Control 2 – Inventory of Authorized and Unauthorized Software

Control 2 focuses on knowing the software that is installed on workstations and servers throughout your organization. Like Control 1, this may seem overwhelming at first. However, once you have started to gain momentum, this one should not be difficult to maintain. Start with an initial assessment from these tools to begin the process of […]

Control 1 – Inventory of Authorized and Unauthorized Devices

The first SANS Top 20 Security Control is Inventory of Authorized and Unauthorized Devices. When you first consider this control, you may be tempted to dismiss the value of the opportunity to have near real time awareness. I encourage you to think of creative ways to lean into your existing tools to help solve the […]