1.1,Establish and Maintain Detailed Enterprise Asset Inventory 1.2,Address Unauthorized Assets 1.4,Use Dynamic Host Configuration Protocol (DHCP) Logging to Update Enterprise Asset Inventory 10.1,Deploy and Maintain Anti-Malware Software 10.2,Configure Automatic Anti-Malware Signature Updates 10.3,Disable Autorun and Autoplay for Removable Media 10.5,Enable Anti-Exploitation Features 10.7,Use Behavior-Based Anti-Malware Software 11.1,Establish and Maintain a Data Recovery Process  11.2,Perform Automated Backups  11.3,Protect Recovery Data 11.4,Establish and Maintain an Isolated Instance of Recovery Data  11.5,Test Data Recovery 12.1,Ensure Network Infrastructure is Up-to-Date 12.2,Establish and Maintain a Secure Network Architecture 12.5,"Centralize Network Authentication, Authorization, and Auditing (AAA)" 12.6,Use of Secure Network Management and Communication Protocols  12.7,Ensure Remote Devices Utilize a VPN and are Connecting to an Enterprise’s AAA Infrastructure 12.8,Establish and Maintain Dedicated Computing Resources for All Administrative Work 13.1,Centralize Security Event Alerting 13.2,Deploy a Host-Based Intrusion Detection Solution 13.3,Deploy a Network Intrusion Detection Solution 13.4,Perform Traffic Filtering Between Network Segments 13.5,Manage Access Control for Remote Assets 13.7,Deploy a Host-Based Intrusion Prevention Solution 13.8,Deploy a Network Intrusion Prevention Solution 13.9,Deploy Port-Level Access Control 14.1,Establish and Maintain a Security Awareness Program 14.2,Train Workforce Members to Recognize Social Engineering Attacks 14.3,Train Workforce Members on Authentication Best Practices 14.4,Train Workforce on Data Handling Best Practices 14.5,Train Workforce Members on Causes of Unintentional Data Exposure 14.6,Train Workforce Members on Recognizing and Reporting Security Incidents 14.9,Conduct Role-Specific Security Awareness and Skills Training 15.7,Securely Decommission Service Providers 16.1,Establish and Maintain a Secure Application Development Process 16.11,Leverage Vetted Modules or Services for Application Security Components 16.12,Implement Code-Level Security Checks 16.13,Conduct Application Penetration Testing 16.2,Establish and Maintain a Process to Accept and Address Software Vulnerabilities 16.3,Perform Root Cause Analysis on Security Vulnerabilities 16.4,Establish and Manage an Inventory of Third-Party Software Components 16.5,Use Up-to-Date and Trusted Third-Party Software Components 16.8,Separate Production and Non-Production Systems 16.9,Train Developers in Application Security Concepts and Secure Coding 18.1,Establish and Maintain a Penetration Testing Program 18.2,Perform Periodic External Penetration Tests 18.3,Remediate Penetration Test Findings 18.5,Perform Periodic Internal Penetration Tests 2.1,Establish and Maintain a Software Inventory 2.2,Ensure Authorized Software is Currently Supported 2.3,Address Unauthorized Software 2.4,Utilize Automated Software Inventory Tools 2.5,Allowlist Authorized Software 2.6,Allowlist Authorized Libraries 2.7,Allowlist Authorized Scripts 3.1,Establish and Maintain a Data Management Process 3.11,Encrypt Sensitive Data at Rest 3.12,Segment Data Processing and Storage Based on Sensitivity 3.3,Configure Data Access Control Lists 3.4,Enforce Data Retention 3.6,Encrypt Data on End-User Devices 4.1,Establish and Maintain a Secure Configuration Process 4.2,Establish and Maintain a Secure Configuration Process for Network Infrastructure 4.4,Implement and Manage a Firewall on Servers 4.5,Implement and Manage a Firewall on End-User Devices 4.6,Securely Manage Enterprise Assets and Software 4.7,Manage Default Accounts on Enterprise Assets and