CIS Control 3 (3.6(b)) Deploy Automated Software Patch Management Tools Details Does the organization have a policy in place which dictates how Authorized Software is kept up to date? Supportive...
CIS Control 1 (1.6) Ensure that unauthorized assets are removed, quarantined or the inventory is updated Details Implementation Group 1 – Does the organization have an established policy or procedure specifying a timeframe for which assets/devices...
CIS Control 4 (4.2) Change Default Passwords Details Implementation Group 1 – Does the Organization have a defined password policy? Supportive Information The following resource is also...
CIS Control 12 (12.1) Maintain an Inventory of Network Boundaries Details Implementation Group 1 – Does the Organization have a network diagram defining all the boundary devices as defined above?...
CIS Control 4 (4.3) Ensure the Use of Dedicated Administrative Accounts Details Implementation Group 1 – Does the Organization have a defined Administrative account on each system where elevated access is...
CIS Control 12 (12.4(b)) Deny Communications Over Unauthorized Ports Details Implementation Group 1 – Does the Organization have a defined network traffic policy for each subnet? Supportive Information The...
CIS Control 13 (13.1) Maintain an Inventory of Sensitive Information Details Implementation Group 1 – Does the Organization have a defined classification policy? Supportive Information The following resource is also...
CIS Control 13 (13.2) Remove Sensitive Data or Systems Not Regularly Accessed by Organization Details Implementation Group 1 – Does the Organization have a defined access frequency policy? Supportive Information The following resource is...
CIS Control 13 (13.6) Encrypt Mobile Device Data Details Implementation Group 1 – Does the Organization have a defined classification policy? Supportive Information The following resource is also...
CIS Control 14 (14.6) Protect Information Through Access Control Lists Details Implementation Group 1 – Does the Organization have a defined configuration policy? Supportive Information The following resource is also...