CSC V7 control 5.1 – Establish Secure Configurations Overview CSC V7 control 5.1 recommends that organisations “Maintain documented, standard security configuration standards for all authorized operating systems and...
CSC V7 control 7.2 – Disable Unnecessary or Unauthorized Browser or Email Client Plugins Overview CSC V7 control 7.2 recommends that organisations “Uninstall or disable any unauthorized browser or email client plugins or add-on...
CSC V7 control 3.4 – Deploy Automated Operating System Patch Management Tools Overview CSC V7 control 3.4 recommends that organisations “Deploy automated software update tools in order to ensure that the operating...
CSC V7 control 5.2 – Maintain Secure Images Overview CSC V7 control 5.2 recommends that organisations “Maintain secure images or templates for all systems in the enterprise based...
CSC V7 control 7.3 – Limit Use of Scripting Languages in Web Browsers and Email Clients Overview CSC V7 control 7.3 recommends that organisations “Ensure that only authorized scripting languages are able to run in all...
CSC V7 control 3.5 – Deploy Automated Software Patch Management Tools Overview CSC V7 control 3.5 recommends that organisations “Deploy automated software update tools in order to ensure that third-party software...
CSC V7 control 5.3 – Securely Store Master Images Overview CSC V7 control 5.3 recommends that organisations “Store the master images and templates on securely configured servers, validated with...
CSC V7 control 7.4 – Maintain and Enforce Network-Based URL Filters Overview CSC V7 control 7.4 recommends that organisations “Enforce network-based URL filters that limit a system’s ability to connect to...
CSC V7 control 3.6 – Compare Back-to-back Vulnerability Scans Overview CSC V7 control 3.6 recommends that organisations “Regularly compare the results from back-to-back vulnerability scans to verify that vulnerabilities...
CSC V7 control 5.4 – Deploy System Configuration Management Tools Overview CSC V7 control 5.4 recommends that organisations “Deploy system configuration management tools that will automatically enforce and redeploy configuration...