{"id":66607,"date":"2023-08-10T09:45:32","date_gmt":"2023-08-10T14:45:32","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=66607"},"modified":"2023-08-10T09:47:03","modified_gmt":"2023-08-10T14:47:03","slug":"cis-control-1-inventory-and-control-of-enterprise-assets","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/cis-control-1-inventory-and-control-of-enterprise-assets\/","title":{"rendered":"CIS Control 1: Inventory and Control of Enterprise Assets"},"content":{"rendered":"\n<p>Today\u2019s world is one filled with cybersecurity threats and more, with new kinds of malware coming out every single day. While the basics of cybersecurity and cyber hygiene are important for everyone, it\u2019s especially important for an enterprise\u2019s network. A single breach into a large network can cause a huge range of problems, including, in worse case scenarios, the installation of ransomware.<\/p>\n\n\n\n<p>CIS controls outline important steps for network monitoring and how to create and maintain a secure configuration of enterprise assets.<\/p>\n\n\n\n<p>Control 1 is the first step in creating a system that protects the totality of an enterprise\u2019s network. Here\u2019s what you need to know.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Are CIS Controls?<\/h2>\n\n\n\n<p>CIS stands for the Center for Internet Security. CIS is an organization created to help monitor security risks across the entire internet. They create standards for cyber defense that are designed to help businesses, large enterprises, and even individuals better maintain control of hardware assets, software asset, and create systems that detect and prevent cyber attacks before they happen.<\/p>\n\n\n\n<p>The controls themselves are the 18 things you can control in your system to help eliminate cyber vulnerabilities and improve your cyber defense overall.<\/p>\n\n\n\n<p>CIS also offers certifications for businesses and enterprises that meet control specifications, giving both the business, and their clients, some additional peace of mind. CIS Controls and NIST CSF don\u2019t necessarily line up one to one, but both systems and implementation groups can be useful for system security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why CIS Control 1 Is Important<\/h2>\n\n\n\n<p>CIS Control 1 is inventory and control of enterprise assets. This control is critical because you cannot defend devices, assets, and networks when you don\u2019t know what devices are potentially accessing that network.<\/p>\n\n\n\n<p>This control is the base on which all of your other security efforts are built. Network monitoring, from the computers, mobile devices, and internet of things devices connected to your enterprise\u2019s network is the most basic first step to creating an effective security network.<\/p>\n\n\n\n<p>Here\u2019s how you do it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Critical Safeguards For CIS Control 1<\/h2>\n\n\n\n<p>The steps to meeting CIS control 1 requirements are simple in concept, but can be surprisingly difficult to accomplish. Here\u2019s what you need to do.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Create and Maintain Enterprise Asset Inventory<\/h3>\n\n\n\n<p>The first step is to create as complete an asset inventory as possible for your enterprise. This should include all of the devices that are continuously accessing your enterprise network, as well as devices that only occasionally connect.<\/p>\n\n\n\n<p>Additionally, non-computing devices that are connected to the network (Internet of things devices) need to be included as a potential point of entry. Every device in employee workstations, mobile devices that move with the owner, laptops that only occasionally connect, etc, should be counted.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Establish And Maintain A Process For Handling Unauthorized Assets<\/h3>\n\n\n\n<p>Almost any enterprise network is going to have at least a few endpoint devices attempt to access the network that are unauthorized to do so. There are a lot of reasons for that to happen, from devices that would normally be authorized, but have had their authorization lapse, to devices that shouldn\u2019t be connected, momentarily are, to breach attempts.<\/p>\n\n\n\n<p>Even something as simple as a device changing operating systems can lead to an unauthorized asset accessing the system.<\/p>\n\n\n\n<p>Cataloguing, going through the process to authorize or remove a device, and having a plan for how to handle malware defenses in the case of a bad actor accessing the system, all need to be part of this process.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Use Active Discovery To Establish Ongoing List Of Assets<\/h3>\n\n\n\n<p>Creating a static inventory isn\u2019t going to do a lot of good in a typical enterprise\u2019s network. The list of assets is going to change frequently as devices leave, wear out, get replaced, get upgraded, have a change in service providers, and other differences.<\/p>\n\n\n\n<p>Utilize an active discovery tool to help keep your inventory up to date by actively looking for new devices and adding them to the list. This isn\u2019t a substitute for inventory maintenance, but it can make it easier to keep your inventory up to date.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Use a DHCP To Update Enterprise Asset Inventory<\/h3>\n\n\n\n<p>Dynamic host configuration protocols can also be used to update asset inventory. Using DHCP long in protocols or IP address management tools to update inventory when a device logs in, weekly or more often, is another way to keep the inventory up to date.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Use A Passive Detection and Asset Discovery Tool To Update Asset Inventory<\/h3>\n\n\n\n<p>In addition to active detection tools you should use a passive asset discovery tool to identify assets already connected to the enterprise network. Passive asset discovery tools should be used at least once a week.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Common Questions About CIS Control 1<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Why Use So Many Different Forms Of Detection And Inventory Management?<\/h3>\n\n\n\n<p>Using different asset detection and inventory management tools helps prepare you for CIS control 2, software asset management, and is the most basic line of defense of IT assets should an attack surface.