Please enable JavaScript.
Coggle requires JavaScript to display documents.
CheckList - Coggle Diagram
CheckList
Center for Internet Security — CIS Critical Security Controls (CIS First 5 / CIS Top 20)
C1:Inventory and Control of Hardware Assets
C2:Inventory and Control of Software Assets
C3:Continuous Vulnerability Management
C4:Controlled Use of Administrative Privileges
C5:Secure Configuration for Hardware and Software on
Mobile Devices, Laptops, Workstations, and Servers
C6:Maintenance, Monitoring, and Analysis of Audit Logs
C7:Email and Web Browser Protections
C8:Malware Defenses
C9:Limitation and Control of Ports, Protocols, and Services
C10:Data Recovery Capabilities
C11:Secure Configuration for Network Devices Such as Firewalls, Routers, and Switches
C12:Boundary Defense
C13:Data Protection
C14:Controlled Access Based on the Need to Know
C15:Wireless Access Control
C16:Account Monitoring and Control
C17:Implement a Security Awareness and Training Program
C18:Application Software Security
C19:Incident Response and Management
C20:Penetration Tests and Red Team Exercises
3rd party Vendor :ACADIA Soft
Standardized Information Gathering (SIG)
Link Title
Risk Management
Security Policy
Organizational Security
Asset and Info Management
Human Resource Security
Physical and Environmental Security
Operations Management
Access Control
Application Security
Incident Event and Communications Management
Business Resiliency
Compliance
End User Device Security
Network Security
Privacy
Threat Management
Server Security
Cloud Hosting
Information Security Policy
ISO 27001 Control
Cloud Security Alliance — Consensus Assessments Initiative Questionnaire (CAIQ)
National Institute of Standards and Technology — NIST (800–171)
Vendor Security Alliance — VSA Questionnaire (VSAQ)