CSC V7 control 14.2 – Enable Firewall Filtering Between VLANs Overview CSC V7 control 14.2 recommends that organisations “Enable firewall filtering between VLANs to ensure that only authorized systems are...
CSC V7 control 12.10 – Decrypt Network Traffic at Proxy Overview CSC V7 control 12.10 recommends that organisations “Decrypt all encrypted network traffic at the boundary proxy prior to analyzing...
CSC V7 control 14.3 – Disable Workstation to Workstation Communication Overview CSC V7 control 14.3 recommends that organisations “Disable all workstation to workstation communication to limit an attacker’s ability to...
CSC V7 control 12.11 – Require All Remote Login to Use Multi-factor Authentication Overview CSC V7 control 12.11 recommends that organisations “Require all remote login access to the organization’s network to encrypt data...
CSC V7 control 12.12 – Manage All Devices Remotely Logging into Internal Network Overview CSC V7 control 12.12 recommends that organisations “Scan all enterprise devices remotely logging into the organization’s network prior to...
CSC V7 control 13 – Data Protection Overview CSC V7 control 13 recommends that organisations “ Note CSC V7 places this control in the category of “Data...
CSC V7 control 13.1 – Maintain an Inventory Sensitive Information Overview CSC V7 control 13.1 recommends that organisations “Maintain an inventory of all sensitive information stored, processed, or transmitted by...
CSC V7 control 13.2 – Remove Sensitive Data or Systems Not Regularly Accessed by Organization Overview CSC V7 control 13.2 recommends that organisations “Remove sensitive data or systems not regularly accessed by the organization from...
CSC V7 control 13.3 – Monitor and Block Unauthorized Network Traffic Overview CSC V7 control 13.3 recommends that organisations “Deploy an automated tool on network perimeters that monitors for unauthorized transfer...
CSC V7 control 13.4 – Only Allow Access to Authorized Cloud Storage or Email Providers Overview CSC V7 control 13.4 recommends that organisations “Only allow access to authorized cloud storage or email providers. Note CSC...