The CIS Critical Security Controls for Effective Cyber Defense

96
The CIS Critical Security Controls for Effective Cyber Defense Version 6.1

Transcript of The CIS Critical Security Controls for Effective Cyber Defense

Page 1: The CIS Critical Security Controls for Effective Cyber Defense

TheCISCriticalSecurityControlsfor

EffectiveCyberDefenseVersion6.1

Page 2: The CIS Critical Security Controls for Effective Cyber Defense

i

TheCenterforInternetSecurityCriticalSecurityControlsforEffectiveCyberDefense

Version6.1August31,2016

ThisworkislicensedunderaCreativeCommonsAttribution-NonCommercial-NoDerivatives4.0InternationalPublicLicense(thelinkcanbefoundathttps://creativecommons.org/licenses/by-nc-nd/4.0/legalcodeTofurtherclarifytheCreativeCommonslicenserelatedtotheCISCriticalSecurityControlscontent,youareauthorizedtocopyandredistributethecontentasaframeworkforusebyyou,withinyourorganizationandoutsideofyourorganizationfornon-commercialpurposesonly,providedthat(i)appropriatecreditisgiventoCIS,and(ii)alinktothelicenseisprovided.Additionally,ifyouremix,transformorbuildupontheCISCriticalSecurityControls,youmaynotdistributethemodifiedmaterials.UsersoftheCISCriticalSecurityControlsframeworkarealsorequiredtoreferto(http://www.cisecurity.org/critical-controls.cfm)whenreferringtotheCISCriticalSecurityControlsinordertoensurethatusersareemployingthemostuptodateguidance.CommercialuseoftheCISCriticalSecurityControlsissubjecttothepriorapprovalofTheCenterforInternetSecurity.

Page 3: The CIS Critical Security Controls for Effective Cyber Defense

ii

TheCISCriticalSecurityControlsforEffectiveCyberDefense

Introduction 1

CSC1:InventoryofAuthorizedandUnauthorizedDevices 6

CSC2:InventoryofAuthorizedandUnauthorizedSoftware 10

CSC3:SecureConfigurationsforHardwareandSoftwareonMobileDevices,Laptops,Workstations,andServers 13

CSC4:ContinuousVulnerabilityAssessmentandRemediation 17

CSC5:ControlledUseofAdministrativePrivileges 21

CSC6:Maintenance,Monitoring,andAnalysisofAuditLogs 24

CSC7:EmailandWebBrowserProtections 27

CSC8:MalwareDefenses 31

CSC9:LimitationandControlofNetworkPorts,Protocols,andServices 34

CSC10:DataRecoveryCapability 36

CSC11:SecureConfigurationsforNetworkDevicessuchasFirewalls,Routers,andSwitches 38

CSC12:BoundaryDefense 41

CSC13:DataProtection 46

CSC14:ControlledAccessBasedontheNeedtoKnow 50

CSC15:WirelessAccessControl 53

CSC16:AccountMonitoringandControl 56

CSC17:SecuritySkillsAssessmentandAppropriateTrainingtoFillGaps 59

CSC18:ApplicationSoftwareSecurity 63

CSC19:IncidentResponseandManagement 66

CSC20:PenetrationTestsandRedTeamExercises 69

AppendixA:EvolvingAnAttackModelfortheCISCriticalSecurityControls. 73

Page 4: The CIS Critical Security Controls for Effective Cyber Defense

iii

AppendixB:AttackTypes 76

AppendixC:TheNISTFrameworkforImprovingCriticalInfrastructureCybersecurity 78

AppendixD:TheNationalCyberHygieneCampaign 80

AppendixE:CriticalGovernanceControlsandtheCISCriticalSecurityControls 81

AppendixF:TowardAPrivacyImpactAssessment(PIA)fortheCISCriticalSecurityControls 85

AppendixG:CategorizationfortheCISCriticalSecurityControls 91

Page 5: The CIS Critical Security Controls for Effective Cyber Defense

1

Introduction

Weareatafascinatingpointintheevolutionofwhatwenowcallcyberdefense.Massivedatalosses,theftofintellectualproperty,creditcardbreaches,identitytheft,threatstoourprivacy,denialofservice–thesehavebecomeawayoflifeforallofusincyberspace.

