CAS_Implementation_Group_1_Audit_File.audit | |
CIS Control 1 (1.4) Maintain Detailed Asset Inventory | CONFIGURATION MANAGEMENT |
CIS Control 1 (1.6) Ensure that unauthorized assets are removed, quarantined or the inventory is updated | CONFIGURATION MANAGEMENT |
CIS Control 2 (2.1(a)) Maintain and Inventory of Authorized Software | CONFIGURATION MANAGEMENT |
CIS Control 2 (2.1(b)) Maintain and Inventory of Authorized Software | CONFIGURATION MANAGEMENT |
CIS Control 3 (3.4(a)) Deploy Automated Operating System Patch Management Tools | SYSTEM AND INFORMATION INTEGRITY |
CIS Control 3 (3.4(b)) Deploy Automated Operating System Patch Management Tools | SYSTEM AND INFORMATION INTEGRITY |
CIS Control 3 (3.4(c)) Deploy Automated Operating System Patch Management Tools | SYSTEM AND INFORMATION INTEGRITY |
CIS Control 3 (3.6(a)) Deploy Automated Software Patch Management Tools | SYSTEM AND INFORMATION INTEGRITY |
CIS Control 3 (3.6(b)) Deploy Automated Software Patch Management Tools | SYSTEM AND INFORMATION INTEGRITY |
CIS Control 4 (4.2) Change Default Passwords | IDENTIFICATION AND AUTHENTICATION |
CIS Control 4 (4.3) Ensure the Use of Dedicated Administrative Accounts | ACCESS CONTROL |
CIS Control 5 (5.1) Establish Secure Configurations | CONFIGURATION MANAGEMENT |
CIS Control 6 (6.2(a)) Activate Audit Logging | AUDIT AND ACCOUNTABILITY |
CIS Control 6 (6.2(b)) Activate Audit Logging | AUDIT AND ACCOUNTABILITY |
CIS Control 7 (7.7) Use of DNS Filtering Services | ACCESS CONTROL |
CIS Control 8 (8.4) Configure Anti-Malware Scanning of Removable Media | SYSTEM AND INFORMATION INTEGRITY |
CIS Control 8 (8.5) Configure Devices to Not Auto Run Content | |
CIS Control 10 (10.1) Ensure Regular Automated Backups | CONTINGENCY PLANNING |
CIS Control 10 (10.2) Perform Complete System Backups | CONTINGENCY PLANNING |
CIS Control 10 (10.4) Protect Backups | CONTINGENCY PLANNING |
CIS Control 10 (10.5) Ensure All Backups Have at Least One Offline Backup Destination | CONTINGENCY PLANNING |
CIS Control 12 (12.1) Maintain an Inventory of Network Boundaries | SECURITY ASSESSMENT AND AUTHORIZATION |
CIS Control 12 (12.4(a)) Deny Communications Over Unauthorized Ports | SYSTEM AND COMMUNICATIONS PROTECTION |
CIS Control 12 (12.4(b)) Deny Communications Over Unauthorized Ports | SYSTEM AND COMMUNICATIONS PROTECTION |
CIS Control 13 (13.1) Maintain an Inventory of Sensitive Information | CONFIGURATION MANAGEMENT |
CIS Control 13 (13.2) Remove Sensitive Data or Systems Not Regularly Accessed by Organization | CONFIGURATION MANAGEMENT |
CIS Control 13 (13.6) Encrypt Mobile Device Data | ACCESS CONTROL |
CIS Control 14 (14.6) Protect Information Through Access Control Lists | ACCESS CONTROL |
CIS Control 16 (16.8(a)) Disable Any Unassociated Accounts | ACCESS CONTROL |
CIS Control 16 (16.8(b)) Disable Any Unassociated Accounts | ACCESS CONTROL |