Куда я попал?
CIS Critical Security Controls v7.1 (SANS Top 20)
Framework
CSC 5
Для проведения оценки соответствия по документу войдите в систему.
Список требований
-
CSC 5.1 Establish Secure Configurations
Maintain documented security configuration standards for all authorized operating systems and software.Обязательно для implementation Group 1 2 3 -
CSC 5.2 Maintain Secure Images
Maintain secure images or templates for all systems in the enterprise based on the organization's approved configuration standards. Any new system deployment or existing system that becomes compromised should be imaged using one of those images or templates.Обязательно для implementation Group 2 3 -
CSC 5.5 Implement Automated Configuration Monitoring Systems
Utilize a Security Content Automation Protocol (SCAP) compliant configuration monitoring system to verify all security configuration elements, catalog approved exceptions, and alert when unauthorized changes occur.Обязательно для implementation Group 2 3