Configuration Management

Mechanisms exist to configure systems to generate an alert when the unauthorized installation of software is detected.


Login

Configuration Management

Mechanisms exist to configure systems to prevent the installation of software, unless the action is performed by a privileged user or service.


Login

Configuration Management

Automated mechanisms exist to monitor, enforce and report on configurations for endpoint devices.


Login

Configuration Management

Mechanisms exist to implement Zero-Touch Provisioning (ZTP), or similar technology, to automatically and securely configure devices upon being added to a network.


Login

Configuration Management

Mechanisms exist to configure systems, applications and processes to restrict access to sensitive/regulated data.


Login

Configuration Management

Automated mechanisms exist to generate event logs whenever sensitive/regulated data is collected, created, updated, deleted and/or archived.


Login

Continuous Monitoring

Mechanisms exist to facilitate the implementation of enterprise-wide monitoring controls.


Login

Continuous Monitoring

Mechanisms exist to implement Intrusion Detection / Prevention Systems (IDS / IPS) technologies on critical systems, key network segments and network choke points.


Login

Continuous Monitoring

Mechanisms exist to utilize a Security Incident Event Manager (SIEM), or similar automated tool, to support near real-time analysis and incident escalation.


Login

Continuous Monitoring

Mechanisms exist to continuously monitor inbound and outbound communications traffic for unusual or unauthorized activities or conditions.


Login