Hello everyone! Was wondering how some of the people hare went about implementing the controls. What tools did you use to comply with the requirements? From my understanding network discovery scans obtained from SC/Nessus (ACAS) are not sufficient, so I was wondering if there was anything else in my current environment that I could use or if there was anything else I would have to purchase to satisfy the control. Thank you!
[link] [comments]