Ironically,asdefenderswehaveaccesstoanextraordinaryarrayofsecuritytoolsandtechnology,securitystandards,trainingandclasses,certifications,vulnerabilitydatabases,guidance,bestpractices,catalogsofsecuritycontrols,andcountlesssecuritychecklists,benchmarks,andrecommendations.Tohelpusunderstandthethreat,we’veseentheemergenceofthreatinformationfeeds,reports,tools,alertservices,standards,andthreatsharingframeworks.Totopitalloff,wearesurroundedbysecurityrequirements,riskmanagementframeworks,complianceregimes,regulatorymandates,andsoforth.Thereisnoshortageofinformationavailabletosecuritypractitionersonwhattheyshoulddotosecuretheirinfrastructure.

Butallofthistechnology,information,andoversighthasbecomeaveritable“FogofMore”:competingoptions,priorities,opinions,andclaimsthatcanparalyzeordistractanenterprisefromvitalaction.Businesscomplexityisgrowing,dependenciesareexpanding,usersarebecomingmoremobile,andthethreatsareevolving.Newtechnologybringsusgreatbenefits,butitalsomeansthatourdataandapplicationsarenowdistributedacrossmultiplelocations,manyofwhicharenotwithinourorganization’sinfrastructure.Inthiscomplex,interconnectedworld,noenterprisecanthinkofitssecurityasastandaloneproblem.

Sohowcanweasacommunity–thecommunity-at-large,aswellaswithinindustries,sectors,partnerships,andcoalitions–bandtogethertoestablishpriorityofaction,supporteachother,andkeepourknowledgeandtechnologycurrentinthefaceofarapidlyevolvingproblemandanapparentlyinfinitenumberofpossiblesolutions?Whatarethemostcriticalareasweneedtoaddressandhowshouldanenterprisetakethefirststeptomaturetheirriskmanagementprogram?Ratherthanchaseeverynewexceptionalthreatandneglectthefundamentals,howcanwegetontrackwitharoadmapoffundamentals,andguidancetomeasureandimprove? Whichdefensivestepshavethegreatestvalue?

ThesearethekindsofissuesthatledtoandnowdrivetheCISCriticalSecurityControls.Theystartedasagrass-rootsactivitytocutthroughthe“FogofMore”andfocusonthemostfundamentalandvaluableactionsthateveryenterpriseshouldtake.Andvaluehereisdeterminedbyknowledgeanddata–theabilitytoprevent,alert,andrespondtotheattacksthatareplaguingenterprisestoday.

LedbytheCenterforInternetSecurity(CIS),theCISCriticalSecurityControls(“theControls”)havebeenmaturedbyaninternationalcommunityofindividualsandinstitutionsthat:

Page 6: The CIS Critical Security Controls for Effective Cyber Defense

2

• shareinsightintoattacksandattackers,identifyrootcauses,andtranslatethatintoclassesofdefensiveaction;

• documentstoriesofadoptionandsharetoolstosolveproblems;• tracktheevolutionofthreats,thecapabilitiesofadversaries,andcurrentvectorsof

intrusions;• maptheControlstoregulatoryandcomplianceframeworksandbringcollective

priorityandfocustothem;• sharetools,workingaids,andtranslations;and• identifycommonproblems(likeinitialassessmentandimplementationroadmaps)

andsolvethemasacommunityinsteadofalone.

TheseactivitiesensurethattheControlsarenotjustanotherlistofgoodthingstodo,butaprioritized,highlyfocusedsetofactionsthathaveacommunitysupportnetworktomakethemimplementable,usable,scalable,andcompliantwithallindustryorgovernmentsecurityrequirements.

