Center for Internet Security: The 18 Critical Security Controls

The guidelines consist of 18 key actions, called critical security controls (CSC), that organizations should take to mitigate the most common cyber-attacks. These controls are designed so that primarily automated means can be used to implement, enforce, and monitor them, with achievement of the Top 5 eliminating the vast majority of an organization’s vulnerabilities.

This document contains is a list of the controls and a brief description of how Darktrace’s products and coverage areas can be utilized to support them.

Datenblatt

Video

Center for Internet Security: The 18 Critical Security Controls

Center for Internet Security: The 18 Critical Security Controls

The guidelines consist of 18 key actions, called critical security controls (CSC), that organizations should take to mitigate the most common cyber-attacks. These controls are designed so that primarily automated means can be used to implement, enforce, and monitor them, with achievement of the Top 5 eliminating the vast majority of an organization’s vulnerabilities.

This document contains is a list of the controls and a brief description of how Darktrace’s products and coverage areas can be utilized to support them.

Herunterladen
Datenblatt
Keine Anmeldung erforderlich
Huch! Beim Absenden des Formulars ist etwas schief gelaufen.
8,900+ companies trust darktrace

This white paper includes

This resource includes

This case study includes

This data sheet includes

diese ressource weitergeben