The next Critical Security Control is number 2, Inventory of Software. What is it? How would you go about implementing this and what are they ways it could be exploited?
Be aware, be safe.