ASD Top 4 Mitigation Strategies - List of Software - This Component Provides A Common Application Vendors - Vulnerability Summary - This Component Displays
ASD Top 4 Mitigation Strategies - List of Software - This Component Provides A Common Application Vendors - Vulnerability Summary - This Component Displays
ASD Top 4 Mitigation Strategies - List of Software - This Component Provides A Common Application Vendors - Vulnerability Summary - This Component Displays
installed on its systems. This dashboard and its components provide information to analysts
about software that is discovered on the network. According to the Center for Internet Security
(CIS), Critical Security Control (CSC) Control 2 (CSC 2) is the Inventory of Authorized and
Unauthorized Software.
CSC 2: Actively manage (inventory, track, and correct) all software on the network so that only
authorized software is installed and can execute, and that unauthorized and unmanaged software
is found and prevented from installation or execution.
Maintaining a detailed list of software used on computers in the network can be a very difficult
task. However, using SecurityCenter Continuous View (CV), security professionals can collect
information about software installed on a network using three distinct methods. The first method
is active scanning with credentials. This allows the analyst to analyze each computer to collect
the information about installed software. The second method is to passively monitor the network,
and text software by analyzing live traffic on the network. The third method is by using system
event logs from workstations and servers. This allows software inventory to be tracked using
different events that monitor change control.
The dashboard and its components are available in the SecurityCenter Feed, a comprehensive
collection of dashboards, reports, Assurance Report Cards, and assets. The dashboard can be
easily located in the SecurityCenter Feed under the category Monitoring.
The dashboard requirements are:
SecurityCenter 5.0.0
Nessus 6.6.2
PVS 5.0.0
LCE 4.8