Meeting The CIS Critical Security Controls for Effective Cyber Defense

The Critical Security Controls for Effective Cyber Defense, published by the The Center for Internet Security (CIS), give no-nonsense, highly actionable guidelines for securing IT – written in language that’s easily understood. The controls consists of 20 sections, each outlining a different, critical security control.

Critical Security Control 5 – Controlled Use of Administrative Privileges

With the rise in data breaches attributed to unauthorized access to privileged accounts, most regulatory compliance initiatives now mandate proper controls for these powerful identities. The CIS guidelines are no exception. Critical Security Control 5 lists precisely the minimum controls necessary – and the actions you’ll need to take – to secure privileged credentials.

Lieberman Software helps you achieve continuous compliance with Control 5 quickly by automating the processes required to control, secure and audit access to administrative accounts.

Download our white paper to learn more.

Subscribe to Our Monthly Newsletter

We maintain strict privacy of your information, and you can opt out at any time.