Copyright @ 2024 Global Cyber Alliance | Sitemap
Toolbox Category | CIS Controls version 8.0 | NIST CSF version 1.1 | UK Cyber Essentials | AUS Mitigation Strategies |
Know What You Have | 1, 2 | DE.CM-7, ID.AM-1, ID.AM-2, PR.AC-1, PR.AC-6, PR.DS-3, PR.DS-6 | ||
Update Your Defenses | 3, 5 | DE.CM-8, ID.RA-1, ID.RA-5, PR.IP-12, RS.MI-3 | Secure Configuration User Access Control Security Update Management | Patch Operating Systems
Patch Applications |
Beyond Simple Passwords | 5, 6 | DE.CM-7, PR.AC-1, PR.AC-4, PR.AC-7, PR.PT-3 | User Access Control | Multi-Factor Authentication
Restrict Administrative Privileges |
Prevent Phishing and Malware | 9, 10 | DE.CM-1, DE.CM-7, PR.IP-1, PR.PT-2 | Firewalls
Malware Protection | Application Control Patch Applications Configure Microsoft Office Macro Settings User Application Hardening |
Backup and Recover | 11 | PR.DS-1, PR.DS-6, PR.IP-4, PR.PT-5, | Regular Backups | |
Protect Your Email and Reputation | 9 | DE.CM-1, DE.CM-4, DE.CM-7, PR.IP-1 |
“Time” defines the approximate time it will take to implement the tool, including installation and setup. Based on your system and experience, the time may be longer or shorter than the time estimated.
Requires minimal technical knowledge to complete setup. Users with little-to-no familiarity with computer systems will still easily be able to implement Level 1 tools.
Requires basic technical understanding of operating systems and settings controls. Users with a basic understanding will be able to easily implement Level 2 tools.
Requires an intermediate level of understanding to implement. Users will need an intermediate understanding of computer systems and code languages.
Requires advanced levels of understanding of computer systems, settings and code languages. Users will need experience with advanced system configurations.
Contact Us
[email protected]
Community Forum
https://community.globalcyberalliance.org/