WhytheCISCriticalSecurityControlsWork:MethodologyandContributors

TheCISCriticalSecurityControlsareinformedbyactualattacksandeffectivedefensesandreflectthecombinedknowledgeofexpertsfromeverypartoftheecosystem(companies,governments,individuals);witheveryrole(threatrespondersandanalysts,technologists,vulnerability-finders,toolmakers,solutionproviders,defenders,users,policy-makers,auditors,etc.);andwithinmanysectors(government,power,defense,finance,transportation,academia,consulting,security,IT)whohavebandedtogethertocreate,adopt,andsupporttheControls.Topexpertsfromorganizationspooledtheirextensivefirst-handknowledgefromdefendingagainstactualcyber-attackstoevolvetheconsensuslistofControls,representingthebestdefensivetechniquestopreventortrackthem.ThisensuresthattheControlsarethemosteffectiveandspecificsetoftechnicalmeasuresavailabletodetect,prevent,respond,andmitigatedamagefromthemostcommontothemostadvancedofthoseattacks.

TheControlsarenotlimitedtoblockingtheinitialcompromiseofsystems,butalsoaddressdetectingalready-compromisedmachinesandpreventingordisruptingattackers’follow-onactions.ThedefensesidentifiedthroughtheseControlsdealwithreducingtheinitialattacksurfacebyhardeningdeviceconfigurations,identifyingcompromisedmachinestoaddresslong-termthreatsinsideanorganization’snetwork,disruptingattackers’command-and-controlofimplantedmaliciouscode,andestablishinganadaptive,continuousdefenseandresponsecapabilitythatcanbemaintainedandimproved.

ThefivecriticaltenetsofaneffectivecyberdefensesystemasreflectedintheCISCriticalSecurityControlsare:

TheCenterforInternetSecurity,Inc.(CIS)isa501c3nonprofitorganizationwhosemissionistoidentify,develop,validate,promote,andsustainbestpracticesincybersecurity;deliverworld-classcybersecuritysolutionstopreventandrapidlyrespondtocyberincidents;andbuildandleadcommunitiestoenableanenvironmentoftrustincyberspace.

Foradditionalinformation,goto<http://www.cisecurity.org/>

Page 7: The CIS Critical Security Controls for Effective Cyber Defense

3

Offenseinformsdefense:Useknowledgeofactualattacksthathavecompromisedsystemstoprovidethefoundationtocontinuallylearnfromtheseeventstobuildeffective,practicaldefenses.Includeonlythosecontrolsthatcanbeshowntostopknownreal-worldattacks.Prioritization:InvestfirstinControlsthatwillprovidethegreatestriskreductionandprotectionagainstthemostdangerousthreatactorsandthatcanbefeasiblyimplementedinyourcomputingenvironment.Metrics:Establishcommonmetricstoprovideasharedlanguageforexecutives,ITspecialists,auditors,andsecurityofficialstomeasuretheeffectivenessofsecuritymeasureswithinanorganizationsothatrequiredadjustmentscanbeidentifiedandimplementedquickly.Continuousdiagnosticsandmitigation:Carryoutcontinuousmeasurementtotestandvalidatetheeffectivenessofcurrentsecuritymeasuresandtohelpdrivethepriorityofnextsteps.Automation:Automatedefensessothatorganizationscanachievereliable,scalable,andcontinuousmeasurementsoftheiradherencetotheControlsandrelatedmetrics.

HowtoGetStarted

TheCISCriticalSecurityControlsarearelativelysmallnumberofprioritized,well-vetted,andsupportedsecurityactionsthatorganizationscantaketoassessandimprovetheircurrentsecuritystate.Theyalsochangethediscussionfrom“whatshouldmyenterprisedo”to“whatshouldweALLbedoing”toimprovesecurityacrossabroadscale.

Butthisisnotaone-size-fits-allsolution,ineithercontentorpriority.Youmuststillunderstandwhatiscriticaltoyourbusiness,data,systems,networks,andinfrastructures,andyoumustconsidertheadversaryactionsthatcouldimpactyourabilitytobesuccessfulinthebusinessoroperations.EvenarelativelysmallnumberofControlscannotbeexecutedallatonce,soyouwillneedtodevelopaplanforassessment,implementation,andprocessmanagement.

