Mitigation Strategies
Network SegmentaionAccess ControlApplication ControlIsolation TechniquesDefault Password ChangesHost based firewallProtocol blockingPort blockingHost based intrusion preventionEndpoint ManagementDecommissioningConfiguration ManagementLeast PrivilegeLoggingMonitoringEncryptionPatching
Was this helpful?