Data Sheet
Video
Center for Internet Security: The 18 Critical Security Controls
Center for Internet Security: The 18 Critical Security Controls
The guidelines consist of 18 key actions, called critical security controls (CSC), that organizations should take to mitigate the most common cyber-attacks. These controls are designed so that primarily automated means can be used to implement, enforce, and monitor them, with achievement of the Top 5 eliminating the vast majority of an organization’s vulnerabilities.
This document contains is a list of the controls and a brief description of how Darktrace’s products and coverage areas can be utilized to support them.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/65fb10eaf2dc89f08b09615e_Screenshot%202024-03-20%20at%209.37.59%20AM.png)
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/65fb10eaf2dc89f08b09615e_Screenshot%202024-03-20%20at%209.37.59%20AM.png)
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/65fb10eaf2dc89f08b09615e_Screenshot%202024-03-20%20at%209.37.59%20AM.png)
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/62d00b762382a19685e29f17_KKR.png)
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/62c4fa08a24fae546c43ba30_62bef70c9cefeb5c1fada82a_City%2520of%2520Las%2520Vegas.png)
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/62d00885cd5cb409625f691a_zappos.png)
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/62c84b68490be6062d2f7713_Airbus.png)
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/62c84daead04821f9d4441c6_Allianz%20France.png)
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/62f2601663e6b50f033af85b_billabong%20Padded.png)