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Is Control 1 Really Critical If Other Aspects Of CIS Control Criteria Are Met?<\/h3>\n\n\n\n<p>Yes, because even if every other CIS control is met, your network maintenance is only going to be as effective as it\u2019s coverage. If you have devices and assets missing from your inventory you have no guarantee that your other control efforts protect that equipment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Common Challenges To CIS Control 1 Implementation:<\/h2>\n\n\n\n<p>There are a number of critical challenges to CIS Control 1 implementation, even in this updated and more streamlined version of the protocol. Some of these challenges are inevitable, and your security team should be aware of common weaknesses and system failures that can lead to problems &#8211; even if you have perfect implementation.<\/p>\n\n\n\n<p>One of the most common challenges to Control 1 is the fact that not all devices can be accounted for in real time. A combination of unagentable assets, pass through devices, and devices that connect between scans, but not during active scanning, can all present inventory challenges.<\/p>\n\n\n\n<p>The main reason that Control 1 is critical is because you cannot protect assets and devices you don\u2019t know about. You also can\u2019t close potential security breaches that come from an unagentable device or an otherwise uncountable asset.<\/p>\n\n\n\n<p>There is some amount of control you assert, even over end-user devices and hardware assets simply by keeping track of the known devices that aren\u2019t caught in inventory. Comparing inventory over time is a key aspect of asset management, and can help you catch and monitor network devices that might be missed on individual scans.<\/p>\n\n\n\n<p>Having incident response protocols in place both to address unauthorized assets, and to respond to cybersecurity threats in real-time can provide an additional layer of protection. Scans for malware and other basic cybersecurity measures can often give insight into the kinds of network devices and access points were used to breach security systems and design a more effective cyber defense plan for the future.<\/p>\n\n\n\n<p>It\u2019s also important to make sure you\u2019re prioritizing Control 1 as a preventative and management measure, and that you don\u2019t neglect the other CIS controls in pursuit of perfect Control 1 implementation. Continuous vulnerability management involves a lot of different moving parts. Control 1 is the foundation, but it doesn\u2019t do any good in isolation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Other Critical Security Controls<\/h2>\n\n\n\n<p>The Center for Internet Security has 18 CIS Critical Security Controls, including inventory and control of software assets, data protection, penetration testing, and access control management to name just a few.<\/p>\n\n\n\n<p>All 18 of these controls are critical for system security, particularly at the Enterprise level. Cyber defense and the requirements for good cyber hygiene and cyberattack defense are always changing, but getting CIS control certifications is a good way to make sure you\u2019re ahead of the curve and prepared before an attack can cause problems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today\u2019s world is one filled with cybersecurity threats and more, with new kinds of malware coming out every single day. While the basics of cybersecurity and cyber hygiene are important for everyone, it\u2019s especially important for an enterprise\u2019s network. A single breach into a large network can cause a huge range of problems, including, in [&hellip;]<\/p>\n","protected":false},"author":77,"featured_media":66610,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[6217],"tags":[],"class_list":["post-66607","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CIS Control 1: Inventory and Control of Enterprise Assets<\/title>\n<meta name=\"description\" content=\"Today\u2019s world is one filled with cybersecurity threats and more, with new kinds of malware coming out every single day. While the basics of cybersecurity\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/cis-control-1-inventory-and-control-of-enterprise-assets\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CIS Control 1: Inventory and Control of Enterprise Assets\" \/>\n<meta property=\"og:description\" content=\"Today\u2019s world is one filled with cybersecurity threats and more, with new kinds of malware coming out every single day. While the basics of cybersecurity\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/cis-control-1-inventory-and-control-of-enterprise-assets\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-10T14:45:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-10T14:47:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/CIS-Control-1-Inventory-and-Control-of-Enterprise-Assets-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Nick Buikema\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nick Buikema\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cis-control-1-inventory-and-control-of-enterprise-assets\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cis-control-1-inventory-and-control-of-enterprise-assets\\\/\"},\"author\":{\"name\":\"Nick Buikema\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/60e2fbadf072463b23c69b0949f4ab4b\"},\"headline\":\"CIS Control 1: Inventory and Control of Enterprise Assets\",\"datePublished\":\"2023-08-10T14:45:32+00:00\",\"dateModified\":\"2023-08-10T14:47:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cis-control-1-inventory-and-control-of-enterprise-assets\\\/\"},\"wordCount\":1303,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cis-control-1-inventory-and-control-of-enterprise-assets\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/CIS-Control-1-Inventory-and-Control-of-Enterprise-Assets-1.png\",\"articleSection\":[\"Business Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cis-control-1-inventory-and-control-of-enterprise-assets\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cis-control-1-inventory-and-control-of-enterprise-assets\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cis-control-1-inventory-and-control-of-enterprise-assets\\\/\",\"name\":\"CIS