5.1: Establish Secure Configurations
CSF v1.1 References:
PF v1.0 References:
Threats Addressed:
The next version of the control set incorporates all or part of this control into: 4.1: Establish and Maintain a Secure Configuration Process.
Control Statement
Maintain documented security configuration standards for all authorized operating systems and software.
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]