Today’s post is all about Control 10 of the CSIS 20 Critical Security Controls – Secure Configurations for Network Devices (the last post pertained to Control 9). Here I’ll explore the (28) requirements I’ve parsed out of the control (I used the PDF version, but the online version is here) and offer my thoughts on what I’ve found…
Read More
Read More