CTE22.IT.C3.21
Identify network vulnerabilities that threat actors use to exploit an organization’s security and implement control measures to avoid such attacks.
COS Examples
Examples: malware, unpatched security vulnerabilities, hidden backdoor programs, superuser or Admin Account privileges
Identify network vulnerabilities that threat actors use to exploit an organization’s security and implement control measures to avoid such attacks.
COS Examples
Examples: malware, unpatched security vulnerabilities, hidden backdoor programs, superuser or Admin Account privileges