The next control in the top 20 is Critical Security Control number 9, Limitation of Network Ports, Protocols and Services....
network
In the world of vulnerability management you really can't get away from using the king of all port scanners, Nmap....
If you are involved with networks architecture, firewall configuration or do any kind of security scans then you rely heavily...