CSC V7 control 7.5 – Subscribe to URL-Categorization service Overview CSC V7 control 7.5 recommends that organisations “Subscribe to URL categorization services to ensure that they are up-to-date with...
CSC V7 control 3.7 – Utilize a Risk-rating Process Overview CSC V7 control 3.7 recommends that organisations “Utilize a risk-rating process to prioritize the remediation of discovered vulnerabilities. Note...
CSC V7 control 5.5 – Implement Automated Configuration Monitoring Systems Overview CSC V7 control 5.5 recommends that organisations “Utilize a Security Content Automation Protocol (SCAP) compliant configuration monitoring system to...
CSC V7 control 7.6 – Log all URL requests Overview CSC V7 control 7.6 recommends that organisations “Log all URL requests from each of the organization’s systems, whether onsite...
CSC V7 control 4 – Controlled Use of Administrative Privileges Overview CSC V7 control 4 recommends that organisations “ Note CSC V7 places this control in the category of “Controlled...
CSC V7 control 6 – Maintenance, Monitoring and Analysis of Audit Logs Overview CSC V7 control 6 recommends that organisations “ Note CSC V7 places this control in the category of “Maintenance,...
CSC V7 control 4.1 – Maintain Inventory of Administrative Accounts Overview CSC V7 control 4.1 recommends that organisations “Use automated tools to inventory all administrative accounts, including domain and local...
CSC V7 control 6.1 – Utilize Three Synchronized Time Sources Overview CSC V7 control 6.1 recommends that organisations “Use at least three synchronized time sources from which all servers and...
CSC V7 control 4.2 – Change Default Passwords Overview CSC V7 control 4.2 recommends that organisations “Before deploying any new asset, change all default passwords to have values...
CSC V7 control 6.2 – Activate audit logging Overview CSC V7 control 6.2 recommends that organisations “Ensure that local logging has been enabled on all systems and networking...