CIS Controls & Technicians
Across
- 5. track and manage hardware devices
- 6. protect the organization's info through measures such as encryption and access controls
- 7. educate users on safe-handling of information
- 8. regularly test the security controls by simulating attacks on systems and networks
- 9. manage the security life cycle of acquired software
Down
- 1. only authorized to be installed and executed
- 2. continuously acquire, assess and take action
- 3. defense of this is to control the installation, spread and execution of malicious code
- 4. part of inventory and control of enterprise assets
- 5. protect the organization's info, by developing and implementing an incident response capability
- 9. test of security controls to ensure they are effective and updated as needed