Summary: Minimize the attack surface and the opportunities for attackers to manipulate human behavior through their interaction with web browsers and email systems. Obviously, web browsers and email clients are…
Month: April 2019
Summary: Collect, manage, and analyze audit logs of events that could help detect, understand, or recover from an attack. This control is important because a lack of logging not only…
Summary: Establish, implement, and actively manage (track, report on, correct) the security configuration of mobile devices, laptops, servers, and workstations using a rigorous configuration management and change control process in…
Summary: The processes and tools used to track/control/prevent/correct the use, assignment, and configuration of administrative priveleges on computers, networks, and applications. This control is important as an administrative user or…