ControlsCSC1throughCSC5areessentialtosuccessandshouldbeconsideredamongtheveryfirstthingstobedone.Werefertotheseas“FoundationalCyberHygiene”–thebasicthingsthatyoumustdotocreateastrongfoundationforyourdefense.Thisistheapproachtakenby,forexample,theDHSContinuousDiagnosticandMitigation(CDM)Program,oneofthepartnersintheCISCriticalSecurityControls.AsimilarapproachisrecommendedbyourpartnersintheAustralianSignalsDirectorate(ASD)withtheir“TopFourStrategiesto

Page 8: The CIS Critical Security Controls for Effective Cyber Defense

4

MitigateTargetedIntrusions”1–awell-regardedanddemonstrablyeffectivesetofcyber-defenseactionsthatmapverycloselyintotheCISCriticalSecurityControls.ThisalsocloselycorrespondstothemessageoftheUSCERT(ComputerEmergencyReadinessTeam).

Foraplain-language,accessible,andlow-costapproachtotheseideas,considertheCenterforInternetSecurity’s“NationalCyberHygieneCampaign”.(AppendixDandwww.cisecurity.org)

ThisVersionoftheCISCriticalSecurityControls

TheControlsweredevelopedbasedonspecificknowledgeofthethreatenvironmentaswellasthecurrenttechnologiesinthemarketplaceuponwhichourcommunicationsanddatarely.OneofthekeybenefitsoftheControlsisthattheyarenotstatic;theyareupdatedregularlyandaretailoredtoaddressthesecurityissuesoftheday.ThisversionoftheControlsreflectsdeliberationandconsiderationtoensurethateverycontrolandsub-controlisaccurate,essential,conciseandrelevant.

Changesfromversion5.1toVersion6.0includethefollowing:

• Re-orderingsothat“ControlledUseofAdministrativePrivileges”ishigherinpriority(itmovedfromControl#12toControls#5)

• DeletionofControl#19“SecureNetworkEngineering”• NewControl#7“EmailandWebBrowserProtections”• Newcategorizationschemebasedon“families”ofControlsandremovalofthe

“quickwin”categories.• Eachsub-ControlisgroupedintooneofthreeFamilies:

o Systemo Networko Application

• NewappendicesontheNISTCybersecurityFramework,theNationalHygieneCampaignforCyberHygieneandsecuritygovernance.

ChangesfromVersion6.0toVersion6.1includethefollowing:

• Eachsub-Controlisidentifiedaseither“Foundational”or“Advanced”asanaidtoprioritizationandplanning.ThisreplacestheoriginalschemefoundinVersion5butdroppedinVersion6.0.SeeAppendixGforadetailedexplanation.

• Correctionofafewminortyposorformattingerrors.• NochangewasmadetothewordingororderingofanyControlorsub-Control.

1http://www.asd.gov.au/infosec/top-mitigations/top-4-strategies-explained.htm

Page 9: The CIS Critical Security Controls for Effective Cyber Defense

5

Inadditiontotechnicalcontent,theControlshaveanewhomeandnewname.In2015,theCenterforInternetSecurityintegratedwiththeCouncilonCybersecurity,sotheyarenowreferredtoasthe“CISCriticalSecurityControls.”

OtherResources

ThetruepoweroftheControlsisnotaboutcreatingthebestlistofthingstodo,it’saboutharnessingtheexperienceofacommunityofindividualsandenterprisesthatmakesecurityimprovementsthroughprioritization,sharingideas,andcollectiveaction.

Tosupportthis,theCenterforInternetSecurityactsasacatalystandclearinghousetohelpusalllearnfromeachother.PleasecontacttheCenterforInternetSecurityforthefollowingkindsofworkingaidsandothersupportmaterials:

• MappingsfromtheControlstoaverywidevarietyforformalRiskManagementFrameworks(likeFISMA,ISO,etc.).

• UseCasesofenterpriseadoption• PointerstovendorwhitepapersandothermaterialsthatsupporttheControls.• DocumentationonalignmentwiththeNISTCybersecurityFramework.

StructureoftheCISCriticalSecurityControlsDocument

ThepresentationofeachControlinthisdocumentincludesthefollowingelements:

• AdescriptionoftheimportanceoftheControl(WhyisThisControlCritical)inblockingoridentifyingpresenceofattacksandanexplanationofhowattackersactivelyexploittheabsenceofthiscontrol.

