home_banner `

Content Icon

Critical Security Controls (CSC) 20 Master Mapping Tool (Updated)

October 1, 2018 | Tools & Templates | Enterprise and IT Compliance Management

Understanding and managing different security frameworks can be a daunting task. This tool offers a detailed matrix for mapping the CSC 20 to a number of different frameworks, including the NIST CSF, ISO 27002, NSA MNT and many more. 
IANS

 SUBSCRIPTION REQUIRED


Already a client?

Log In to Continue

Not a client?

Request More Information

Related Research

Create Effective Public Cloud Security Standards

All security teams moving to the public cloud should adopt cloud-specific security standards. In this Ask-an-Expert written response, IANS Faculty Matthew Chiodi recommends using ISO/IEC 27001 and 27017 as a foundation, and then customizing from there.

Data Governance 101: Put the Basics in Place

Creating a data governance program requires long-term thinking; it's a practice, not a project. In this Ask-an-Expert written response, IANS Faculty Josh More lists the key steps for building a successful program.

Understand HIPAA’s Data-at-Rest Encryption Requirement

HIPAA has an addressable requirement for encrypting data at rest, but how are organizations expected to comply? In this Ask-an-Expert written response, IANS Faculty Mike Pinch say HIPAA doesn't provide detailed guidance but the best strategy is to match your encryption to the attacks it's designed to prevent.

China’s Cybersecurity Laws: An Update

China's cybersecurity laws present strong implications for all companies doing business in and with the country. In this update to an Ask-an-Expert written response, IANS Faculty Aaron Turner explains the laws and offers recommendations for securely doing business in and with the country.