Professional Documents
Culture Documents
Risk Accepted:
Has your organization implemented a Network Access Control (NAC) solution, which requires certificates, to authenticate devic
Has your organization implemented a software whitelisting tool that only allows authorized software program to execute on th
Critical Control #3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
Has your organization implemented scanning tools to identify any mis-configured security settings on systems in the organizatio
Has your organization implemented a security setting configuration enforcement system on the organization's systems?
Has your organization implemented an automated patch management system to continuously update the organization's system
0%
100%
ertificates, to authenticate devices before they can connect to the network? Select one of the Following:
ftware program to execute on the organization's systems? Select one of the Following:
ne of the Following: 0 0
ne of the Following: 0 0
ne of the Following: 0 0
ne of the Following: 0 0
ne of the Following: 0 0
ne of the Following: 0 0
ne of the Following: 0 0
0 1
DO NOT CHANGE THESE VALUES
Implementation Status
Select one of the Following:
Not Implemented
Implemented on Some Systems
Implemented on All Systems
Implemented & Automated on All Systems