3 min
CIS Controls
CIS Critical Security Control 19: Steps for Crafting an Efficient Incident Response and Management Strategy
An effective incident response plan helps you quickly discover attacks, contain the damage, eradicate the attacker's presence, and restore the integrity of your network and systems.
4 min
CIS Controls
CIS Critical Control 12: Boundary Defense Explained
This blog is a continuation of our blog series on the CIS Critical Controls
[/2017/04/19/the-cis-critical-security-controls-series/].
Key Principle: Detect/prevent/correct the flow of information transferring
networks of different trust levels with a focus on security-damaging data.
What Is It?
Boundary defense is control 12
[https://www.cisecurity.org/controls/boundary-defense/] of the CIS Critical
Controls [https://www.rapid7.com/solutions/compliance/critical-controls/] and is
part of the ne