top of page
  • Writer's pictureCHTS

Recommendations from the Center for Internet Security

In our last blog, we started a new series that focuses on security recommendations from the Center for Internet Security (CIS). As a reminder, the CIS framework consists of 18 controls that are organized by importance.

We previously discussed control #1 which was inventory and control of enterprise assets. This month, we are focusing on Control #2 which calls for an actively managed software inventory. CIS Recommends that every organization should:

  • Make an inventory of all software installed on enterprise assets

  • Confirm what software is and is not authorized

  • Confirm what software is being actively updated and supported by the software author

  • Confirm that all software is properly licensed

  • Document any exceptions and detail controls and risk acceptance

  • Review monthly and take action to remove unauthorized software

CHTS is happy to assist you with your organization’s software inventory and make recommendations for how to monitor it! Call us at 719-264-1384 and ask to speak to your Team Manager.

15 views0 comments

Recent Posts

See All
bottom of page