CSC V7 control 8.8 – Enable Command-line Audit Logging Overview CSC V7 control 8.8 recommends that organisations “Enable command-line audit logging for command shells, such as Microsoft Powershell and...
CSC V7 control 9 – Limitation and Control of Network Ports, Protocols, and Services Overview CSC V7 control 9 recommends that organisations “ Note CSC V7 places this control in the category of “Limitation...
CSC V7 control 9.1 – Associate Active Ports, Services and Protocols to Asset Inventory Overview CSC V7 control 9.1 recommends that organisations “Associate active ports, services and protocols to the hardware assets in the...
CSC V7 control 9.2 – Ensure Only Approved Ports, Protocols and Services Are Running Overview CSC V7 control 9.2 recommends that organisations “Ensure that only network ports, protocols, and services listening on a system...
CSC V7 control 7.7 – Use of DNS Filtering Services Overview CSC V7 control 7.7 recommends that organisations “Use DNS filtering services to help block access to known malicious domains....
CSC V7 control 9.3 – Perform Regular Automated Port Scans Overview CSC V7 control 9.3 recommends that organisations “Perform automated port scans on a regular basis against all systems and...
CSC V7 control 7.8 – Implement DMARC and Enable Receiver-Side Verification Overview CSC V7 control 7.8 recommends that organisations “To lower the chance of spoofed or modified emails from valid domains,...
CSC V7 control 9.4 – Apply Host-based Firewalls or Port Filtering Overview CSC V7 control 9.4 recommends that organisations “Apply host-based firewalls or port filtering tools on end systems, with a...
CSC V7 control 7.9 – Block Unnecessary File Types Overview CSC V7 control 7.9 recommends that organisations “Block all e-mail attachments entering the organization’s e-mail gateway if the file...
CSC V7 control 9.5 – Implement Application Firewalls Overview CSC V7 control 9.5 recommends that organisations “Place application firewalls in front of any critical servers to verify and...