These security controls are mainly focused on probable attack scenarios such as inventories of authorized and unauthorized devices and software connected to networks (Stouffer et al, 2011), secure configuration for software and hardware on mobile and immobile devices, continuous vulnerability assessments and remediation, defenses against malware and viruses, application software security, data recovery capabilities, security based skills assessments and training of staff, security configurations and hardening of network hardware such as routers, firewalls and switches, controlled use of administrative accounts and privileges, and monitoring, maintenance and analysis of audit logs, need to know basis controlled access, monitoring of accounts and controls, prevention against data losses, management of incident response, secure network engineering and
These security controls are mainly focused on probable attack scenarios such as inventories of authorized and unauthorized devices and software connected to networks (Stouffer et al, 2011), secure configuration for software and hardware on mobile and immobile devices, continuous vulnerability assessments and remediation, defenses against malware and viruses, application software security, data recovery capabilities, security based skills assessments and training of staff, security configurations and hardening of network hardware such as routers, firewalls and switches, controlled use of administrative accounts and privileges, and monitoring, maintenance and analysis of audit logs, need to know basis controlled access, monitoring of accounts and controls, prevention against data losses, management of incident response, secure network engineering and