Anupama Mukherjee • November 2, 2022
You may have heard of the CIS Critical Security Controls. But what are they, and who are they for?
In this post, we'll give you an introduction to the CIS Critical Security Controls and explain how they can help your organization improve its cybersecurity posture.
The CIS Critical Security Controls are a framework of best practices for cybersecurity. They were created by the Center for Internet Security, and they're designed to help organizations of all sizes improve their cybersecurity posture.
The main purpose of the CIS Critical Security Controls is to help organizations prioritize their actions. They were created to assist organizations in quickly defining the foundation of their defenses, allocating their limited resources to actions that would yield quick, high-value results, before concentrating their attention and resources on other business risks.
The CIS Security Controls were created in 2008 through a collaboration that included businesses, governmental organisations, educational institutions, and people from every sector of the ecosystem (cyber analysts, vulnerability finders, solution providers, users, consultants, policy-makers, executives, academia, auditors, etc.). These skilled volunteers drew from their first-hand experiences to develop the best possible defensive measures against cyberattacks.
The controls are based on the principle of defense-in-depth, which means that you should use multiple layers of security to protect your systems. The controls are also modular, which means that you can pick and choose the ones that are most relevant to your organization. They’re also continuously updated and improved to account for the latest cybersecurity threats and techniques.
The CIS Critical Security Controls are for everyone. No, really—they are.
Even if you're not in IT, you should be aware of these controls. Why? Because they can help protect your business from cyberattacks. In fact, they're designed to do just that.
In an endeavour to establish secure, dependable standards of protection for IT systems and cybersecurity programmes from data breaches, the CIS established frameworks that have an impact on everyone from individuals to corporations and governments. They were created to assist organizations in quickly defining the foundation of their defenses, allocating their limited resources to actions that would yield quick, high-value results, before concentrating their attention and resources on other risk issues that were particular to their business or mission.
Thousands of enterprises worldwide have implemented the CIS Controls to help protect themselves and their business interests. These controls are also supported by a vast number of security solution vendors, and consultants.
There are a total of 18 CIS Controls. These 18 controls are made to prevent the great majority of threats that are currently being seen, in addition to providing the structure for automation and systems management that will benefit cyber security well into the future.
This first control's primary objective is to obtain a complete picture of all the company's assets. These assets include end-user devices, including portable and mobile ones, network devices, non-computing/Internet of Things (IoT) devices, and servers connected to the network physically, virtually, remotely, and/or within cloud environments. Maintaining an inventory of all the assets helps to get an accurate idea of what needs to be monitored and protected, in addition to identifying unauthorized use of assets.
This control ensures that all software on the network including operating systems and applications are actively managed, to prevent the unauthorized installation and execution of any software.
Install an automated system on network perimeters that keeps an eye out for unauthorized transfers of sensitive data, stops those transfers, and notifies information security specialists.
Configuration errors are one of the most common causes of data loss and system compromise. In fact, they’re expected to be the root of
99 percent of firewall breaches in 2023. When improperly configured network devices and applications might expose security flaws and interfere with company operations. Using security automation can help to make your IT assets more secure and easier to monitor.
Attackers can utilize privileged and dormant user accounts to infiltrate your network. Keeping these accounts under control and to a minimum can help safeguard your network and data from unauthorized access.
Access management
defends your business against potential security breaches by controlling who has access to what within your organization. Granting too many privileges to one user or a group of users creates more opportunities for attack. Limiting access to only the resources required can help to reduce the attack surface of your organization.
In order to address, remediate, and minimize vulnerabilities and reduce the potential for security breaches, create a strategy to monitor and assess vulnerabilities throughout the business infrastructure. Additionally, keep an eye out for the latest threat and vulnerability information in public and private industry sources.
Tracking and analyzing security events makes it difficult for attackers to conceal their activity and whereabouts. Security logs are the perfect starting point for your investigation, and are a critical component of any security solution. Having access to complete logs can help you understand which systems were affected during an incident, and what actions were taken by the attacker while they were active.
