The organisation shall configure its business-critical systems to operate with only the essential functions needed for the intended purpose. This includes reviewing and updating baseline configurations to disable any non-essential capabilities.
The organisation shall configure its business-critical systems to operate with only the essential functions needed for the intended purpose. This includes reviewing and updating baseline configurations to disable any non-essential capabilities.
The organisation shall identify and disable specific functions, ports, protocols, and services within its critical systems that are not required for business operations.
The organisation shall identify and disable specific functions, ports, protocols, and services within its critical systems that are not required for business operations.
The organisation shall implement technical safeguards to enforce a policy of ‘deny-all’ and ‘permit-by-exception’ so that only authorised software programmes are executed.
The organisation shall implement technical safeguards to enforce a policy of ‘deny-all’ and ‘permit-by-exception’ so that only authorised software programmes are executed.
Unauthorised configuration changes to organisation's systems shall be monitored and addressed with the appropriate mitigation actions.
Unauthorised configuration changes to organisation's systems shall be monitored and addressed with the appropriate mitigation actions.