Score of Applied Controls:
6
6 out of 148
Count of Applied Controls:
99
99 out of 148
Risk Assessment
[based on applied Controls]
33
33 out of 100
148 Cntrls
Account Monitoring and Control Account Monitoring and Control
0 / 14 Answered
Application Software Security Application Software Security
0 / 9 Answered
Boundary Defense Boundary Defense
0 / 10 Answered
Continuous Vulnerability Assessment and Remediatio Continuous Vulnerability Assessment and Remediation
0 / 8 Answered
Controlled Access Based on the Need to Know Controlled Access Based on the Need to Know
0 / 7 Answered
Controlled Use of Administrative Privileges Controlled Use of Administrative Privileges
0 / 9 Answered
Data Protection Data Protection
0 / 9 Answered
Data Recovery Capability Data Recovery Capability
0 / 4 Answered
Email and Web Browser Protections Email and Web Browser Protections
0 / 8 Answered
Incident Response and Management Incident Response and Management
0 / 7 Answered
Inventory of Authorized and Unauthorized Devices Inventory of Authorized and Unauthorized Devices
0 / 6 Answered
Inventory of Authorized and Unauthorized Software Inventory of Authorized and Unauthorized Software
0 / 4 Answered
Limitation and Control of Network Ports Limitation and Control of Network Ports
0 / 6 Answered
Maintenance, Monitoring, and Analysis of Audit Log Maintenance, Monitoring, and Analysis of Audit Logs
0 / 6 Answered
Malware Defenses Malware Defenses
0 / 6 Answered
Penetration Tests and Red Team Exercises Penetration Tests and Red Team Exercises
0 / 7 Answered
Secure Configurations for Hardware and Software Secure Configurations for Hardware and Software
0 / 7 Answered
Secure Configurations for Network Devices Secure Configurations for Network Devices
0 / 7 Answered
Security Skills Assessment and Appropriate Trainin Security Skills Assessment and Appropriate Training to Fill Gaps
0 / 5 Answered
Wireless Access Control Wireless Access Control
0 / 9 Answered