1. Matware Defense 2. Boundary Defense 3. Wireless Access Control 4. Application Software Security 5. Inventory & Authorization of Devices 6. Inventory & Authorization of Software 7. Secure Config of Mobile Devices, Laptops, Workstations, Servers 8. Secure configurations for network devices 9. Continuous Vulnerability Assessment & Remediation 10. Limitation & Control of Network Ports, Protocols, and Services 11. Controlled Use of Administrative Privileges 12. Controlled Access Based on Need to Know 13. Account Monitoring and Control 14. Secure Network Engineering 15. Data Protection.
展开▼