CSC V7 control 2.6 – Address unapproved software Overview CSC V7 control 2.6 recommends that organisations “Ensure that unauthorized software is either removed or the inventory is updated...
CSC V7 control 1 – Inventory and Control of Hardware Assets Overview CSC V7 control 1 recommends that organisations “Inventory and Control of Hardware Assets”. Note CSC V7 places this control...
CSC V7 control 2.7 – Utilize Application Whitelisting Overview CSC V7 control 2.7 recommends that organisations “Utilize application whitelisting technology on all assets to ensure that only authorized...
CSC V7 control 1.1 – Utilize an Active Discovery Tool Overview CSC V7 control 1.1 recommends that organisations “Utilize an active discovery tool to identify devices connected to the organization’s...
CSC V7 control 2.8 – Implement Application Whitelisting of Libraries Overview CSC V7 control 2.8 recommends that organisations “The organization’s application whitelisting software must ensure that only authorized software libraries...
CSC V7 control 1.2 – Use a Passive Asset Discovery Tool Overview CSC V7 control 1.2 recommends that organisations “Utilize a passive discovery tool to identify devices connected to the organization’s...
CSC V7 control 2.9 – Implement Application Whitelisting of Scripts Overview CSC V7 control 2.9 recommends that organisations “The organization’s application whitelisting software must ensure that only authorized, digitally signed...
CSC V7 control 1.3 – Use DHCP Logging to Update Asset Inventory Overview CSC V7 control 1.3 recommends that organisations “Use Dynamic Host Configuration Protocol (DHCP) logging on all DHCP servers or...
CSC V7 control 2.10 – Physically or Logically Segregate High Risk Applications Overview CSC V7 control 2.10 recommends that organisations “Physically or logically segregated systems should be used to isolate and run...
CSC V7 control 1.4 – Maintain Detailed Asset Inventory Overview CSC V7 control 1.4 recommends that organisations “Maintain an accurate and up-to-date inventory of all technology assets with the...