From: Mapping the coverage of security controls in cyber insurance proposal forms
CSC 8: malware defenses | Questions |
---|---|
8.1 Automated tools to continuously monitor workstations | 23 |
8.2 Employ software to automatically push regular AV updates | 13 |
8.3 Limit use of removable devices outside approved business need | 0 |
8.4 Enable anti-exploitation features | 0 |
8.5 Identify executables in network traffic | 0 |
8.6 Enables DNS query logging | 0 |