The Center for Internet Security’s (CIS) Security Controls is a set of best practices for preventing cyber attacks, developed and validated by leading experts around the world.
One of the top controls includes Inventory of Authorized and Unauthorized Devices. In this blog, Duo’s Thu Pham describes the control and sub-controls, as well as how Duo’s Device Insight, Duo Beyond and Trusted Endpoints can help with some of the requirements outlined in part of CIS’ Security Controls.
Give it a read and let us know what you think.