Secure Configuration
Secure configuration is the second control. The scheme requires every in-scope device and software application to be configured to reduce attack surface: remove unused services, change default credentials, disable auto-run, lock down user accounts. Most CE Plus first-time engagements lose marks here before any other control.