What Are the Controls?
The detailed Consensus Audit Guidelines are posted at along with detailed control descriptions, examples of attacks they stop or mitigate, how to automate them, and how to test them. Below is the list of control names:Critical Controls Subject to Automated Measurement and Validation:
1. Inventory of Authorized and Unauthorized Hardware
2. Inventory of Authorized and Unauthorized Software3. Secure Configurations for Hardware and Software for Which Such Configurations Are Available4. Secure Configurations of Network Devices Such as Firewalls and Routers5. Boundary Defense6. Maintenance and Analysis of Complete Security Audit Logs7. Application Software Security8. Controlled Use of Administrative Privileges9. Controlled Access Based On Need to Know10. Continuous Vulnerability Testing and Remediation11. Dormant Account Monitoring and Control12. Anti-Malware Defenses13. Limitation and Control of Ports, Protocols and Services14. Wireless Device Control15. Data Leakage ProtectionAdditional Critical Controls (not directly supported by automated measurement and validation):
16. Secure Network Engineering
17. Red Team Exercises18. Incident Response Capability19. Assured Data Back-Ups20. Security Skills Assessment and Training to Fill Gaps
http://sec.chinabyte.com/465/12310465.shtml
http://www.sans.org/critical-security-controls/