Mar 28, 2015
We continue our trek down the list of SANS Top 20 Critical Security Controls this week with #12 and #13 - Boundry Defense, and Controlled use of Administrative Privileges. Learn what you can do to shore up your network defenses, and how to handle admin privileges... When to give that kind of access, and how to make privileged access as secure as possible while still allowing administrators to do their work.
https://www.sans.org/media/critical-security-controls/CSC-5.pdf
http://www.openspf.org/
https://4sysops.com/