4.8: Uninstall or Disable Unnecessary Services on Enterprise Assets and Software
Threats Addressed:
Control is new to this version of the control set and incorporates the following controls from the previous version: 9.2: Ensure Only Approved Ports, Protocols, and Services Are Running, 15.4: Disable Wireless Access on Devices if Not Required, 15.6: Disable Peer-to-Peer Wireless Network Capabilities on Wireless Clients, 15.9: Disable Wireless Peripheral Access of Devices.
Control Statement
Uninstall or disable unnecessary services on enterprise assets and software, such as an unused file sharing service, web application module, or service function.
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]