R2.1: Patch management process: track, evaluate, install security patches
R2.2: Evaluate patches every 35 days
R2.3, R2.4: Apply patch or implement mitigation plan within 35 days
R1.1: Enable only necessary logical network accessible ports, where technically feasible
R5.5: Enforce minimum 8-character length and 3 character types for passwords
R5.6: Enforce password change/obligation at least every 15 months, if feasible
R5.7: Limit unsuccessful authentication attempts or generate alerts, if feasible
R4.1: Log successful/failed logins and detected malicious code
R4.2: Generate alerts for malicious code detection and logging failure
R4.4: Review logged event summarization/sampling every 15 days
R4.3: Retain event logs for last 90 consecutive days