Control Category: Configuration and Vulnerability Management
-
Vendor-supported applications
Read more: Vendor-supported applicationsUse vendor supported applications and operating systems.
-
Automatic software updates
Read more: Automatic software updatesConfigure automatic download and application of software and operating system updates.
-
Patch notification
Read more: Patch notificationStay informed of available patches for your operating system and applications.
-
Endpoint Management
Read more: Endpoint ManagementWhere applicable, use endpoint management tools to ensure the tasks for this level are completed on your devices.
-
Vulnerability scans
Read more: Vulnerability scansPerform regular network vulnerability scans. Contact your departmental IT administrator or security@mit.edu for assistance.
-
Centralized logging
Read more: Centralized loggingEnsure authentication and access logs are sent to a second device.