User contributions for Globalcyberalliance
From GCA ACT
Jump to navigationJump to search
23 October 2023
- 03:2403:24, 23 October 2023 diff hist +63 N Category:CIS - 2.1 - Identify - Applications - Establish and Maintain a Software Inventory Created via script current
- 03:2403:24, 23 October 2023 diff hist +48 N Category:CIS - 6.2 - Protect - Users - Establish an Access Revoking Process Created via script current
- 03:2403:24, 23 October 2023 diff hist +44 N Category:CIS - 8.12 - Detect - Data - Collect Service Provider Logs Created via script current
- 03:2403:24, 23 October 2023 diff hist +32 N Category:CIS - 18 - Penetration Testing Created via script current
- 03:2403:24, 23 October 2023 diff hist +44 N Category:CIS - 8.4 - Protect - Network - Standardize Time Synchronization Created via script current
- 03:2403:24, 23 October 2023 diff hist +53 N Category:CIS - 16.14 - Protect - Applications - Conduct Threat Modeling Created via script current
- 03:2403:24, 23 October 2023 diff hist +37 N Category:CIS - 11.2 - Recover - Data - Perform Automated Backups Created via script current
- 03:2403:24, 23 October 2023 diff hist +53 N Category:CIS - 16.11 - Protect - Applications - Leverage Vetted Modules or Services for Application Security Components Created via script current
- 03:2403:24, 23 October 2023 diff hist +32 N Category:CIS - 1 - Inventory and Control of Enterprise Assets Created via script current
- 03:2403:24, 23 October 2023 diff hist +57 N Category:CIS - 12.1 - Protect - Network - Ensure Network Infrastructure is Up-to-Date Created via script current
- 03:2403:24, 23 October 2023 diff hist +43 N Category:CIS - 18.1 - Identify - Establish and Maintain a Penetration Testing Program Created via script current
- 03:2403:24, 23 October 2023 diff hist +37 N Category:CIS - 11.1 - Recover - Data - Establish and Maintain a Data Recovery Process Created via script current
- 03:2403:24, 23 October 2023 diff hist +63 N Category:CIS - 2.3 - Respond - Applications - Address Unauthorized Software Created via script current
- 03:2403:24, 23 October 2023 diff hist +32 N Category:CIS - 2 - Inventory and Control of Software Assets Created via script current
- 03:2403:24, 23 October 2023 diff hist +57 N Category:CIS - 12.6 - Protect - Network - Use of Secure Network Management and Communication Protocols Created via script current
- 03:2403:24, 23 October 2023 diff hist 0 N Category:CIS Controls - v8.0 Created via script current
- 03:2403:24, 23 October 2023 diff hist +41 N Category:CIS - 5.5 - Identify - Users - Establish and Maintain an Inventory of Service Accounts Created via script current
- 03:2403:24, 23 October 2023 diff hist +44 N Category:CIS - 8.3 - Protect - Network - Ensure Adequate Audit Log Storage Created via script current
- 03:2403:24, 23 October 2023 diff hist +38 N Category:CIS - 3.7 - Identify - Data - Establish and Maintain a Data Classification Scheme Created via script current
- 03:2403:24, 23 October 2023 diff hist +57 N Category:CIS - 9.5 - Protect - Network - Implement DMARC Created via script current
- 03:2403:24, 23 October 2023 diff hist +77 N Category:CIS - 4.6 - Protect - Network - Securely Manage Enterprise Assets and Software Created via script current
- 03:2403:24, 23 October 2023 diff hist +65 N Category:CIS - 1.4 - Identify - Devices - Use Dynamic Host Configuration Protocol (DHCP) Logging to Update Enterprise Asset Inventory Created via script current
- 03:2403:24, 23 October 2023 diff hist +63 N Category:CIS - 2.2 - Identify - Applications - Ensure Authorized Software is Currently Supported Created via script current
- 03:2403:24, 23 October 2023 diff hist +32 N Category:CIS - 8 - Audit Log Management Created via script current
- 03:2403:24, 23 October 2023 diff hist +77 N Category:CIS - 4.1 - Respond - Devices - Enforce Automatic Device Lockout on Portable End-User Devices Created via script current
