...
Task | Tools to Identify and Classify Systems | Potentially Useful Classifications | Remediation Strategies | ||
---|---|---|---|---|---|
Patching |
|
| |||
Encryption |
|
| Primary concern: "not encrypted, but required" systems. Secondary concern: documenting "not encrypted & not required" systems. | ||
Screen Lock |
|
...