Have a look at the short video below to see how organizations are able to achieve CIS Controls 1 and 2 with a cybersecurity asset management platform like Axonius.
The Center for Internet Security (CIS) lists a prioritized set of actions to protect organizations from known cyber attack vectors. Known as the CIS 20, the list is broken down into:
The most basic controls, CIS 1 and 2 are covered in the following video, demonstrating how a cybersecurity asset management platform like Axonius can automatically provide what organizations need to achieve these controls. More specifically:
“Actively manage (inventory, track, and correct) all hardware devices on the network so that only authorized devices are given access, and unauthorized and unmanaged devices are found and prevented from gaining access.”
To achieve CIS Control 1, the Center for Internet Security highlights 3 key steps:
“Actively manage (inventory, track, and correct) all software on the network so that only authorized software is installed and can execute, and that unauthorized and unmanaged software is found and prevented from installation or execution.”
To achieve CIS Control 2, the Center for Internet Security requires you to: