
                1. Data Recovery Capability
                  1. Security Skills Assessment and Appropriate Training to Fill Gaps
                    1. Secure Configurations for Network Devices such as Firewalls, Routers, and Switches
                      1. Limitation and Control of Network Ports, Protocols, and Services
                        1. Controlled Use of Administrative Privileges
                          1. Boundary/ Perimeter Defense
                            1. Account Monitoring and Control
                              1. Data Protection
                                1. Secure Network Engineering
                                  1. Incident Response and Management
                                    1. Maintenance, Monitoring, and Analysis of Audit Logs
                                      1. Controlled Access Based on the Need to Know
                                        1. Penetration Tests and Red TeamPenetration Tests and Red Team Exercises Exercises
                                          Mostrar resumen completo Ocultar resumen completo

                                          Similar

                                          AS Levels ICT -Form Controls
                                          lukejones
                                          2.1 Business Influences and Associated Security Risks
                                          DJ Perrone
                                          Infosec Basics
                                          bondarets
                                          Types of Attacks
                                          River L.
                                          Information Security: Chapter 2
                                          marcb176
                                          Data-centric Security
                                          Michael Mihalik
                                          PC Dashboard
                                          al wed
                                          Threats
                                          marnus.db
                                          Information Security FULL WORK
                                          Luis Mauricio Falla Guiulfo
                                          Loho Co (12,14) IC IA
                                          hasnain zehra
                                          Control Systems Exit Review
                                          Freyja Ivorie Miguel