Part 6 of a 20 part series detailing the CIS Critical Security Controls.
CIS CSC #5 – Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
Part 5 of a 20 part series detailing the CIS Critical Security Controls.
CIS CSC #4 – Controlled Use of Administrative Privileges
Part 4 of a 20 part series detailing the CIS Critical Security Controls.
CIS CSC #3 – Continuous Vulnerability Management
Part 3 of a 20 part series detailing the CIS Critical Security Controls.
CIS CSC #2 – Inventory and Control of Software Assets
Part 2 of a 20 part series detailing the CIS Critical Security Controls.