CSC V8 control 1.5 – Use a Passive Asset Discovery Tool Overview CSC V8 control 1.5 recommends that organisations “Use a passive discovery tool to identify assets connected to the enterprise’s...
CSC V8 control 2 – Inventory and Control of Software Assets Overview CSC V8 control 2 recommends that organisations “Actively manage (inventory, track, and correct) all software (operating systems and applications)...
CSC V8 control 2.1 – Establish and Maintain a Software Inventory Overview CSC V8 control 2.1 recommends that organisations “Establish and maintain a detailed inventory of all licensed software installed on...
CSC V8 control 2.2 – Ensure Authorized Software is Currently Supported Overview CSC V8 control 2.2 recommends that organisations “Ensure that only currently supported software is designated as authorized in the...
CSC V8 control 2.3 – Address Unauthorized Software Overview CSC V8 control 2.3 recommends that organisations “Ensure that unauthorized software is either removed from use on enterprise assets...
CSC V8 control 2.4 – Utilize Automated Software Inventory Tools Overview CSC V8 control 2.4 recommends that organisations “Utilize software inventory tools, when possible, throughout the enterprise to automate the...
CSC V8 control 2.5 – Allowlist Authorized Software Overview CSC V8 control 2.5 recommends that organisations “Use technical controls, such as application allowlisting, to ensure that only authorized...
CSC V8 control 2.6 – Allowlist Authorized Libraries Overview CSC V8 control 2.6 recommends that organisations ” Use technical controls to ensure that only authorized software libraries, such...
CSC V8 control 2.7 – Allowlist Authorized Scripts Overview CSC V8 control 2.7 recommends that organisations “Use technical controls, such as digital signatures and version control, to ensure...
CSC V8 control 3 – Data Protection Overview CSC V8 control 3 recommends that organisations “Develop processes and technical controls to identify, classify, securely handle, retain, and...