CIS Controls v8.0

From GCA ACT
Jump to navigationJump to search
CIS - 1 - Inventory and Control of Enterprise Assets
CIS - 10 - Malware Defenses
CIS - 11 - Data Recovery
CIS - 12 - Network Infrastructure Management
CIS - 13 - Network Monitoring and Defense
CIS - 14 - Security Awareness and Skills Training
CIS - 15 - Service Provider Management
CIS - 16 - Application Software Security
CIS - 17 - Incident Response Management
CIS - 18 - Penetration Testing
CIS - 2 - Inventory and Control of Software Assets
CIS - 3 - Data Protection
CIS - 4 - Secure Configuration of Enterprise Assets and Software
CIS - 5 - Account Management
CIS - 6 - Access Control Management
CIS - 7 - Continuous Vulnerability Management
CIS - 8 - Audit Log Management
CIS - 9 - Email and Web Browser Protections
Retrieved from ‘https://act.gcai.dev/index.php?title=CIS_Controls_v8.0&oldid=852’

Navigation menu

Page actions

  • Page
  • Discussion
  • Read
  • View source
  • History

Page actions

  • Page
  • Discussion
  • More
  • Tools

Personal tools

  • Create account
  • Log in

Navigation

  • ACT Home
  • Safe Shopping Guide
  • Find Your Community
  • Find Tools
  • Report Cybercrime
  • Top Threats
  • Enhanced Protection
  • Advanced Security
  • Get Help
  • GET INVOLVED
  • Terms of Use
  • UCoC
  • Disclaimers
  • Privacy Policy
  • Help about MediaWiki

Tools

  • What links here
  • Related changes
  • Special pages
  • Printable version
  • Permanent link
  • Page information
  • Browse properties
Powered by MediaWikiPowered by BlueSpicePowered by Semantic MediaWiki
  • This page was last modified on 27 June 2023, at 22:42.
  • Privacy policy
  • About GCA ACT
  • Disclaimers