Video
Achieving CIS Controls 1 & 2 with Cybersecurity Asset Management
The Center for Internet Security (CIS) lists a prioritized set of actions to protect organizations from known cyber attack vectors. Known as the CIS 20, the list is broken down into:
- 6 Basic CIS Controls
- 10 Foundational CIS Controls
- 4 Organizational CIS Controls
The most basic controls, CIS 1 and 2 are covered in this short video. In it, we demonstrate how a cybersecurity asset management solution like Axonius can automatically provide what organizations need to achieve these controls.
You will learn:
- The necessary steps to achieving CIS Control 1, including how to inventory, track, and correct all devices
- How to achieve CIS Control 2 by identifying and documenting all software, and developing a whitelist of approved software