Center for Internet Security: The 18 Critical Security Controls

The guidelines consist of 18 key actions, called critical security controls (CSC), that organizations should take to mitigate the most common cyber-attacks. These controls are designed so that primarily automated means can be used to implement, enforce, and monitor them, with achievement of the Top 5 eliminating the vast majority of an organization’s vulnerabilities.

This document contains is a list of the controls and a brief description of how Darktrace’s products and coverage areas can be utilized to support them.

Data Sheet

Webinar

Center for Internet Security: The 18 Critical Security Controls

Center for Internet Security: The 18 Critical Security Controls

The guidelines consist of 18 key actions, called critical security controls (CSC), that organizations should take to mitigate the most common cyber-attacks. These controls are designed so that primarily automated means can be used to implement, enforce, and monitor them, with achievement of the Top 5 eliminating the vast majority of an organization’s vulnerabilities.

This document contains is a list of the controls and a brief description of how Darktrace’s products and coverage areas can be utilized to support them.

No Details required
Thanks, your request has been received
A member of our team will be in touch with you shortly.
Oops! Something went wrong while submitting the form.
The information provided in this document is intended for general informational purposes only and should not be construed as legal advice. For specific advice related to compliance with NIS2 or other legal matters, please consult with your legal, professional or regulatory advisors. Darktrace makes no warranties or representations regarding the accuracy, reliability, or completeness of the information provided and accepts no responsibility for any errors or omissions. This document may contain links to external websites or resources for additional information. Darktrace does not endorse or assume responsibility for the content, privacy practices, or any other aspect of these external sites.

This white paper includes

This resource includes

This case study includes

This data sheet includes

9000+
Companies trust Darktrace
Share this resource