Every day, we send millions of emails for various purposes. They are one of the most common attack vectors of the present day. An email with a virus or a phishing attack can lead to a data breach and loss of sensitive information. Not just email, but other web based attacks are also on the rise as our reliance on the internet grows. At present, websites encounter an average of
94 attacks per day. As a result, it is essential to exercise caution in web-based environments.
This security control is used to prevent and manage the installation, propagation, and execution of malicious code, scripts or apps on enterprise assets. Malware can steal, encrypt, or delete your data, change or hijack fundamental computer operations, and spy on your online behavior without your knowledge or consent, making it one of the biggest threats to your security.
These security practices can include regularly backing up all system data and key systems, protecting, and isolating the backed up data, and periodically testing data recovery procedures. Effective data backup and recovery can prevent accidental data loss or corruption. Moreover, Making sure you have a recent backup of your data in a secure location will help you avoid having to pay a steep ransom to get access to it again after a ransomware attack.
Securing the network is currently one of the most pressing challenges that security professionals face. Businesses must regularly review and change configurations, access control, and traffic flows to improve network security. You can detect security issues by thoroughly documenting every element of your network infrastructure and keeping an eye out for unauthorized changes.
This security control addresses how to gather and analyze the information needed to spot breaches, filter traffic, manage access control, gather traffic flow logs, and send out notifications about security incidents.
As per the latest statistics,
82% of data breaches involve some form of human error. Despite being the cause for most breaches and security incidents, this is a concern that is barely addressed. This CIS control emphasizes the role of security awareness training in preventing data breaches, compliance penalties, identity theft, and other damages.
This security measure pertains to third-party-managed data, systems, and procedures. It’s common for organizations to hire third-party service providers to help manage and support their operations and it's also common for these service providers to have access to company data. However, any flaw in your vendor's security infrastructure could be a direct threat to your organization. Monitoring your supply chain is an essential part of any comprehensive security strategy today. For example,
Evolve's Automated Supply Chain Monitoring
service lets you automatically gather and generate intelligence about your supply chain to spot potential threats that could be used to disrupt your business.
Attackers love to exploit unpatched security flaws in your software and/or applications. Finding and fixing flaws early on in the
software development life cycle is crucial to ensure the safety of your systems.
No business is immune to cyberattacks. Without an incident response plan in place, you risk missing a breach of your network until it’s too late.
In a dynamic IT environment and with a threat landscape that is just as dynamic, it isn’t enough if you have all the security controls in place. You also need to test your defenses regularly. Both internal and external
pen tests can help you gauge the effectiveness of your security controls, identify security gaps, and fix them as needed.
So how do they work with other security standards?
The Critical Security Controls are designed to complement other widely known frameworks. And while CIS controls cannot replace other frameworks like NIST, they do make it easier to apply them and are cross-compatible with them.
For instance, The CIS Controls are identified as one of the "informative references" in the
NIST Framework for Improving Critical Infrastructure Cybersecurity, which enables users to implement the Framework using an already established, and widely accepted technique.
That implies that as a starting point, an organization could establish CIS measures to ensure fundamental security. Following that, you can implement the NIST Cybersecurity Framework, the ISO 27000 series, and related standards, and even comply with regulatory standards such as the
PCI-DSS or
HIPAA.
The CIS Critical Security Controls are a prioritized list of measures that organizations can take to mitigate cyber risks. They are based on the most common attacks that occur in the real world, so they're essentially a playbook of best practices.
If you're responsible for cybersecurity in your organization, then you need to be familiar with the CIS Critical Security Controls. And if you're not, then now is the time to learn about them.
At Threat Intelligence, we’re specialists in penetration testing and automated security capabilities such as incident response, supply chain monitoring, DNS sinkholing, cyber threat intelligence, endpoint detection and response, and much more.
Our services have been used by organizations - big and small, government and private - across the globe. We combine world-class expertise with cutting-edge technology to bring you the best in cybersecurity. To learn more about our solutions visit www.threatintelligence.com or schedule a demo of our products at no cost to your company.
Related Content