The Critical Security Controls (CSC) – 5

Critical Security Controls – Control 5 – Configuration of the Operating System Control 5 requires the creation of secure baseline configurations for each of these systems. These configurations should dictate the removal of insecure or outdated settings or software. Using a standards-based configuration scanner then continuously comparing the configuration of network-attached systems against this/these baselines…