CSC V7 control 4.3 – Ensure the Use of Dedicated Administrative Accounts Overview CSC V7 control 4.3 recommends that organisations “Ensure that all users with administrative account access use a dedicated or...
CSC V7 control 6.3 – Enable Detailed Logging Overview CSC V7 control 6.3 recommends that organisations “Enable system logging to include detailed information such as a event source,...
CSC V7 control 4.4 – Use Unique Passwords Overview CSC V7 control 4.4 recommends that organisations “Where multi-factor authentication is not supported (such as local administrator, root, or...
CSC V7 control 6.4 – Ensure adequate storage for logs Overview CSC V7 control 6.4 recommends that organisations “Ensure that all systems that store logs have adequate storage space for...
CSC V7 control 4.5 – Use Multifactor Authentication For All Administrative Access Overview CSC V7 control 4.5 recommends that organisations “Use multi-factor authentication and encrypted channels for all administrative account access. Note...
CSC V7 control 6.5 – Central Log Management Overview CSC V7 control 6.5 recommends that organisations “Ensure that appropriate logs are being aggregated to a central log management...
CSC V7 control 4.6 – Use of Dedicated Machines For All Administrative Tasks Overview CSC V7 control 4.6 recommends that organisations “Ensure administrators use a dedicated machine for all administrative tasks or tasks...
CSC V7 control 6.6 – Deploy SIEM or Log Analytic tool Overview CSC V7 control 6.6 recommends that organisations “Deploy Security Information and Event Management (SIEM) or log analytic tool for...
CSC V7 control 4.7 – Limit Access to Script Tools Overview CSC V7 control 4.7 recommends that organisations “Limit access to scripting tools (such as Microsoft PowerShell and Python) to...
CSC V7 control 6.7 – Regularly Review Logs Overview CSC V7 control 6.7 recommends that organisations “On a regular basis, review logs to identify anomalies or abnormal events....