Critical Security Controls

Description

Information security Controls for effective governance.
Viki J
Mind Map by Viki J, updated more than 1 year ago
Viki J
Created by Viki J over 9 years ago
14
0

Resource summary

Critical Security Controls
  1. Inventory of Authorized and Unauthorized DevicesInventory of Authorized and Unauthorized Devices
    1. Inventory of Authorized and Unauthorized Software
      1. Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
        1. Continuous Vulnerability Assessment and Remediation
          1. Malware Defenses
            1. Application Software Security
              1. Wireless Access Control
                1. Data Recovery Capability
                  1. Security Skills Assessment and Appropriate Training to Fill Gaps
                    1. Secure Configurations for Network Devices such as Firewalls, Routers, and Switches
                      1. Limitation and Control of Network Ports, Protocols, and Services
                        1. Controlled Use of Administrative Privileges
                          1. Boundary/ Perimeter Defense
                            1. Account Monitoring and Control
                              1. Data Protection
                                1. Secure Network Engineering
                                  1. Incident Response and Management
                                    1. Maintenance, Monitoring, and Analysis of Audit Logs
                                      1. Controlled Access Based on the Need to Know
                                        1. Penetration Tests and Red TeamPenetration Tests and Red Team Exercises Exercises
                                          Show full summary Hide full summary

                                          Similar

                                          AS Levels ICT -Form Controls
                                          lukejones
                                          2.1 Business Influences and Associated Security Risks
                                          DJ Perrone
                                          Infosec Basics
                                          bondarets
                                          Types of Attacks
                                          River L.
                                          Information Security: Chapter 2
                                          marcb176
                                          Data-centric Security
                                          Michael Mihalik
                                          Threats
                                          marnus.db
                                          PC Dashboard
                                          al wed
                                          Information Security FULL WORK
                                          Luis Mauricio Falla Guiulfo
                                          Loho Co (12,14) IC IA
                                          hasnain zehra
                                          Control Systems Exit Review
                                          Freyja Ivorie Miguel