20 Critical Security Controls: Control 12 – Boundary Defense

Today, I will be going over Control 12 from version 7 of the CIS top 20 Critical Security Controls – Boundary Defense. I will go through the 12 requirements and offer my thoughts on what I’ve found. Key Takeaways from Control 12 Quick and powerful wins available. Use tools at ... Read More

20 Critical Security Controls: Control 13 – Data Protection

Today, I will be going over Control 13 from version 7 of the CIS top 20 Critical Security Controls – Data Protection. I will go through the nine requirements and offer my thoughts on what I’ve found. Key Takeaways for Control 13 A wide array of difficulty. Some of these ... Read More

20 Critical Security Controls: Control 14 – Controlled Access Based on the Need to Know

Today, I will be going over Control 14 from version 7 of the CIS top 20 Critical Security Controls – Controlled Access Based on the Need to Know. I will go through the nine requirements and offer my thoughts on what I’ve found. Key Takeaways for Control 14 Information Security ... Read More

20 Critical Security Controls: Control 15 – Wireless Access Control

Today, I will be going over Control 15 from version 7 of the CIS top 20 Critical Security Controls – Wireless Access Control. I will go through the ten requirements and offer my thoughts on what I’ve found. Key Takeaways for Control 15 Reduce your attack surface. So much of ... Read More

20 Critical Security Controls: Control 16 – Account Monitoring and Control

Today, I will be going over Control 16 from version 7 of the CIS top 20 Critical Security Controls – Account Monitoring and Control. I will go through the thirteen requirements and offer my thoughts on what I’ve found. Key Takeaways for Control 16 Don’t forget the logs. Enabling a ... Read More

20 Critical Security Controls: Control 17 – Implement a Security Awareness and Training Program

Today, I will be going over Control 17 from version 7 of the CIS top 20 Critical Security Controls – Implement a Security Awareness and Training Program. I will go through the nine requirements and offer my thoughts on what I’ve found. Key Takeaways in Control 17 Less focus on ... Read More

20 Critical Security Controls: Control 18 – Application Software Security

Today, I will be going over Control 18 from version 7 of the CIS top 20 Critical Security Controls – Application Software Security. I will go through the eleven requirements and offer my thoughts on what I’ve found. Key Take Aways for Control 18 Understand your risk. The first great ... Read More

20 Critical Security Controls: Control 19 – Incident Response and Management

Today, I will be going over Control 19 from version 7 of the CIS top 20 Critical Security Controls – Incident Response and Management. I will go through the eight requirements and offer my thoughts on what I’ve found. Key Take Aways for Control 19 Most of the same. Control ... Read More

20 Critical Security Controls: Control 20 – Penetration Tests and Red Team Exercises

Today, I will be going over Control 20 from version 7 of the CIS top 20 Critical Security Controls – Penetration Tests and Red Team Exercises. I will go through the eight requirements and offer my thoughts on what I’ve found. Key Take Aways from Control 20 Rely on the ... Read More

Make the Most of the New CIS Controls v7

Recently, the Center for Internet Security (CIS) released its next revision of the Top 20 Security Controls. Initially developed by the SANS Institute and known as the SANS Critical Controls, these best practices are indispensable to organizations both large and small. By adopting these sets of controls, organizations can prevent ... Read More
Loading...