SHARE
According to the SANS State of Endpoint Security Survey, the endpoint is rapidly evolving and often the first vector of attack into enterprises. It’s no surprise, then, that endpoint security and control are becoming major focal points of SANS security. This whitepaper discusses four Critical Security Controls (CSCs) that directly concern endpoints that must be protected by the network: Inventory of authorized and unauthorized devices Inventory of authorized and unauthorized software Secure configurations for hardware and software on mobile devices laptops, workstations and servers Continuous vulnerability assessment and remediation