Sans Top 20 Flashcards
Learn sans top 20
CSC1
CSC 1: Inventory of Authorized and Unauthorized Devices
CSC2
CSC 2: Inventory of Authorized and Unauthorized Software
CSC3
CSC 3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
CSC4
CSC 4: Continuous Vulnerability Assessment and Remediation
CSC5
CSC 5: Controlled Use of Administrative Privileges
CSC6
CSC 6: Maintenance, Monitoring, and Analysis of Audit Logs
CSC7
CSC 7: Email and Web Browser Protections
CSC8
CSC 8: Malware Defenses
CSC9
CSC 9: Limitation and Control of Network Ports, Protocols, and Services
CSC10
CSC 10: Data Recovery Capability
CSC11
CSC 11: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches
CSC12
CSC 12: Boundary Defense
CSC13
CSC 13: Data Protection
CSC14
CSC 14: Controlled Access Based on the Need to Know
CSC15
CSC 15: Wireless Access Control