Insights to Control Framework Mapping: Detected Services Ingrid Refer to the following Detected Services insights and assessments and how they're mapped to CIS v7 and CIS v8 controls for Control Insights: Services With Ineffective or No Credentials The presence of services using credential defaults or do not have credentials indicates ineffective access management and authentication At least one event of the following event types was detected: [Unauthenticated Service] Assessment Negative Observations Open Ports CIS v8 Controls CIS v7 Controls Controls 4 Secure Configuration of Enterprise Assets and Software 5 Account Management Safeguards 12.6 Use of Secure Network Management and Communication Protocols 12.8 Establish and Maintain Dedicated Computing Resources For all Administrative Work 4.10 Enforce Automatic Device Lockout on Portable End-User Devices 4.2 Establish and Maintain a Secure Configuration Process for Network Infrastructure 5.2 Use Unique Passwords 5.3 Disable Dormant Accounts Controls 4 Controlled Use of Administrative Privileges 5 Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers Safeguards 4.2 Change Default Passwords 4.3 Ensure the Use of Dedicated Administrative Accounts 4.4 Use Unique Passwords 4.5 Use Multi-Factor Authentication for All Administrative Access 5.1 Establish Secure Configurations 5.4 Deploy System Configuration Management Tools 5.5 Implement Automated Configuration Monitoring Systems April 3, 2025: Published. Related articles Insights to Control Framework Mapping Action Plans: Control Insights What is a Finding Rescan? Insights to Control Framework Mapping: Browser Configurations Infrastructure Management Feedback 0 comments Please sign in to leave a comment.