Log in
Skip to sidebar
Skip to main content
Linked Applications
Loading…
Spaces
Blogs
Hit enter to search
Help
Online Help
Keyboard Shortcuts
Feed Builder
What’s new
Available Gadgets
About Confluence
Log in
SIG-ISM
Pages
Blog
Page tree
Browse pages
Configure
Space tools
View Page
Remove Read Confirmation
A
t
tachments (0)
Page History
Page Information
View in Hierarchy
View Source
Export to PDF
Export to Word
Export to Word
Copy Page Tree
Create Space
Copy Space
Hide Inline Comments
Pages
…
SIG-ISM Home
WG 2: Guidance on setting up and running ISMS for NRENs
ISMS for NRENs: Risk treatment & Selection of Controls
CIS Critical Security Controls
Page Information
Title:
CIS Critical Security Controls
Author:
Roderick Mooi
Feb 13, 2018
Last Changed by:
Roderick Mooi
Feb 13, 2018
Tiny Link:
(useful for email)
https://wiki.geant.org/x/Mo07Bw
Export As:
Word
·
PDF
Incoming Links
SIG-ISM (1)
Page:
ISMS for NRENs: Risk treatment & Selection of Controls
Hierarchy
Parent Page
Page:
ISMS for NRENs: Risk treatment & Selection of Controls
Labels
There are no labels assigned to this page.
Recent Changes
Time
Editor
Feb 13, 2018 09:32
Roderick Mooi
View Page History
Outgoing Links
External Links (21)
https://www.cisecurity.org/controls/boundary-defense
https://www.cisecurity.org/controls/security-skills-assessm…
https://www.cisecurity.org/controls/application-software-se…
https://www.cisecurity.org/controls/malware-defenses
https://www.cisecurity.org/controls/maintenance-monitoring-…
https://www.cisecurity.org/controls/inventory-of-authorized…
https://www.cisecurity.org/controls/email-and-web-browser-p…
https://www.cisecurity.org/controls/secure-configurations-f…
https://www.cisecurity.org/controls/account-monitoring-and-…
https://www.cisecurity.org/controls/limitation-and-control-…
https://www.cisecurity.org/controls/controlled-use-of-admin…
https://www.cisecurity.org/controls/inventory-of-authorized…
https://www.cisecurity.org/controls/continuous-vulnerabilit…
https://www.cisecurity.org/controls/data-recovery-capabilit…
https://www.cisecurity.org/controls/wireless-access-control
https://www.cisecurity.org/controls/secure-configurations-f…
https://www.cisecurity.org/controls/controlled-access-based…
https://www.cisecurity.org/controls/incident-response-and-m…
https://www.cisecurity.org/controls/penetration-tests-and-r…
https://www.cisecurity.org/controls/
https://www.cisecurity.org/controls/data-protection
Overview
Content Tools
Tasks
{"serverDuration": 271, "requestCorrelationId": "b916d7a80cc5a364"}