Thursday, March 2, 2023

SANS Critical Security Controls (CSC) Framework

 

The SANS Critical Security Controls (CSC) Framework, also known as the SANS Top 20, is a set of security best practices created by the SANS Institute to help organizations improve their cybersecurity posture. The framework is designed to prioritize and focus an organization's efforts on the most critical security controls, based on the latest attack trends and successful defense strategies.

The framework consists of 20 controls organized into three categories: Basic, Foundational, and Organizational. The Basic Controls provide essential protections against the most prevalent threats, while the Foundational Controls focus on more advanced protection against sophisticated attacks. The Organizational Controls address strategic and governance issues that are critical for effective cybersecurity management.

The SANS Critical Security Controls Framework is regularly updated to ensure it remains current and relevant to the evolving threat landscape. It is widely used by organizations of all sizes and across all industries as a benchmark for evaluating and improving their security posture.

Here is a breakdown of the SANS Top 20 Critical Security Controls Framework into its three categories:

Basic Controls:

  1. Inventory and Control of Hardware Assets
  2. Inventory and Control of Software Assets
  3. Continuous Vulnerability Management
  4. Controlled Use of Administrative Privileges
  5. Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
  6. Maintenance, Monitoring, and Analysis of Audit Logs

Foundational Controls:

  1. Email and Web Browser Protections
  2. Malware Defenses
  3. Limitation and Control of Network Ports, Protocols, and Services
  4. Data Recovery Capability
  5. Secure Configuration for Network Devices such as Firewalls, Routers, and Switches
  6. Boundary Defense
  7. Data Protection
  8. Controlled Access Based on Need to Know

Organizational Controls:

  1. Wireless Access Control
  2. Account Monitoring and Control
  3. Security Skills Assessment and Appropriate Training to Fill Gaps
  4. Application Software Security
  5. Incident Response and Management
  6. Penetration Tests and Red Team Exercises

These controls are prioritized based on the threat landscape and are intended to provide organizations with a roadmap for improving their cybersecurity posture. By implementing these controls, organizations can better protect their critical assets and reduce their risk of a cyber-attack.

 

 

No comments:

Post a Comment

DORA: HOW US BASED FINANCIAL FIRMS NEED TO PREPARE FOR ICT GOVENANCE

  What is DORA and ICT Governcnace? There are many laws and regulations that affect many global business entities.   International banking...