Talk With an Expert

Technical Implementation of the Critical Control 'Inventory of Authorized and Unauthorized Devices' for a Small Office/Home Office

Technical Implementation of the Critical Control 'Inventory of Authorized and Unauthorized Devices' for a Small Office/Home Office (PDF, 2.93MB)Published: 26 Oct, 2015
Created by:
Kenton Groombridge

There is great value in the proper employment of the Critical Security Controls. The Critical Security Controls are written with terminology that makes them appear applicable only to organizations and other large environments. Implementing the Critical Security Controls can be beneficial to any size network, but can they be applied to a Small Office/Home Office with a limited budget and expertise? This document examines the technical implementation of 'Inventory of Authorized and Unauthorized Devices' for a Small Office/Home Office. Topics discussed will be the selection of hardware evaluation of open-source software and third-party firmware and custom scripts that function with most modern operating systems.