Towerwall's InfoSec Blog

Content Type

See all

Applying more Critical Security Controls to your organization

Fractional Chief Information Security Officer (CIS , Application Security , Compliance & Privacy , vulnerability management , cannabis , Enterprise , Data Breach , Critical Security Controls (CSC)

Michelle Drolet

The last time we looked at how Critical Security Controls (CSC) can help you build your InfoSec framework, we covered getting a handle on your software and your hardware inventories. Today, we're going to discuss the importance of continually assessing and remediating vulnerabilities, keeping a tight control of administrative privileges, and monitoring your audit logs. These concepts are encapsulated in CSCs 4, 5, and 6. You should develop stringent policies, consider devoting resources tofalse