SANS TOP 20 CRITICAL SECURITY CONTROLS FOR EFFECTIVE CYBER DEFENSE – DO THESE NOW!
- CSC 3: Secure Configurations for Hardware and Software on Mobile Device Laptops, Workstations, and Servers
- CSC 5: Controlled Use of Administrative Privileges
- CSC 6: Maintenance, Monitoring, and Analysis of Audit Logs
- CSC 7: Email and Web Browser Protections
- CSC 9: Limitation and Control of Network Ports, Protocols, and Services
- CSC 14: Controlled Access Based on the Need to Know
- CSC 15: Wireless Access Control
- CSC 16: Account Monitoring and Control
- CSC 18: Application Software Security
- CSC 19: Incident Response and Management
Share This Story, Choose Your Platform!