Overview
CSC V7 control 12.12 recommends that organisations “Scan all enterprise devices remotely logging into the organization’s network prior to accessing the network to ensure that each of the organization’s security policies has been enforced in the same manner as local network devices.
Note
CSC V7 places this control in the category of “Boundary Defense”.
CSC V7 places this control in the function of “Protect”.
This control protects the following type of asset “Devices”.
What is CIS Critical Security Controls?
The CIS Controls (formerly known as Critical Security Controls) are a recommended set of actions for cyber defense that provide specific and actionable ways to protect against cyber attacks.
The Center for Internet Security (CIS) publishes the CIS Critical Security Controls (CSC) to help organizations better defend against known attacks by distilling key security concepts into actionable controls to achieve greater overall cybersecurity defense.