1. ISCP: in-depth model for selecting critical security controls;Al-Safwani;Comput. Secur.,2018
2. Trusted computing group history;Berger;Inf. Secur. Tech. Rep.,2005
3. Bergmann, A., 2017. Simple XCCDF/OVAL example. Accessed: 2021-05-17. https://gist.github.com/abergmann/13e1ef5c0ad06a640f90aa8a9897644e.
4. ISMS, security standards and security regulations;Broderick;Inf. Secur. Tech. Rep.,2006
5. CIS, 2020a. CIS benchmarks. Accessed: 2021-05-20. https://github.com/dev-sec/cis-dil-benchmark.