The 18 CIS (Center for Internet Security) Critical Security Controls are a prioritized set of best practices designed to strengthen an organization's cybersecurity posture. These controls are divided into three categories: Basic, Foundational, and Organizational. Below is an overview of the controls:
Basic Controls (1–6):
These are foundational and should be implemented first to establish a strong security baseline:
- Inventory and Control of Enterprise Assets: Maintain an accurate inventory of all enterprise hardware assets to identify unauthorized devices.
- Inventory and Control of Software Assets: Track all software to prevent unauthorized or vulnerable applications.
- Data Protection: Protect sensitive data through encryption, access control, and monitoring.
- Secure Configuration of Enterprise Assets and Software: Ensure systems and software are securely configured to minimize vulnerabilities.
- Account Management: Manage user accounts, including creating, monitoring, and revoking access as needed.
- Access Control Management: Limit access rights based on job roles, enforce multi-factor authentication, and monitor access.
Foundational Controls (7–16):
These build upon the Basic controls to provide more detailed security measures:
- Continuous Vulnerability Management: Regularly identify and address vulnerabilities in systems and software.
- Audit Log Management: Collect, review, and retain logs to detect and analyze security incidents.
- Email and Web Browser Protections: Implement safeguards against phishing, malicious links, and other email/browser-based threats.
- Malware Defenses: Deploy tools to detect, prevent, and respond to malware infections.
- Data Recovery: Develop robust backup and recovery processes to ensure data restoration after incidents.
- Network Infrastructure Management: Securely manage network devices and configurations to reduce risks.
- Network Monitoring and Defense: Use tools to monitor network traffic for suspicious activity and defend against threats.
- Security Awareness and Skills Training: Educate employees on cybersecurity risks and best practices through regular training.
- Service Provider Management: Evaluate third-party providers for secure handling of sensitive data.
- Application Software Security: Assess and mitigate vulnerabilities in software developed or used by the organization.
Organizational Controls (17–18):
These focus on broader organizational practices for maintaining security:
- Incident Response Management: Create a plan to detect, respond to, and recover from security incidents effectively.
- Penetration Testing: Conduct regular penetration tests to identify weaknesses in systems, processes, or personnel.
These controls are designed to be flexible and applicable across various industries, helping organizations prioritize cybersecurity efforts based on their risk profiles[1][2][3].
Citations: [1] https://dev.to/awais_684/implement-cis-top-18-controls-in-your-organization-1j69 [2] https://hyperproof.io/cis-security-controls/ [3] https://www.kiteworks.com/risk-compliance-glossary/cis-controls-v8/ [4] https://www.impactmybiz.com/blog/cisv8-critical-security-controls/ [5] https://blog.netwrix.com/2022/09/16/top-cis-critical-security-controls-for-cyber-defense/ [6] https://www.securitymetrics.com/blog/whats-changed-cis-controls-v8 [7] https://embed-ssl.wistia.com/deliveries/3712ff62cfac074571eb6db3f089be0ca0e0a09c.webp?image_crop_resized=1280x720&sa=X&ved=2ahUKEwjBy_OH_c2KAxWQmYkEHaYnBVkQ_B16BAgEEAI[8] https://www.cisecurity.org/controls
No comments:
Post a Comment