The 20 Critical Controls subject to automated measurement and validation (AMV):
- Inventory of Authorized and Unauthorized Hardware.
- Inventory of Authorized and Unauthorized Software.
- Secure Configurations for Hardware and Software For Which Such Configurations Are Available.
- Secure Configurations of Network Devices Such as Firewalls And Routers.
- Boundary Defense
- Maintenance and Analysis of Complete Security Audit Logs
- Application Software Security ***
- Controlled Use of Administrative Privileges
- Controlled Access Based On Need to Know
- Continuous Vulnerability Testing and Remediation
- Dormant Account Monitoring and Control
- Anti-Malware Defenses
- Limitation and Control of Ports, Protocols and Services
- Wireless Device Control
- Data Leakage Protection
- Secure Network Engineering (not AMV)
- Red Team Exercises (not AMV)
- Incident Response Capability (not AMV)
- Assured Data Back-Ups (not AMV)
- Security Skills Assessment and Training to Fill Gaps (not AMV)
- When your only tool is hammer (For*ify), you tend to see every problem as a nail. Hey dude, *** is only 1/20 of the entire infosec.
- RedTeam Exercise isn't an automated measurement and validation.