4.1: Establish and Maintain a Secure Configuration Process
CSF v1.1 References:
PF v1.0 References:
Threats Addressed:
Incorporates the following controls from the previous version: 5.1: Establish Secure Configurations, 5.4: Deploy System Configuration Management Tools, 14.3: Disable Workstation to Workstation Communication.
Control Statement
Establish and maintain a secure configuration process for enterprise assets (end-user devices, including portable and mobile, non-computing/IoT devices, and servers) and software (operating systems and applications). Review and update documentation annually, or when significant enterprise changes occur that could impact this Safeguard.
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]