SANS Top 20 Critical Security Controls

GPTKB entity

Statements (49)
Predicate Object
gptkbp:instanceOf cybersecurity framework
gptkbp:alsoKnownAs gptkb:CIS_Controls
gptkbp:basisFor risk assessments
security audits
cybersecurity compliance programs
gptkbp:category cyber defense
risk management
gptkbp:developedBy gptkb:SANS_Institute
gptkbp:firstPublished 2008
gptkbp:focusesOn prioritized cybersecurity best practices
https://www.w3.org/2000/01/rdf-schema#label SANS Top 20 Critical Security Controls
gptkbp:includesControl Data Protection
Limitation and Control of Network Ports, Protocols, and Services
Account Monitoring and Control
Application Software Security
Boundary Defense
Continuous Vulnerability Management
Controlled Access Based on the Need to Know
Controlled Use of Administrative Privileges
Data Recovery Capabilities
Email and Web Browser Protections
Incident Response and Management
Inventory and Control of Hardware Assets
Inventory and Control of Software Assets
Malware Defenses
Penetration Tests and Red Team Exercises
Secure Configuration for Hardware and Software
Secure Configuration for Network Devices
Security Skills Assessment and Training
Maintenance, Monitoring, and Analysis of Audit Logs
Wireless Access Control
gptkbp:maintainedBy gptkb:Center_for_Internet_Security
gptkbp:numberOfControls 20
gptkbp:purpose improve cybersecurity posture
gptkbp:referencedIn gptkb:HIPAA
gptkb:PCI_DSS
gptkb:NIST
gptkb:ISO/IEC_27001
gptkb:FISMA
gptkbp:targetAudience IT professionals
executives
security practitioners
gptkbp:updated gptkb:CIS_Controls_v8
gptkbp:usedBy private sector organizations
government organizations
critical infrastructure
gptkbp:website https://www.cisecurity.org/controls/
gptkbp:bfsParent gptkb:CIS_Controls
gptkbp:bfsLayer 7