The SANS Critical Security Controls (CSC) Framework, also
known as the SANS Top 20, is a set of security best practices created by the
SANS Institute to help organizations improve their cybersecurity posture. The
framework is designed to prioritize and focus an organization's efforts on the
most critical security controls, based on the latest attack trends and
successful defense strategies.
The framework consists of 20 controls organized into three
categories: Basic, Foundational, and Organizational. The Basic Controls provide
essential protections against the most prevalent threats, while the
Foundational Controls focus on more advanced protection against sophisticated
attacks. The Organizational Controls address strategic and governance issues
that are critical for effective cybersecurity management.
The SANS Critical Security Controls Framework is regularly
updated to ensure it remains current and relevant to the evolving threat
landscape. It is widely used by organizations of all sizes and across all
industries as a benchmark for evaluating and improving their security posture.
Here is a breakdown of the SANS Top 20 Critical Security
Controls Framework into its three categories:
Basic Controls:
- Inventory
and Control of Hardware Assets
- Inventory
and Control of Software Assets
- Continuous
Vulnerability Management
- Controlled
Use of Administrative Privileges
- Secure
Configuration for Hardware and Software on Mobile Devices, Laptops,
Workstations, and Servers
- Maintenance,
Monitoring, and Analysis of Audit Logs
Foundational Controls:
- Email
and Web Browser Protections
- Malware
Defenses
- Limitation
and Control of Network Ports, Protocols, and Services
- Data
Recovery Capability
- Secure
Configuration for Network Devices such as Firewalls, Routers, and Switches
- Boundary
Defense
- Data
Protection
- Controlled
Access Based on Need to Know
Organizational Controls:
- Wireless
Access Control
- Account
Monitoring and Control
- Security
Skills Assessment and Appropriate Training to Fill Gaps
- Application
Software Security
- Incident
Response and Management
- Penetration
Tests and Red Team Exercises
These controls are prioritized based on the threat landscape
and are intended to provide organizations with a roadmap for improving their
cybersecurity posture. By implementing these controls, organizations can better
protect their critical assets and reduce their risk of a cyber-attack.
No comments:
Post a Comment