Q. What are the suggested open source security monitoring tools corresponding to the 20 CIS Critical Security Controls for Effective Cyber Defense?
Cyber security controls |
Examples of security techniques |
CSC1: Inventory of Authorized and Unauthorized Devices |
Endpoint security, asset management |
CSC2: Inventory of Authorized and Unauthorized Software |
Endpoint security, asset management |
CS3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers. |
CIS Security Benchmark, OpenSCAP |
CSC4: Continuous Vulnerability Assessment and Remediation |
OpenVAS: http://www.openvas.org/ Nmap: https://nmap.org/ OWASP Dependency Check: https://www.owasp.org/index.php/OWASP_Dependency_Check |
CSC 5: Controlled Use of Administrative Privileges |
Strong password complexity Auditing logs for root... |