Server Room must be secured
Accessed to serve room should be given to limited persons.
Firewall Should be strong.
Explanation:
- Administrator approved devices to be installed.
- Administrator approved Software to be installed.
- Configurations for Hardware and Software should be Secure.
- Check the Remediation and the Vulnerability Assessment Continuous
- The Useage of the Administrative Privileges should be controlled.
- Audit log should be Maintenance, Monitoring, Analysis.
- Protection of Email and Web Browser.
- Defenses of Malware.
- Network Ports, Protocols, and Services Should be Limited and Control.
- Capability of Data Recovery.
- Configurations for Network Devices should be Secure.
- Defense to Boundary.
- Protection of Data.