CIS Control 1 - Inventory of Authorized and Unauthorized Devices
CIS Control 2 - Inventory of Authorized and Unauthorized Software
CIS Control 3 - Secure Configurations for Hardware and Software
CIS Control 4 - Continuous Vulnerability Assessment and Remediationq
CIS Control 5 - Controlled Use of Administrative Privileges
CIS Control 6 - Maintenance, Monitoring, and Analysis of Audit Logs
CIS Control 7 - Email and Web Browser Protections
CIS Control 8 - Malware Defenses
CIS Control 9 - Limitation and Control of Network Ports
CIS Control 10 - Data Recovery Capability
CIS Control 11 - Secure Configurations for Network Devices
CIS Control 12 - Boundary Defense
CIS Control 13 - Data Protection
CIS Control 14 - Controlled Access Based on the Need to Know
CIS Control 15 - Wireless Access Control
CIS Control 16 - Account Monitoring and Control
CIS Control 17 - Security Skills Assessment and Appropriate Training to Fill Gaps
CIS Control 18 - Application Software Security
CIS Control 19 - Incident Response and Management
CIS Control 20 - Penetration Tests and Red Team Exercises
Copyright @SecurWires. Designed & Developer By MindScript