home_banner `

Content Icon

Critical Security Controls (CSC) 20 Master Mapping Tool (Updated)

October 1, 2018 | Tools & Templates | Enterprise and IT Compliance Management

Understanding and managing different security frameworks can be a daunting task. This tool offers a detailed matrix for mapping the CSC 20 to a number of different frameworks, including the NIST CSF, ISO 27002, NSA MNT and many more. 
IANS

 SUBSCRIPTION REQUIRED


Already a client?

Log In to Continue

Not a client?

Request More Information

Related Research

Secure the Business Post-M&A

Securing the business after a major international acquisition is no easy feat. In this Ask-an-Expert written response, IANS Faculty Rich Guida steps through the process and offers tips for ensuring both staff and tool integration goes smoothly.

Acceptable Use Policy Template

This template for a typical acceptable use policy may be customized to suit a variety of organizations.

Poll: Tips for Flagging Credit Card Data in QA and Lab Environments

PCI-compliant organizations must flag and report on credit card data found within lab and QA environments, but what is the best way to accomplish that? In this Viewpoints report, IANS Faculty Davi Ottenheimer, Jake Williams and Justin Leapline recommend some strategies.

Know the Risks of Permitting Personal Email at Work

Personal usage of IT equipment and services continues to be a big problem in many large organizations. In this Ask-an-Expert written response, IANS Faculty Kevin Beaver details what can go wrong when employees use personal email at work and explains the importance of using both policy and technical controls to address the issue.