This document discusses the CIS Top 20 Critical Security Controls. It begins with an introduction to the CIS controls and their goal of prioritizing an organization's security efforts to defend against common attacks. It then covers specific control #1 on maintaining an inventory of authorized and unauthorized devices on the network. The document provides guidance on procedures for implementing control #1, such as using scanning tools to identify devices and ensuring the inventory is automatically updated when new devices connect. It also lists some free and commercial tools that can be used to support control #1.
Related topics: