SlideShare ist ein Scribd-Unternehmen logo
1 von 20
ontrol
solution
1
2
3
4
5
system entity relationship diagram
inventory and control of software assets
system entity relationship diagram
controlled use of administrative privileges
secure configuration for hardware and
software on mobile devices, laptops,
workstations and servers
DNA center, Next Generation Firewall, ISE, Cisco Any
Connect: working together. Firepower is an
option if all solutions are not feasible at once
DNA Center, Firepower, ISE, DUO to understand
what software is running, AMP for Endpoints
DNA Center, ISE - control over versions and
roll out patches with AnyConnect
DNA Center, DUO
DNA Center, Veeam for backups
ontrol
solution
6
7
8
9
10
maintenance, monitoring and
analysis of audit logs
email and web browser protections
malware defenses
limitation and control of network ports,
protocols, and services
data recovery capabilities
DNA Center- Assurance feature.
third party tools: stealth watch, firepower
ESA & WSA, Umbrella
AMP for Network, AMP for Endpoints,
Umbrella
ISE
Veeam / Pure - site recovery management
ontrol
solution
11
12
13
14
15
secure configuration for network devices,
such as firewalls, routers, and switches
boundary defense
data protection
controlled access based
on the need to know
wireless access control
DNA Center
Umbrella, AMP for Endpoints, DUO, ISE
Firepower, AnyConnect
DUO, Firepower, ISE segmentation
DUO, ISE
ontrol
solution
16
17
18
19
20
account monitoring and control
implement a security awareness
and training program
application software security
incident response and management
penetration tests and red team exercises
DUO, ISE
tbl networks can recommend a third party
security awareness vendor
tbl networks can recommend application
software security from a third-party vendor
tbl networks can recommend a templated
incident response management plan
tbl networks can make recommendations
on penetration testing vendors
Cisco AMP for Endpoints
Cisco Advanced Malware Protection (AMP) for Endpoints prevents threats at point of entry, then
continuously tracks every file it lets onto your endpoints. AMP can uncover even the most advanced
threats- including file-less malware and ransomware in hours, not days or months.
implementation effort 1-10
3
helps solve controls:
Cisco AMP for Network
This network-based malware goes beyond point-in-time detection to protect across the entire attack
continuum. AMP for Networks provides visibility and control to protect against highly sophisticated and
targeted advanced malware.
implementation effort 1-10
5
helps solve control:
Cisco AnyConnect
This empowers your employees to work from anywhere, at any time, on company laptops or
personal mobile devices. AnyConnect simplifies secure endpoint access and provides
the security necessary to help keep your organization safe and protected.
implementation effort 1-10
1
helps solve control:
1
Cisco DNA Center
Cisco DNA Center is the network management and command center for Cisco DNA, your
intent-based network for the enterprise. Provision and configure all your network devices in minutes.
Use advanced artificial intelligence and machine learning to proactively monitor, troubleshoot, and
optimize your network. Integrate with third-party systems for improved operational processes.
implementation effort 1-10
helps solve controls:
5
Duo
With Cisco ASA with Firepower Services, you consolidate multiple security layers in a single
platform, eliminating the cost of buying and managing multiple solutions.This integrated approach
combines best-in-class security technology with multilayer protection integrated in a single device that’s
less costly than piecemeal security solutions.
implementation effort 1-10
helps solve controls:
2 2
Cisco Firepower Next Generation Firewall
With Cisco ASA with Firepower Services, you consolidate multiple security layers in a single
platform, eliminating the cost of buying and managing multiple solutions.This integrated approach
combines best-in-class security technology with multilayer protection integrated in a single device that’s
less costly than piecemeal security solutions.
implementation effort 1-10
helps solve controls:
6
Cisco Identity Services Engine
By providing a differentiated policy based on theWho,What,When,Where, and How of the
endpoint,Cisco ISE links who is in your network to what they are doing.With Cisco ISE, your entire
network is the enforcement point for your security policy, not just a singular network device.
implementation effort 1-10
helps solve controls:
9
Cisco Umbrella (formerly OpenDNS)
Cisco Umbrella provides the first line of defense against threats on the internet - at the DNS level.
Because Umbrella is delivered from the cloud, it is the easiest way to protect all of your users in minutes.
implementation effort 1-10
helps solve controls:
1
Data Recovery Abilities: Site Recovery Manager
VMware vCenter Site Recovery Manager is a business continuity and disaster recovery solution that
helps you plan, test, and run the recovery of virtual machines between a protected vCenter Server site
and a recovery vCenter Server site.You can configure Site Recovery Manager to work with several third-
party disk replication mechanisms by configuring array-based replication.Array-based replication
surfaces replicated datastores to recover virtual machine workloads.You can also use host-based
replication by configuring Site Recovery Manager to useVMware vSphere Replication to protect virtual
machine workloads.
implementation effort 1-10
helps solve controls:
5
Backups: Veeam
Veeam® Backup & Replication™ helps business achieve comprehensive data protection forALL
workloads — cloud, virtual and physical.With a single console, achieve fast, flexible and reliable
backup, recovery and replication of all applications and data, on-premises or in the cloud.
implementation effort 1-10
helps solve controls:
5
Security Awareness Training Program
Develop an ongoing security awareness training that addresses new technologies, threats, and
business requirements. Short 15 minute videos that are released quarterly would meet this
control’s standards. Outsourcing a security awareness training program is an option for meeting
this control as well.
implementation effort 1-10
helps solve controls:
5
Application Software Security
Have a corporate policy in place to ensure proper training for software developers is followed so
that all components and secure coding methodologies are updated and secure. Scanning of
applications and evaluations of third-party software can be outsourced.
implementation effort 1-10
helps solve controls:
5
Incident Response Management
In case of a security breach, develop plans, define roles, conduct training, establish
communication channels, and determine management oversight.
implementation effort 1-10
helps solve controls:
5
Penetration Testing
Consider utilizing an outside organization to perform penetration tests.Tests should include a full
scope of blended attacks, such as wireless, client-based, and web application attacks.
implementation effort 1-10
helps solve controls:
5
CIS Control Solution Guide

Weitere ähnliche Inhalte

Was ist angesagt?

How Hard Is It To Hack A Pc
How Hard Is It To Hack A PcHow Hard Is It To Hack A Pc
How Hard Is It To Hack A Pc
haimkarel
 

Was ist angesagt? (20)

The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
 
Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 
Mitigating Rapid Cyberattacks
Mitigating Rapid CyberattacksMitigating Rapid Cyberattacks
Mitigating Rapid Cyberattacks
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
Advanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešeníAdvanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešení
 
Security analyst
Security analystSecurity analyst
Security analyst
 
SanerNow Patch Management
SanerNow Patch ManagementSanerNow Patch Management
SanerNow Patch Management
 
Product overview-eset-file-security
Product overview-eset-file-securityProduct overview-eset-file-security
Product overview-eset-file-security
 
Justin_Laughman_res
Justin_Laughman_resJustin_Laughman_res
Justin_Laughman_res
 
Bezpečnost není jen antivirus
Bezpečnost není jen antivirusBezpečnost není jen antivirus
Bezpečnost není jen antivirus
 
How Hard Is It To Hack A Pc
How Hard Is It To Hack A PcHow Hard Is It To Hack A Pc
How Hard Is It To Hack A Pc
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint Protection
 
RemoteExec DataSheet
RemoteExec DataSheetRemoteExec DataSheet
RemoteExec DataSheet
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
 
Onsite Vs Hosted Desktop Security
Onsite Vs Hosted Desktop SecurityOnsite Vs Hosted Desktop Security
Onsite Vs Hosted Desktop Security
 

Ähnlich wie CIS Control Solution Guide

David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
David Patterson
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
David Fuchs
 
brochure-triton-ap-web-en
brochure-triton-ap-web-enbrochure-triton-ap-web-en
brochure-triton-ap-web-en
Lee Dalton
 
Kaspersky Endpoint overview
Kaspersky Endpoint overviewKaspersky Endpoint overview
Kaspersky Endpoint overview
sferinga
 
Kaspersky Endpoint Overview
Kaspersky Endpoint OverviewKaspersky Endpoint Overview
Kaspersky Endpoint Overview
sferinga
 

Ähnlich wie CIS Control Solution Guide (20)

How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Cisco SecureX.pdf
Cisco SecureX.pdfCisco SecureX.pdf
Cisco SecureX.pdf
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfee
 
brochure-triton-ap-web-en
brochure-triton-ap-web-enbrochure-triton-ap-web-en
brochure-triton-ap-web-en
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
ApplicationPro Flyer English
ApplicationPro Flyer EnglishApplicationPro Flyer English
ApplicationPro Flyer English
 
Saravanan_Resume_IBM Updated
Saravanan_Resume_IBM UpdatedSaravanan_Resume_IBM Updated
Saravanan_Resume_IBM Updated
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer English
 
Kaspersky Endpoint overview
Kaspersky Endpoint overviewKaspersky Endpoint overview
Kaspersky Endpoint overview
 
Kaspersky Endpoint Overview
Kaspersky Endpoint OverviewKaspersky Endpoint Overview
Kaspersky Endpoint Overview
 
SanerNow platform-datasheet
SanerNow platform-datasheetSanerNow platform-datasheet
SanerNow platform-datasheet
 
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptxKASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptx
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
HCI ECOCAST
HCI ECOCAST HCI ECOCAST
HCI ECOCAST
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

CIS Control Solution Guide

  • 1.
  • 2. ontrol solution 1 2 3 4 5 system entity relationship diagram inventory and control of software assets system entity relationship diagram controlled use of administrative privileges secure configuration for hardware and software on mobile devices, laptops, workstations and servers DNA center, Next Generation Firewall, ISE, Cisco Any Connect: working together. Firepower is an option if all solutions are not feasible at once DNA Center, Firepower, ISE, DUO to understand what software is running, AMP for Endpoints DNA Center, ISE - control over versions and roll out patches with AnyConnect DNA Center, DUO DNA Center, Veeam for backups
  • 3. ontrol solution 6 7 8 9 10 maintenance, monitoring and analysis of audit logs email and web browser protections malware defenses limitation and control of network ports, protocols, and services data recovery capabilities DNA Center- Assurance feature. third party tools: stealth watch, firepower ESA & WSA, Umbrella AMP for Network, AMP for Endpoints, Umbrella ISE Veeam / Pure - site recovery management
  • 4. ontrol solution 11 12 13 14 15 secure configuration for network devices, such as firewalls, routers, and switches boundary defense data protection controlled access based on the need to know wireless access control DNA Center Umbrella, AMP for Endpoints, DUO, ISE Firepower, AnyConnect DUO, Firepower, ISE segmentation DUO, ISE
  • 5. ontrol solution 16 17 18 19 20 account monitoring and control implement a security awareness and training program application software security incident response and management penetration tests and red team exercises DUO, ISE tbl networks can recommend a third party security awareness vendor tbl networks can recommend application software security from a third-party vendor tbl networks can recommend a templated incident response management plan tbl networks can make recommendations on penetration testing vendors
  • 6. Cisco AMP for Endpoints Cisco Advanced Malware Protection (AMP) for Endpoints prevents threats at point of entry, then continuously tracks every file it lets onto your endpoints. AMP can uncover even the most advanced threats- including file-less malware and ransomware in hours, not days or months. implementation effort 1-10 3 helps solve controls:
  • 7. Cisco AMP for Network This network-based malware goes beyond point-in-time detection to protect across the entire attack continuum. AMP for Networks provides visibility and control to protect against highly sophisticated and targeted advanced malware. implementation effort 1-10 5 helps solve control:
  • 8. Cisco AnyConnect This empowers your employees to work from anywhere, at any time, on company laptops or personal mobile devices. AnyConnect simplifies secure endpoint access and provides the security necessary to help keep your organization safe and protected. implementation effort 1-10 1 helps solve control: 1
  • 9. Cisco DNA Center Cisco DNA Center is the network management and command center for Cisco DNA, your intent-based network for the enterprise. Provision and configure all your network devices in minutes. Use advanced artificial intelligence and machine learning to proactively monitor, troubleshoot, and optimize your network. Integrate with third-party systems for improved operational processes. implementation effort 1-10 helps solve controls: 5
  • 10. Duo With Cisco ASA with Firepower Services, you consolidate multiple security layers in a single platform, eliminating the cost of buying and managing multiple solutions.This integrated approach combines best-in-class security technology with multilayer protection integrated in a single device that’s less costly than piecemeal security solutions. implementation effort 1-10 helps solve controls: 2 2
  • 11. Cisco Firepower Next Generation Firewall With Cisco ASA with Firepower Services, you consolidate multiple security layers in a single platform, eliminating the cost of buying and managing multiple solutions.This integrated approach combines best-in-class security technology with multilayer protection integrated in a single device that’s less costly than piecemeal security solutions. implementation effort 1-10 helps solve controls: 6
  • 12. Cisco Identity Services Engine By providing a differentiated policy based on theWho,What,When,Where, and How of the endpoint,Cisco ISE links who is in your network to what they are doing.With Cisco ISE, your entire network is the enforcement point for your security policy, not just a singular network device. implementation effort 1-10 helps solve controls: 9
  • 13. Cisco Umbrella (formerly OpenDNS) Cisco Umbrella provides the first line of defense against threats on the internet - at the DNS level. Because Umbrella is delivered from the cloud, it is the easiest way to protect all of your users in minutes. implementation effort 1-10 helps solve controls: 1
  • 14. Data Recovery Abilities: Site Recovery Manager VMware vCenter Site Recovery Manager is a business continuity and disaster recovery solution that helps you plan, test, and run the recovery of virtual machines between a protected vCenter Server site and a recovery vCenter Server site.You can configure Site Recovery Manager to work with several third- party disk replication mechanisms by configuring array-based replication.Array-based replication surfaces replicated datastores to recover virtual machine workloads.You can also use host-based replication by configuring Site Recovery Manager to useVMware vSphere Replication to protect virtual machine workloads. implementation effort 1-10 helps solve controls: 5
  • 15. Backups: Veeam Veeam® Backup & Replication™ helps business achieve comprehensive data protection forALL workloads — cloud, virtual and physical.With a single console, achieve fast, flexible and reliable backup, recovery and replication of all applications and data, on-premises or in the cloud. implementation effort 1-10 helps solve controls: 5
  • 16. Security Awareness Training Program Develop an ongoing security awareness training that addresses new technologies, threats, and business requirements. Short 15 minute videos that are released quarterly would meet this control’s standards. Outsourcing a security awareness training program is an option for meeting this control as well. implementation effort 1-10 helps solve controls: 5
  • 17. Application Software Security Have a corporate policy in place to ensure proper training for software developers is followed so that all components and secure coding methodologies are updated and secure. Scanning of applications and evaluations of third-party software can be outsourced. implementation effort 1-10 helps solve controls: 5
  • 18. Incident Response Management In case of a security breach, develop plans, define roles, conduct training, establish communication channels, and determine management oversight. implementation effort 1-10 helps solve controls: 5
  • 19. Penetration Testing Consider utilizing an outside organization to perform penetration tests.Tests should include a full scope of blended attacks, such as wireless, client-based, and web application attacks. implementation effort 1-10 helps solve controls: 5