- 03:2403:24, 23 October 2023 diff hist +48 N Category:CIS - 6.1 - Protect - Users - Establish an Access Granting Process Created via script current
- 03:2403:24, 23 October 2023 diff hist +62 N Category:CIS - 14.5 - Protect - Train Workforce Members on Causes of Unintentional Data Exposure Created via script current
- 03:2403:24, 23 October 2023 diff hist +40 N Category:CIS - 10.3 - Protect - Devices - Disable Autorun and Autoplay for Removable Media Created via script current
- 03:2403:24, 23 October 2023 diff hist +38 N Category:CIS - 3.1 - Identify - Data - Establish and Maintain a Data Management Process Created via script current
- 03:2403:24, 23 October 2023 diff hist +52 N Category:CIS - 17.9 - Recover - Establish and Maintain Security Incident Thresholds Created via script current
- 03:2403:24, 23 October 2023 diff hist +38 N Category:CIS - 3.5 - Protect - Data - Securely Dispose of Data Created via script current
- 03:2403:24, 23 October 2023 diff hist +54 N Category:CIS - 13.5 - Protect - Devices - Manage Access Control for Remote Assets Created via script current
- 03:2403:24, 23 October 2023 diff hist +63 N Category:CIS - 2.7 - Protect - Applications - Allowlist Authorized Scripts Created via script current
- 03:2403:24, 23 October 2023 diff hist +38 N Category:CIS - 3.6 - Protect - Devices - Encrypt Data on End-User Devices Created via script current
- 03:2403:24, 23 October 2023 diff hist +52 N Category:CIS - 17.5 - Respond - Assign Key Roles and Responsibilities Created via script current
- 03:2403:24, 23 October 2023 diff hist +62 N Category:CIS - 14.8 - Protect - Train Workforce on the Dangers of Connecting to and Transmitting Enterprise Data Over Insecure Networks Created via script current
- 03:2403:24, 23 October 2023 diff hist +58 N Category:CIS - 7.4 - Protect - Applications - Perform Automated Application Patch Management Created via script current
- 03:2403:24, 23 October 2023 diff hist +32 N Category:CIS - 12 - Network Infrastructure Management Created via script current
- 03:2403:24, 23 October 2023 diff hist +57 N Category:CIS - 9.1 - Protect - Applications - Ensure Use of Only Fully Supported Browsers and Email Clients Created via script current
- 03:2403:24, 23 October 2023 diff hist +52 N Category:CIS - 17.3 - Respond - Establish and Maintain an Enterprise Process for Reporting Incidents Created via script current
- 03:2403:24, 23 October 2023 diff hist +57 N Category:CIS - 9.2 - Protect - Network - Use DNS Filtering Services Created via script current
- 03:2403:24, 23 October 2023 diff hist +38 N Category:CIS - 3.11 - Protect - Data - Encrypt Sensitive Data at Rest Created via script current
- 03:2403:24, 23 October 2023 diff hist +51 N Category:CIS - 15.4 - Protect - Ensure Service Provider Contracts Include Security Requirements Created via script current
- 03:2403:24, 23 October 2023 diff hist +51 N Category:CIS - 15.2 - Identify - Establish and Maintain a Service Provider Management Policy Created via script current
- 03:2403:24, 23 October 2023 diff hist +54 N Category:CIS - 13.9 - Protect - Devices - Deploy Port-Level Access Control Created via script current
- 03:2403:24, 23 October 2023 diff hist +53 N Category:CIS - 16.3 - Protect - Applications - Perform Root Cause Analysis on Security Vulnerabilities Created via script current
- 03:2403:24, 23 October 2023 diff hist +38 N Category:CIS - 3.12 - Protect - Network - Segment Data Processing and Storage Based on Sensitivity Created via script current
- 03:2403:24, 23 October 2023 diff hist +43 N Category:CIS - 18.3 - Protect - Network - Remediate Penetration Test Findings Created via script current
- 03:2403:24, 23 October 2023 diff hist +44 N Category:CIS - 8.7 - Detect - Network - Collect URL Request Audit Logs Created via script current
- 03:2403:24, 23 October 2023 diff hist +40 N Category:CIS - 10.1 - Protect - Devices - Deploy and Maintain Anti-Malware Software Created via script current