Critical Security Controls

Viki J
Mind Map by Viki J, updated more than 1 year ago
Viki J
Created by Viki J over 6 years ago


Information security Controls for effective governance.

Resource summary

Critical Security Controls
  1. Inventory of Authorized and Unauthorized DevicesInventory of Authorized and Unauthorized Devices
    1. Inventory of Authorized and Unauthorized Software
      1. Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
        1. Continuous Vulnerability Assessment and Remediation
          1. Malware Defenses
            1. Application Software Security
              1. Wireless Access Control
                1. Data Recovery Capability
                  1. Security Skills Assessment and Appropriate Training to Fill Gaps
                    1. Secure Configurations for Network Devices such as Firewalls, Routers, and Switches
                      1. Limitation and Control of Network Ports, Protocols, and Services
                        1. Controlled Use of Administrative Privileges
                          1. Boundary/ Perimeter Defense
                            1. Account Monitoring and Control
                              1. Data Protection
                                1. Secure Network Engineering
                                  1. Incident Response and Management
                                    1. Maintenance, Monitoring, and Analysis of Audit Logs
                                      1. Controlled Access Based on the Need to Know
                                        1. Penetration Tests and Red TeamPenetration Tests and Red Team Exercises Exercises
                                          Show full summary Hide full summary


                                          AS Levels ICT -Form Controls
                                          2.1 Business Influences and Associated Security Risks
                                          DJ Perrone
                                          Types of Attacks
                                          River L.
                                          Data-centric Security
                                          Michael Mihalik
                                          Information Security: Chapter 2
                                          PC Dashboard
                                          al wed
                                          Information Security FULL WORK
                                          Luis Mauricio Falla Guiulfo
                                          Infosec Basics
                                          Loho Co (12,14) IC IA
                                          hasnain zehra
                                          Control Systems Exit Review
                                          Freyja Ivorie Miguel