CIS Controls & Technicians

123456789
Across
  1. 5. track and manage hardware devices
  2. 6. protect the organization's info through measures such as encryption and access controls
  3. 7. educate users on safe-handling of information
  4. 8. regularly test the security controls by simulating attacks on systems and networks
  5. 9. manage the security life cycle of acquired software
Down
  1. 1. only authorized to be installed and executed
  2. 2. continuously acquire, assess and take action
  3. 3. defense of this is to control the installation, spread and execution of malicious code
  4. 4. part of inventory and control of enterprise assets
  5. 5. protect the organization's info, by developing and implementing an incident response capability
  6. 9. test of security controls to ensure they are effective and updated as needed