Insights to Control Framework Mapping: Browser Configurations Ingrid Refer to the following Browser Configurations insights and assessments and how they're mapped to CIS v7 and CIS v8 controls for Control Insights: No Outdated Desktop Browsers The lack of outdated desktop browsers indicates effective workstation configurations The ratio of events of type [Outdated Desktop Browser] by type [Desktop Endpoint] is below 2.5% Assessment Positive Observations Desktop Software CIS v8 Controls CIS v7 Controls Controls 4 Secure Configuration of Enterprise Assets and Software Safeguards 4.1 Establish and Maintain a Secure Configuration Process 4.10 Enforce Automatic Device Lockout on Portable End-User Devices 7.3 Perform Automated Operating System Patch Management 7.4 Perform Automated Application Patch Management 9.1 Ensure Use of Only Fully Supported Browsers and Email Clients Controls 5 Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers Safeguards 5.1 Establish Secure Configurations 5.2 Maintain Secure Images 5.3 Securely Store Master Images 5.4 Deploy System Configuration Management Tools 5.5 Implement Automated Configuration Monitoring Systems Outdated Desktop Browsers The presence of outdated desktop browsers indicates ineffective workstation configurations The ratio of events of type [Outdated Desktop Browser] by type [Desktop Endpoint] is above 7.5% Assessment Negative Observations Desktop Software CIS v8 Controls CIS v7 Controls Controls 4 Secure Configuration of Enterprise Assets and Software Safeguards 4.1 Establish and Maintain a Secure Configuration Process 4.10 Enforce Automatic Device Lockout on Portable End-User Devices 7.3 Perform Automated Operating System Patch Management 7.4 Perform Automated Application Patch Management 9.1 Ensure Use of Only Fully Supported Browsers and Email Clients Controls 5 Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers Safeguards 5.1 Establish Secure Configurations 5.2 Maintain Secure Images 5.4 Deploy System Configuration Management Tools 5.5 Implement Automated Configuration Monitoring Systems April 3, 2025: Published. Related articles Insights to Control Framework Mapping Marsh McLennan Study: Correlation Between Bitsight Analytics and Cybersecurity Incidents Account: User Preferences Tab Insights to Control Framework Mapping: Detected Services Action Plans: Control Insights Feedback 0 comments Please sign in to leave a comment.