1. Home
  2. Security Hardening
  3. CAS Implementation Group 1 File
  4. CIS Control 5 (5.1) Establish Secure Configurations

CIS Control 5 (5.1) Establish Secure Configurations

Details

Implementation Group 1 – Does the Organization have a documented secure configuration for each of their device types, applications/software?

Supportive Information

The following resource is also helpful.

This control applies to the following type of system Unix.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles