• CSC 3: Secure Configurations for Hardware and Software on Mobile Device Laptops, Workstations, and Servers
  • CSC 5: Controlled Use of Administrative Privileges
  • CSC 6: Maintenance, Monitoring, and Analysis of Audit Logs
  • CSC 7: Email and Web Browser Protections
  • CSC 9: Limitation and Control of Network Ports, Protocols, and Services
  • CSC 14: Controlled Access Based on the Need to Know
  • CSC 15: Wireless Access Control
  • CSC 16: Account Monitoring and Control
  • CSC 18: Application Software Security
  • CSC 19: Incident Response and Management