Control 1: Inventory and Control of Enterprise Assets\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cis-control-1-inventory-and-control-of-enterprise-assets\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cis-control-1-inventory-and-control-of-enterprise-assets\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/CIS-Control-1-Inventory-and-Control-of-Enterprise-Assets-1.png\",\"datePublished\":\"2023-08-10T14:45:32+00:00\",\"dateModified\":\"2023-08-10T14:47:03+00:00\",\"description\":\"Today\u2019s world is one filled with cybersecurity threats and more, with new kinds of malware coming out every single day. While the basics of cybersecurity\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cis-control-1-inventory-and-control-of-enterprise-assets\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cis-control-1-inventory-and-control-of-enterprise-assets\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cis-control-1-inventory-and-control-of-enterprise-assets\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/CIS-Control-1-Inventory-and-Control-of-Enterprise-Assets-1.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/CIS-Control-1-Inventory-and-Control-of-Enterprise-Assets-1.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cis-control-1-inventory-and-control-of-enterprise-assets\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CIS Control 1: Inventory and Control of Enterprise Assets\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/60e2fbadf072463b23c69b0949f4ab4b\",\"name\":\"Nick Buikema\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/nick-buikema\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CIS Control 1: Inventory and Control of Enterprise Assets","description":"Today\u2019s world is one filled with cybersecurity threats and more, with new kinds of malware coming out every single day. While the basics of cybersecurity","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/cis-control-1-inventory-and-control-of-enterprise-assets\/","og_locale":"en_US","og_type":"article","og_title":"CIS Control 1: Inventory and Control of Enterprise Assets","og_description":"Today\u2019s world is one filled with cybersecurity threats and more, with new kinds of malware coming out every single day. While the basics of cybersecurity","og_url":"https:\/\/www.pcmatic.com\/blog\/cis-control-1-inventory-and-control-of-enterprise-assets\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2023-08-10T14:45:32+00:00","article_modified_time":"2023-08-10T14:47:03+00:00","og_image":[{"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/CIS-Control-1-Inventory-and-Control-of-Enterprise-Assets-1.png","width":1920,"height":1080,"type":"image\/png"}],"author":"Nick Buikema","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Nick Buikema","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/cis-control-1-inventory-and-control-of-enterprise-assets\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/cis-control-1-inventory-and-control-of-enterprise-assets\/"},"author":{"name":"Nick Buikema","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/60e2fbadf072463b23c69b0949f4ab4b"},"headline":"CIS Control 1: Inventory and Control of Enterprise Assets","datePublished":"2023-08-10T14:45:32+00:00","dateModified":"2023-08-10T14:47:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/cis-control-1-inventory-and-control-of-enterprise-assets\/"},"wordCount":1303,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/cis-control-1-inventory-and-control-of-enterprise-assets\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/CIS-Control-1-Inventory-and-Control-of-Enterprise-Assets-1.png","articleSection":["Business Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/cis-control-1-inventory-and-control-of-enterprise-assets\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/cis-control-1-inventory-and-control-of-enterprise-assets\/","url":"https:\/\/www.pcmatic.com\/blog\/cis-control-1-inventory-and-control-of-enterprise-assets\/","name":"CIS Control 1: Inventory and Control of Enterprise Assets","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/cis-control-1-inventory-and-control-of-enterprise-assets\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/cis-control-1-inventory-and-control-of-enterprise-assets\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/CIS-Control-1-Inventory-and-Control-of-Enterprise-Assets-1.png","datePublished":"2023-08-10T14:45:32+00:00","dateModified":"2023-08-10T14:47:03+00:00","description":"Today\u2019s world is one filled with cybersecurity threats and more, with new kinds of malware coming out every single day. While the basics of cybersecurity","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/cis-control-1-inventory-and-control-of-enterprise-assets\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/cis-control-1-inventory-and-control-of-enterprise-assets\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/cis-control-1-inventory-and-control-of-enterprise-assets\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/CIS-Control-1-Inventory-and-Control-of-Enterprise-Assets-1.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/CIS-Control-1-Inventory-and-Control-of-Enterprise-Assets-1.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/cis-control-1-inventory-and-control-of-enterprise-assets\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"CIS Control 1: Inventory and Control of Enterprise Assets"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/60e2fbadf072463b23c69b0949f4ab4b","name":"Nick Buikema","url":"https:\/\/www.pcmatic.com\/blog\/author\/nick-buikema\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/66607","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/77"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=66607"}],"version-history":[{"count":1,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/66607\/revisions"}],"predecessor-version":[{"id":66609,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/66607\/revisions\/66609"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66610"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=66607"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=66607"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=66607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}