The Addition of 2 Companion GuidesIn 2013, the CIS Controls were expanded with the addition of two companion guides. These guides provide more detailed explanations of the controls and their implementing procedures. They also offer guidance on how to apply the controls in various types of environments, such as cloud computing and mobile devices.With the increasing number of organizations adopting cloud computing and other remote access technologies, it is essential to have a comprehensive guide to help implement the CIS controls in these environments.Thevulnerability Management and Continuous Monitoring
Thevulnerability Management and Continuous MonitoringThe CIS Controls also emphasize the importance of vulnerability management and continuous monitoring. These controls ensure that organizations maintain a list of known vulnerabilities and promptly apply patches and updates to address them. By implementing a continuous monitoring process, organizations can stay one step ahead of cyber attackers and minimize the risk of vulnerabilities being exploited.Conclusion
ConclusionThe question of whether there are 18 or 20 CIS controls is a common misconception. While the number of controls may vary, the most important thing is to implement a comprehensive security strategy that includes the CIS Controls as well as other security measures. By establishing a solid foundation of security practices, organizations can better protect themselves against cyber threats and ensure the continuity of their operations
Contact: Cindy
Phone: +86-13751010017
E-mail: sales@iecgauges.com
Add: 1F Junfeng Building, Gongle, Xixiang, Baoan District, Shenzhen, Guangdong, China