(Source: GCN.com) The Center for Internet Security has issued a set of controls designed to provide agencies with a checklist for better security implementations. While there are 20 actions in total, implementing at least the top five — device inventories, softwaretracking, security configurations, vulnerability assessments and control of …