Skip to main content

Table 7 Sub-controls for the malware defenses control

From: Mapping the coverage of security controls in cyber insurance proposal forms

CSC 8: malware defenses

Questions

8.1 Automated tools to continuously monitor workstations

23

8.2 Employ software to automatically push regular AV updates

13

8.3 Limit use of removable devices outside approved business need

0

8.4 Enable anti-exploitation features

0

8.5 Identify executables in network traffic

0

8.6 Enables DNS query logging

0