What Guidance Identified Information Security Controls?
Share
Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
Guidance on identifying information security controls typically includes:
1. Deploy network and application firewalls
2. Accomplish regular vulnerability scans of networks, systems, and applications
3. Implement strong access control procedures
4. Implement proper patch management
5. Utilize anti–malware protection
6. Utilize encryption for data at rest and in transit
7. Adopt policies and procedures for data classification and handling
8. Utilize multifactor authentication where applicable
9. Ensure proper logging and monitoring of user activity
10. Regularly test system and application configurations for security weaknesses