Critical Security Controls - CIS General Information

Critical Security Controls - CIS General Information

The 17 CIS Critical Security Controls 

The CIS Controls consist of 17 critical security controls that address various aspects of an organization's cybersecurity posture. These controls are designed to provide a comprehensive and prioritized approach to improving cybersecurity defenses. Here’s a closer look at each of these controls: 

1. Inventory and control of enterprise assets 

This control focuses on creating and maintaining an accurate inventory of all hardware assets within the organization. By knowing what assets are present and ensuring they are properly managed, organizations can prevent unauthorized devices from being connected to their networks. 

2. Inventory and control of software assets 

Similar to the first control, this one emphasizes the importance of maintaining an inventory of all software assets. This includes identifying authorized software and ensuring that only approved applications are installed and running on organizational systems. This is also a key step in helping to understand your security stack. If you are able to inventory all of your software and applications, you can find the gaps you might have in protection or identify areas of duplication that could benefit from streamlining in order to potentially reduce costs and boost productivity.  

3. Protection of data 

Data protection is a critical aspect of cybersecurity. This control involves implementing measures to safeguard sensitive information, both in transit and at rest. This includes encryption, access controls, and data loss prevention mechanisms. 

4. Secure configuration 

Secure configuration involves establishing and maintaining secure settings for hardware and software. This includes disabling unnecessary features, services, and ports, as well as ensuring that default configurations are replaced with secure settings. 

5. Management of accounts 

Proper account management is essential for preventing unauthorized access. This control includes implementing strong authentication mechanisms, regularly reviewing user accounts, and promptly disabling or removing accounts that are no longer needed. 

6. Vulnerability management 

Vulnerability management involves regularly scanning systems and applications for vulnerabilities and promptly applying patches and updates. This helps organizations stay protected against known threats and reduces the risk of exploitation. 

7. Auditing of log management 

Effective log management is crucial for detecting and investigating security incidents. This control involves collecting, analyzing, and retaining logs from various sources to identify suspicious activities and support forensic investigations. 

8. Web browser and email protection 

Web browsers and email clients are common vectors for cyberattacks. This control focuses on securing these applications by implementing measures such as email filtering, web content filtering, and disabling unnecessary browser plugins. 

9. Defense of malware 

Malware defense involves implementing measures to detect and prevent malware infections. This includes using antivirus software, regularly updating malware signatures, and employing advanced threat detection technologies. 

10. Recovery of data 

Data recovery is essential for ensuring business continuity in the event of a cyber incident. This control includes implementing regular data backups, testing backup procedures, and having a robust disaster recovery plan in place. 

11. Management of network infrastructure 

Proper management of network infrastructure is crucial for maintaining a secure environment. This control involves implementing measures such as network segmentation, access controls, and monitoring to ensure the security of network devices and traffic. 

12. Monitoring and defense of network 

Continuous monitoring and defense of the network are essential for detecting and responding to security incidents. This control includes implementing intrusion detection and prevention systems, network traffic analysis, and security information and event management (SIEM) solutions. 

13. Skill training and security awareness 

Human error is a significant factor in many cybersecurity incidents. In fact, recent research shows that human factors create significant cybersecurity risks for small and medium-sized businesses. This CIS control emphasizes the importance of providing regular training and awareness programs to educate employees on cybersecurity best practices and potential threats. 

14. Evaluate and manage service providers 

Organizations often rely on third-party service providers for various functions. This control involves assessing and managing the security practices of these providers to ensure they meet the organization's security requirements. 

15. Security of application software 

Application security is crucial for preventing vulnerabilities that can be exploited by attackers. This control involves implementing secure coding practices, conducting regular security assessments, and addressing identified vulnerabilities promptly. 

16. Managing incident response 

Effective incident response is critical for minimizing the impact of security incidents. This control includes establishing an incident response plan, conducting regular drills, and ensuring that all relevant personnel are trained to respond to incidents effectively. 

17. Penetration testing 

Penetration testing involves simulating cyberattacks to identify and address vulnerabilities in the organization's systems and networks. This control helps organizations understand their security weaknesses and improve their defenses. 

Info
You can find further information about CIS using link below.
    • Related Articles

    • How to fix Microsoft Error - Security Risk File is Blocked

      When Windows blocks your access to a file, you will receive a message like this when you try to open it: “Windows found that this file is potentially harmful. To help protect your computer, Windows has blocked access to this file.” There is only one ...
    • Add, remove, or change a trusted location in Microsoft Office

      A trusted location in Microsoft Office is a folder that contains files you trust to be safe. You should use a trusted location to store a file when you don't want that file to be checked by the Trust Center, or if you don't want it to open in ...
    • Choice Brand IT Support

      Access the ChoiceNOW Service Portal (Note - Requires Okta Profile to login. Additional details below) Login - Hotel Portal (service-now.com) Live Chat Feature for general inquiries - Phone 800-528-3118 Available 24x7x365 Create new case Review open ...
    • M3 Support Services

      Please see link below for case priority information...determining the level of priority that will be assigned to all support cases for M3 https://help.m3as.com/documentation/accounting-core/getting-started/ When do you need to call support for M3? ...
    • How do I find my Computer Name?

      NOTE: Excerpts below taken from the MS Knowledge Base article: https://support.microsoft.com/en-us/office/do-you-need-help-locating-your-computer-name-00384381-8aa9-4398-b81b-475f09fed618 Find your computer name in Windows 10/Windows 11 Open the ...