Controls
The AWS provider has 2,323 controls:
Control Type
Mod
Control Category
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.03 Ensure the Use of Dedicated Administrative Accounts
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.05 Use Multifactor Authentication For All Administrative Access
CIS > Controls v7 > 16 Account Monitoring and Control > 16.09 Disable Dormant Accounts
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.04 Use Unique Passwords
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.03 Ensure the Use of Dedicated Administrative Accounts
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.05 Use Multifactor Authentication For All Administrative Access
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.05 Use Multifactor Authentication For All Administrative Access
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.03 Enable Detailed Logging
CIS > Controls v7 > 19 Incident Response and Management
CIS > Controls v7 > 19 Incident Response and Management
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.02 Activate Audit Logging
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.06 Protect Information through Access Control Lists
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.05 Central Log Management
CIS > Controls v7 > 11 Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches > 11.02 Document Traffic Configuration Rules
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.02 Activate Audit Logging
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.02 Activate Audit Logging
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.05 Central Log Management
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.09 Log and Alert on Unsuccessful Administrative Account Login
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.02 Activate Audit Logging
CIS > Controls v7 > 11 Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches > 11.02 Document Traffic Configuration Rules
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.08 Log and Alert on Changes to Administrative Group Membership
CIS > Controls v7 > 11 Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches > 11.03 Use Automated Tools to Verify Standard Device Configurations and Detect Changes
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.02 Activate Audit Logging
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.02 Activate Audit Logging
CIS > Controls v7 > 05 Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers > 5.05 Implement Automated Configuration Monitoring Systems
CIS > Controls v7 > 09 Limitation and Control of Network Ports, Protocols, and Services > 9.02 Ensure Only Approved Ports, Protocols and Services Are Running
CIS > Controls v7 > 09 Limitation and Control of Network Ports, Protocols, and Services > 9.02 Ensure Only Approved Ports, Protocols and Services Are Running
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.06 Protect Information through Access Control Lists
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.06 Protect Information through Access Control Lists
CIS > Controls v7 > 19 Incident Response and Management > 19.03 Designate Management Personnel to Support Incident Handling
CIS > Controls v7 > 19 Incident Response and Management
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.03 Ensure the Use of Dedicated Administrative Accounts
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.05 Use Multifactor Authentication For All Administrative Access
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.05 Use Multifactor Authentication For All Administrative Access
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.03 Ensure the Use of Dedicated Administrative Accounts
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.04 Use Unique Passwords
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.05 Use Multifactor Authentication For All Administrative Access
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 16 Account Monitoring and Control > 16.09 Disable Dormant Accounts
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know
CIS > Controls v7 > 19 Incident Response and Management
CIS > Controls v7 > 13 Data Protection
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.06 Protect Information through Access Control Lists
CIS > Controls v7 > 16 Account Monitoring and Control > 16.02 Configure Centralized Point of Authentication
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.08 Encrypt Sensitive Information at Rest
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.04 Encrypt All Sensitive Information in Transit
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.06 Protect Information through Access Control Lists
CIS > Controls v7 > 05 Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers > 5.01 Establish Secure Configurations
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.06 Protect Information through Access Control Lists
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.08 Encrypt Sensitive Information at Rest
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.08 Encrypt Sensitive Information at Rest
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.02 Activate Audit Logging
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.06 Protect Information through Access Control Lists
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.05 Central Log Management
CIS > Controls v7 > 11 Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches > 11.02 Document Traffic Configuration Rules
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.02 Activate Audit Logging
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.08 Encrypt Sensitive Information at Rest
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.08 Encrypt Sensitive Information at Rest
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.02 Activate Audit Logging
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.03 Enable Detailed Logging
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.03 Enable Detailed Logging
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.05 Central Log Management
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.09 Log and Alert on Unsuccessful Administrative Account Login
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.02 Activate Audit Logging
CIS > Controls v7 > 11 Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches > 11.02 Document Traffic Configuration Rules
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.02 Activate Audit Logging
CIS > Controls v7 > 11 Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches > 11.03 Use Automated Tools to Verify Standard Device Configurations and Detect Changes
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.02 Activate Audit Logging
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.02 Activate Audit Logging
CIS > Controls v7 > 05 Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers > 5.05 Implement Automated Configuration Monitoring Systems
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.02 Activate Audit Logging
CIS > Controls v7 > 09 Limitation and Control of Network Ports, Protocols, and Services > 9.02 Ensure Only Approved Ports, Protocols and Services Are Running
CIS > Controls v7 > 09 Limitation and Control of Network Ports, Protocols, and Services > 9.02 Ensure Only Approved Ports, Protocols and Services Are Running
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.06 Protect Information through Access Control Lists
CIS v1.4 > 5 - Networking > 5.04 - Ensure routing tables for VPC peering are 'least access' (Manual)
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.06 Protect Information through Access Control Lists
CIS > Controls v7 > 19 Incident Response and Management > 19.03 Designate Management Personnel to Support Incident Handling
CIS > Controls v7 > 19 Incident Response and Management
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.03 Ensure the Use of Dedicated Administrative Accounts
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.05 Use Multifactor Authentication For All Administrative Access
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.05 Use Multifactor Authentication For All Administrative Access
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.03 Ensure the Use of Dedicated Administrative Accounts
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.04 Use Unique Passwords
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.05 Use Multifactor Authentication For All Administrative Access
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 16 Account Monitoring and Control > 16.09 Disable Dormant Accounts
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know
CIS > Controls v7 > 13 Data Protection
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.06 Protect Information through Access Control Lists
CIS > Controls v7 > 16 Account Monitoring and Control > 16.02 Configure Centralized Point of Authentication
