![]() The CSC provides effective responses against the latest and common threats with a strong emphasis on known actions that provide results. These controls are only useful if we take the time to implement and follow them.Ĭompliance with Established Security Architecture Standards They are designed to help organizations protect their information systems. The 20 CSC are a set of technical controls that can help defend systems. ![]() The Center for Internet Security (CIS) 20 Critical Security Controls (CSC) provides a bridge between high level architectural concepts and actual implementation. For example, how does one translate an ISO 27002 coverage area such as asset management into a checklist of steps to actually perform asset management within an organization? One of the challenges of an information security program is how to translate the high level requirements of an Infosec standard such as ISO 27002 into an effective operational implementation plan.
0 Comments
Leave a Reply. |