Software 4.8,Uninstall or Disable Unnecessary Services on Enterprise Assets and Software 4.9,Configure Trusted DNS Servers on Enterprise Assets 5.1,Establish and Maintain an Inventory of Accounts 5.2,Use Unique Passwords 5.3,Disable Dormant Accounts 5.4,Restrict Administrator Privileges to Dedicated Administrator Accounts 5.5,Establish and Maintain an Inventory of Service Accounts 6.1,Establish an Access Granting Process 6.2,Establish an Access Revoking Process 6.3,Require MFA for Externally-Exposed Applications 6.4,Require MFA for Remote Network Access 6.5,Require MFA for Administrative Access 6.8,Define and Maintain Role-Based Access Control 7.1,Establish and Maintain a Vulnerability Management Process 7.2,Establish and Maintain a Remediation Process 7.3,Perform Automated Operating System Patch Management 7.4,Perform Automated Application Patch Management 7.5,Perform Automated Vulnerability Scans of Internal Enterprise Assets 7.6,Perform Automated Vulnerability Scans of Externally-Exposed Enterprise Assets 7.7,Remediate Detected Vulnerabilities 8.1,Establish and maintain an audit log management process that defines the enterprise’s logging requirements. 8.11,"Conduct reviews of audit logs to detect anomalies or abnormal events that could indicate a potential threat. Conduct reviews on a weekly, or more frequent, basis." 8.2,Collect Audit Logs 8.3,Ensure Adequate Audit Log Storage 8.5,Collect Detailed Audit Logs 8.9,Centralize Audit Logs 9.1,Ensure Use of Only Fully Supported Browsers and Email Clients 9.2,Use DNS Filtering Services 9.3,Maintain and Enforce Network-Based URL Filters 9.4,Restrict Unnecessary or Unauthorized Browser and Email Client Extensions 9.6,Block Unnecessary File Types 9.7,Deploy and Maintain Email Server Anti-Malware Protections 3.2,Establish and Maintain a Data Inventory 1.3,Utilize an Active Discovery Tool 1.5,Use a Passive Asset Discovery Tool 10.4,"Configure Automatic Anti-Malware Scanning of Removable Media" 10.6,Centrally Manage Anti-Malware Software 12.3,Securely Manage Network Infrastructure 12.4,"Establish and Maintain Architecture Diagram(s)" 13.10,Perform Application Layer Filtering 13.11,Tune Security Event Alerting Thresholds 13.6,Collect Network Traffic Flow Logs 14.7,Train Workforce 14.8,Train Workforce 15.2,"Establish and Maintain a Service Provider Management Policy" 15.3,Classify Service Providers 15.4,"Ensure Service Provider Contracts Include Security Requirements" 15.5,Assess Service Providers 15.6,Monitor Service Providers 16.10,"Apply Secure Design Principles in Application Architectures" 16.6,"Establish and Maintain a Severity Rating System and Process for Application Vulnerabilities" 16.7,"Use Standard Hardening Configuration Templates for Application Infrastructure" 17.8,Conduct Post-Incident Reviews 3.10,Encrypt Sensitive Data in Transit 3.13,Deploy a Data Loss Prevention Solution 3.14,Log Sensitive Data Access 3.5,Securely Dispose of Data 3.7,"Establish and Maintain a Data Classification Scheme" 3.8,Document Data Flows 3.9,Encrypt Data on Removable Media 4.10,Enforce Automatic Device Lockout on Portable End-User Devices 4.11,"Enforce Remote Wipe Capability on Portable End-User Devices" 4.12,"Separate Enterprise Workspaces on Mobile End-User Devices" 4.3,"Configure Automatic Session Locking on Enterprise Assets" 5.6,Centralize Account Management 6.6,"Establish and Maintain an Inventory of Authentication and Authorization Systems" 6.7,Centralize Access Contro 8.10,Retain Audit Logs 8.12,Collect Service Provider Logs 8.4,Standardize Time Synchronization 8.6,Collect DNS Query Audit Logs 8.7,Collect URL Request Audit Logs 8.8,Collect Command-Line Audit Logs 9.5,Implement DMARC