The Center for Internet Security (CIS) Controls is a widely
adopted set of best practices and guidelines for securing computer systems and
networks. There are 20 CIS Controls, organized into three categories: Basic,
Foundational, and Organizational. Here are the core tenets of the CIS Controls:
- Control
selection based on risk: The CIS Controls are prioritized based on the
risk that they address. The most critical controls are listed first.
- Consensus-based:
The CIS Controls are developed and maintained by a community of experts
from government, academia, and industry, with input from a wide range of
stakeholders.
- Actionable:
The CIS Controls provide specific guidance on how to implement each
control, making them practical and actionable.
- Measurable:
The CIS Controls are designed to be measurable, so that organizations can
track their progress and measure the effectiveness of their security
efforts.
- Continuous
improvement: The CIS Controls are intended to be a living document, with
regular updates and revisions based on the latest threats and best
practices.
- Implementation
flexibility: The CIS Controls are designed to be adaptable to different
types of organizations and environments, from small businesses to large
enterprises.
- Comprehensive
coverage: The CIS Controls cover a wide range of security domains,
including network security, endpoint security, data protection, and
incident response.
Overall, the CIS Controls provide a framework for
organizations to build a strong and effective cybersecurity program, based on
industry best practices and the latest threat intelligence.
Here are the 20 CIS Controls broken out by the three
categories:
Basic Controls:
- Inventory
and Control of Hardware Assets
- Inventory
and Control of Software Assets
- Continuous
Vulnerability Management
- Controlled
Use of Administrative Privileges
- Secure
Configuration for Hardware and Software on Mobile Devices, Laptops,
Workstations and Servers
- Maintenance,
Monitoring and Analysis of Audit Logs
Foundational Controls: 7. Email and Web Browser
Protections
- Malware
Defenses
- Limitation
and Control of Network Ports, Protocols and Services
- Data
Recovery Capability
- Secure
Configuration for Network Devices, such as Firewalls, Routers and Switches
- Boundary
Defense
- Data
Protection
Organizational Controls: 14. Controlled Access Based
on the Need to Know
- Wireless
Access Control
- Account
Monitoring and Control
- Implement
a Security Awareness and Training Program
- Application
Software Security
- Incident
Response and Management
- Penetration
Tests and Red Team Exercises
Note that these controls are prioritized based on risk and
organizations should implement them in the order specified by the CIS Controls.
Also, it is recommended that organizations should not skip any of the basic
controls, as they provide the foundation for an effective cybersecurity
program.
No comments:
Post a Comment