1. Home
  2. Frameworks and Standards
  3. CIS Critical Security Controls V7
  4. CSC V7 control 11.6 – Use Dedicated Machines For All Network Administrative Tasks

CSC V7 control 11.6 – Use Dedicated Machines For All Network Administrative Tasks

Overview

CSC V7 control 11.6 recommends that organisations “Ensure network engineers use a dedicated machine for all administrative tasks or tasks requiring elevated access. This machine shall be segmented from the organization’s primary network and not be allowed Internet access. This machine shall not be used for reading e-mail, composing documents, or surfing the Internet.

Note

CSC V7 places this control in the category of “Secure Configuration for Network Devices, such as Firewalls, Routers and Switches”.

CSC V7 places this control in the function of “Protect”.

This control protects the following type of asset “Network”.

What is CIS Critical Security Controls?

The CIS Controls (formerly known as Critical Security Controls) are a recommended set of actions for cyber defense that provide specific and actionable ways to protect against cyber attacks.

The Center for Internet Security (CIS) publishes the CIS Critical Security Controls (CSC) to help organizations better defend against known attacks by distilling key security concepts into actionable controls to achieve greater overall cybersecurity defense.

Source(s)

Updated on July 16, 2022
Was this article helpful?

Related Articles