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.04 Encrypt All Sensitive Information in Transit
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.06 Protect Information through Access Control Lists
CIS > Controls v7 > 05 Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers > 5.01 Establish Secure Configurations
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.06 Protect Information through Access Control Lists
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.08 Encrypt Sensitive Information at Rest
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.08 Encrypt Sensitive Information at Rest
CIS > Controls v7 > 03 Continuous Vulnerability Management > 3.05 Deploy Automated Software Patch Management Tools
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.06 Protect Information through Access Control Lists
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.08 Encrypt Sensitive Information at Rest
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.02 Activate Audit Logging
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.06 Protect Information through Access Control Lists
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.05 Central Log Management
CIS > Controls v7 > 11 Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches > 11.02 Document Traffic Configuration Rules
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.02 Activate Audit Logging
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.08 Encrypt Sensitive Information at Rest
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.08 Encrypt Sensitive Information at Rest
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.02 Activate Audit Logging
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.03 Enable Detailed Logging
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.03 Enable Detailed Logging
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.05 Central Log Management
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.09 Log and Alert on Unsuccessful Administrative Account Login
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.02 Activate Audit Logging
CIS > Controls v7 > 11 Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches > 11.02 Document Traffic Configuration Rules
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.02 Activate Audit Logging
CIS > Controls v7 > 11 Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches > 11.03 Use Automated Tools to Verify Standard Device Configurations and Detect Changes
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.02 Activate Audit Logging
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.02 Activate Audit Logging
CIS > Controls v7 > 05 Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers > 5.05 Implement Automated Configuration Monitoring Systems
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.02 Activate Audit Logging
CIS > Controls v7 > 11 Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches > 11.03 Use Automated Tools to Verify Standard Device Configurations and Detect Changes
CIS > Controls v7 > 09 Limitation and Control of Network Ports, Protocols, and Services > 9.02 Ensure Only Approved Ports, Protocols and Services Are Running
CIS > Controls v7 > 09 Limitation and Control of Network Ports, Protocols, and Services > 9.02 Ensure Only Approved Ports, Protocols and Services Are Running
CIS > Controls v7 > 09 Limitation and Control of Network Ports, Protocols, and Services > 9.02 Ensure Only Approved Ports, Protocols and Services Are Running
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.06 Protect Information through Access Control Lists
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.06 Protect Information through Access Control Lists
CIS > Controls v7 > 09 Limitation and Control of Network Ports, Protocols, and Services > 9.02 Ensure Only Approved Ports, Protocols and Services Are Running
CIS > Controls v7 > 19 Incident Response and Management > 19.03 Designate Management Personnel to Support Incident Handling
CIS > Controls v7 > 19 Incident Response and Management
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.03 Ensure the Use of Dedicated Administrative Accounts
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.05 Use Multifactor Authentication For All Administrative Access
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.05 Use Multifactor Authentication For All Administrative Access
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.03 Ensure the Use of Dedicated Administrative Accounts
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.04 Use Unique Passwords
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.05 Use Multifactor Authentication For All Administrative Access
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 16 Account Monitoring and Control > 16.09 Disable Dormant Accounts
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know
CIS > Controls v7 > 13 Data Protection
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.06 Protect Information through Access Control Lists
CIS > Controls v7 > 16 Account Monitoring and Control > 16.02 Configure Centralized Point of Authentication
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.04 Encrypt All Sensitive Information in Transit
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.06 Protect Information through Access Control Lists
CIS > Controls v7 > 05 Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers > 5.01 Establish Secure Configurations
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.06 Protect Information through Access Control Lists
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.08 Encrypt Sensitive Information at Rest
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.08 Encrypt Sensitive Information at Rest
CIS > Controls v7 > 03 Continuous Vulnerability Management > 3.05 Deploy Automated Software Patch Management Tools
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.06 Protect Information through Access Control Lists
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.08 Encrypt Sensitive Information at Rest
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.02 Activate Audit Logging
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs
CIS > Controls v7 > 11 Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches > 11.02 Document Traffic Configuration Rules
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.02 Activate Audit Logging
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.08 Encrypt Sensitive Information at Rest
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.08 Encrypt Sensitive Information at Rest
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.02 Activate Audit Logging
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.03 Enable Detailed Logging
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.03 Enable Detailed Logging
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.05 Central Log Management
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.09 Log and Alert on Unsuccessful Administrative Account Login
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 16 Account Monitoring and Control
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.02 Activate Audit Logging
CIS > Controls v7 > 11 Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches > 11.02 Document Traffic Configuration Rules
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.02 Activate Audit Logging
CIS > Controls v7 > 11 Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches > 11.03 Use Automated Tools to Verify Standard Device Configurations and Detect Changes
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.02 Activate Audit Logging
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.02 Activate Audit Logging
CIS > Controls v7 > 05 Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers > 5.05 Implement Automated Configuration Monitoring Systems
CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.02 Activate Audit Logging
CIS > Controls v7 > 11 Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches > 11.03 Use Automated Tools to Verify Standard Device Configurations and Detect Changes
CIS > Controls v7 > 09 Limitation and Control of Network Ports, Protocols, and Services > 9.02 Ensure Only Approved Ports, Protocols and Services Are Running
CIS > Controls v7 > 09 Limitation and Control of Network Ports, Protocols, and Services > 9.02 Ensure Only Approved Ports, Protocols and Services Are Running
CIS > Controls v7 > 09 Limitation and Control of Network Ports, Protocols, and Services > 9.02 Ensure Only Approved Ports, Protocols and Services Are Running
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.06 Protect Information through Access Control Lists
CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.06 Protect Information through Access Control Lists
CIS > Controls v7 > 09 Limitation and Control of Network Ports, Protocols, and Services > 9.02 Ensure Only Approved Ports, Protocols and Services Are Running
to
of
Page
of