Defend against the most pervasive and dangerous cyber attacks also, means
I have a pleasure to recall that, the following recommendations and guidance
when well-implemented across an organization; these controls deliver specific, actionable information that is
necessary to defend against the most pervasive and dangerous cyber attacks.
The recommendations and guidance include:
- Accurate hardware inventory.
- Accurate software inventory.
- Continuous configuration management and hardening.
- Comprehensive vulnerability management.
- Patch management.
- Log management.
- Identity and access management.
In additions, before any damage is done, it is vital for
organizations to identify indicators of compromise quickly so that appropriate
action can be taken.