User contributions for Globalcyberalliance
From GCA ACT
Jump to navigationJump to search
23 October 2023
- 03:2303:23, 23 October 2023 diff hist +44 N Category:CIS - 8.9 - Detect - Network - Centralize Audit Logs Created via script current
- 03:2303:23, 23 October 2023 diff hist +37 N Category:CIS - 11.5 - Recover - Data - Test Data Recovery Created via script current
- 03:2303:23, 23 October 2023 diff hist +32 N Category:CIS - 10 - Malware Defenses Created via script current
- 03:2303:23, 23 October 2023 diff hist +58 N Category:CIS - 7.7 - Respond - Applications - Remediate Detected Vulnerabilities Created via script current
- 03:2303:23, 23 October 2023 diff hist +48 N Category:CIS - 6.8 - Protect - Data - Define and Maintain Role-Based Access Control Created via script current
- 03:2303:23, 23 October 2023 diff hist +48 N Category:CIS - 6.3 - Protect - Users - Require MFA for Externally-Exposed Applications Created via script current
- 03:2303:23, 23 October 2023 diff hist +53 N Category:CIS - 16.7 - Protect - Applications - Use Standard Hardening Configuration Templates for Application Infrastructure Created via script current
- 03:2303:23, 23 October 2023 diff hist +51 N Category:CIS - 15.7 - Protect - Data - Securely Decommission Service Providers Created via script current
- 03:2303:23, 23 October 2023 diff hist +44 N Category:CIS - 8.1 - Protect - Network - Establish and Maintain an Audit Log Management Process Created via script current
- 03:2303:23, 23 October 2023 diff hist +32 N Category:CIS - 7 - Continuous Vulnerability Management Created via script current
- 03:2303:23, 23 October 2023 diff hist +53 N Category:CIS - 16.9 - Protect - Applications - Train Developers in Application Security Concepts and Secure Coding Created via script current
- 03:2303:23, 23 October 2023 diff hist +54 N Category:CIS - 13.11 - Detect - Network - Tune Security Event Alerting Thresholds Created via script current
- 03:2303:23, 23 October 2023 diff hist +57 N Category:CIS - 12.2 - Protect - Network - Establish and Maintain a Secure Network Architecture Created via script current
- 03:2303:23, 23 October 2023 diff hist +63 N Category:CIS - 2.6 - Protect - Applications - Allowlist Authorized Libraries Created via script current
- 03:2303:23, 23 October 2023 diff hist +44 N Category:CIS - 8.5 - Detect - Network - Collect Detailed Audit Logs Created via script current
- 03:2303:23, 23 October 2023 diff hist +48 N Category:CIS - 6.6 - Identify - Users - Establish and Maintain an Inventory of Authentication and Authorization Systems Created via script current
- 03:2303:23, 23 October 2023 diff hist +48 N Category:CIS - 6.4 - Protect - Users - Require MFA for Remote Network Access Created via script current
- 03:2303:23, 23 October 2023 diff hist +77 N Category:CIS - 4.1 - Protect - Applications - Establish and Maintain a Secure Configuration Process Created via script current
- 03:2303:23, 23 October 2023 diff hist +40 N Category:CIS - 10.6 - Protect - Devices - Centrally Manage Anti-Malware Software Created via script current
- 03:2303:23, 23 October 2023 diff hist +44 N Category:CIS - 8.8 - Detect - Devices - Collect Command-Line Audit Logs Created via script current
- 03:2303:23, 23 October 2023 diff hist +40 N Category:CIS - 10.2 - Protect - Devices - Configure Automatic Anti-Malware Signature Updates Created via script current
- 03:2303:23, 23 October 2023 diff hist +44 N Category:CIS - 8.1 - Protect - Network - Retain Audit Logs Created via script current
- 03:2303:23, 23 October 2023 diff hist +77 N Category:CIS - 4.2 - Protect - Network - Establish and Maintain a Secure Configuration Process for Network Infrastructure Created via script current
- 03:2303:23, 23 October 2023 diff hist +32 N Category:CIS - 4 - Secure Configuration of Enterprise Assets and Software Created via script current
- 03:2303:23, 23 October 2023 diff hist +37 N Category:CIS - 11.4 - Recover - Data - Establish and Maintain an Isolated Instance of Recovery Data Created via script current
- 03:2303:23, 23 October 2023 diff hist +32 N Category:CIS - 13 - Network Monitoring and Defense Created via script current
- 03:2303:23, 23 October 2023 diff hist +53 N Category:CIS - 16.6 - Protect - Applications - Establish and Maintain a Severity Rating System and Process for Application Vulnerabilities Created via script current
- 03:2303:23, 23 October 2023 diff hist +58 N Category:CIS - 7.2 - Respond - Applications - Establish and Maintain a Remediation Process Created via script current
- 03:2303:23, 23 October 2023 diff hist +57 N Category:CIS - 12.4 - Identify - Network - Establish and Maintain Architecture Diagram(s) Created via script current
- 03:2303:23, 23 October 2023 diff hist +63 N Category:CIS - 2.4 - Detect - Applications - Utilize Automated Software Inventory Tools Created via script current
- 03:2303:23, 23 October 2023 diff hist +53 N Category:CIS - 16.1 - Protect - Applications - Apply Secure Design Principles in Application Architectures Created via script current
- 03:2303:23, 23 October 2023 diff hist +58 N Category:CIS - 7.3 - Protect - Applications - Perform Automated Operating System Patch Management Created via script current
- 03:2303:23, 23 October 2023 diff hist +58 N Category:CIS - 7.6 - Identify - Applications - Perform Automated Vulnerability Scans of Externally-Exposed Enterprise Assets Created via script current
- 03:2303:23, 23 October 2023 diff hist +38 N Category:CIS - 3.3 - Protect - Data - Configure Data Access Control Lists Created via script current
- 03:2303:23, 23 October 2023 diff hist +58 N Category:CIS - 7.1 - Protect - Applications - Establish and Maintain a Vulnerability Management Process Created via script current
- 03:2303:23, 23 October 2023 diff hist +52 N Category:CIS - 17.1 - Respond - Designate Personnel to Manage Incident Handling Created via script current
- 03:2303:23, 23 October 2023 diff hist +40 N Category:CIS - 10.4 - Detect - Devices - Configure Automatic Anti-Malware Scanning of Removable Media Created via script current
- 03:2303:23, 23 October 2023 diff hist +57 N Category:CIS - 12.7 - Protect - Devices - Ensure Remote Devices Utilize a VPN and are Connecting to an Enterprise’s AAA Infrastructure Created via script current
- 03:2303:23, 23 October 2023 diff hist +43 N Category:CIS - 18.2 - Identify - Network - Perform Periodic External Penetration Tests Created via script current
- 03:2303:23, 23 October 2023 diff hist +77 N Category:CIS - 4.11 - Protect - Devices - Enforce Remote Wipe Capability on Portable End-User Devices Created via script current
- 03:2303:23, 23 October 2023 diff hist +62 N Category:CIS - 14.2 - Protect - Train Workforce Members to Recognize Social Engineering Attacks Created via script current
- 03:2303:23, 23 October 2023 diff hist +53 N Category:CIS - 16.4 - Protect - Applications - Establish and Manage an Inventory of Third-Party Software Components Created via script current
- 03:2303:23, 23 October 2023 diff hist +53 N Category:CIS - 16.12 - Protect - Applications - Implement Code-Level Security Checks Created via script current
- 03:2303:23, 23 October 2023 diff hist +52 N Category:CIS - 17.8 - Recover - Conduct Post-Incident Reviews Created via script current
- 03:2303:23, 23 October 2023 diff hist +54 N Category:CIS - 13.1 - Protect - Network - Perform Application Layer Filtering Created via script current
- 03:2303:23, 23 October 2023 diff hist +65 N Category:CIS - 1.5 - Detect - Devices - Use a Passive Asset Discovery Tool Created via script current
- 03:2303:23, 23 October 2023 diff hist +57 N Category:CIS - 9.7 - Protect - Network - Deploy and Maintain Email Server Anti-Malware Protections Created via script current
- 03:2303:23, 23 October 2023 diff hist +32 N Category:CIS - 16 - Application Software Security Created via script current
- 03:2303:23, 23 October 2023 diff hist +32 N Category:CIS - 6 - Access Control Management Created via script current
- 03:2303:23, 23 October 2023 diff hist +41 N Category:CIS - 5.3 - Respond - Users - Disable Dormant Accounts Created via script current