20 CIS Controls: Control 4 – Controlled Use of Administrative PrivilegesTripwire ResearcherApr 26, 2018
20 CIS Controls: Control 5 – Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and ServersTripwire ResearcherApr 19, 2018
20 CIS Controls: Control 6 – Maintenance, Monitoring, and Analysis of Audit LogsTripwire ResearcherApr 18, 2018
20 CIS Controls: Control 9 – Limitation and Control of Network Ports, Protocols, and ServicesTripwire ResearcherApr 10, 2018
20 CIS Controls: Control 11 – Secure Configuration for Network Devices, such as Firewalls, Routers, and SwitchesTripwire ResearcherApr 6, 2018
20 CIS Controls: Control 14 – Controlled Access Based on the Need to KnowTripwire ResearcherApr 2, 2018
20 CIS Controls: Control 17 – Implement a Security Awareness and Training ProgramTripwire ResearcherMar 26, 2018
20 CIS Controls: Control 20 – Penetration Tests and Red Team ExercisesTripwire ResearcherMar 20, 2018