• Achartofthespecificactions(“sub-controls”)thatorganizationsaretakingtoimplement,automate,andmeasureeffectivenessofthiscontrol.

• ProceduresandToolsthatenableimplementationandautomation.• SampleEntityRelationshipDiagramsthatshowcomponentsofimplementation.

Inadditiontothisdocument,westronglyrecommend“AMeasurementCompaniontotheCISCriticalSecurityControls”,availablefromtheCenterforInternetSecurity.

Acknowledgements

TheCenterforInternetSecuritywouldliketothankthemanysecurityexpertswhovolunteeredtheirtimeandtalenttosupporttheControlseffort.Manyoftheindividualswhoworkedonthisversioncontinuetolendtheirexpertiseyearafteryear.Weareextremelygratefulfortheirtimeandexpertise.SpecialrecognitionalsogoestoTheSANSInstitute,amajorcontributortotheeffort.

Page 10: The CIS Critical Security Controls for Effective Cyber Defense

6

CSC1:InventoryofAuthorizedandUnauthorizedDevices

Activelymanage(inventory,track,andcorrect)allhardwaredevicesonthenetworksothatonlyauthorizeddevicesaregivenaccess,andunauthorizedandunmanageddevicesarefoundandpreventedfromgainingaccess.

WhyIsThisControlCritical?

Attackers,whocanbelocatedanywhereintheworld,arecontinuouslyscanningtheaddressspaceoftargetorganizations,waitingfornewandunprotectedsystemstobeattachedtothenetwork.Attackersalsolookfordevices(especiallylaptops)whichcomeandgooffoftheenterprise’snetwork,andsogetoutofsynchwithpatchesorsecurityupdates.Attackscantakeadvantageofnewhardwarethatisinstalledonthenetworkoneeveningbutnotconfiguredandpatchedwithappropriatesecurityupdatesuntilthefollowingday.EvendevicesthatarenotvisiblefromtheInternetcanbeusedbyattackerswhohavealreadygainedinternalaccessandarehuntingforinternaljumppointsorvictims.Additionalsystemsthatconnecttotheenterprise’snetwork(e.g.,demonstrationsystems,temporarytestsystems,guestnetworks)shouldalsobemanagedcarefullyand/orisolatedinordertopreventadversarialaccessfromaffectingthesecurityofenterpriseoperations.

Asnewtechnologycontinuestocomeout,BYOD(bringyourowndevice)—whereemployeesbringpersonaldevicesintoworkandconnectthemtotheenterprisenetwork—isbecomingverycommon.Thesedevicescouldalreadybecompromisedandbeusedtoinfectinternalresources.

Managedcontrolofalldevicesalsoplaysacriticalroleinplanningandexecutingsystembackupandrecovery.

CSC1:InventoryofAuthorizedandUnauthorizedDevicesFamily CSC ControlDescription Foun-

dationalAdvanced

System 1.1 Deployanautomatedassetinventorydiscoverytoolanduseittobuildapreliminaryinventoryofsystemsconnectedtoanorganization’spublicandprivatenetwork(s).BothactivetoolsthatscanthroughIPv4orIPv6networkaddressrangesandpassivetoolsthatidentifyhostsbasedonanalyzingtheirtrafficshouldbeemployed.

Y

Useamixofactiveand

passivetools,andapplyaspartofacontinuousmonitoringprogram.

System 1.2 IftheorganizationisdynamicallyassigningaddressesusingDHCP,thendeploydynamichostconfigurationprotocol(DHCP)serverlogging,andusethisinformationtoimprovetheassetinventoryandhelpdetectunknownsystems.

Y

Page 11: The CIS Critical Security Controls for Effective Cyber Defense

7

Family CSC ControlDescription Foun-dational

Advanced

System 1.3 Ensurethatallequipmentacquisitionsautomaticallyupdatetheinventorysystemasnew,approveddevicesareconnectedtothenetwork.

Y

System 1.4 Maintainanassetinventoryofallsystemsconnectedtothenetworkandthenetworkdevicesthemselves,recordingatleastthenetworkaddresses,machinename(s),purposeofeachsystem,anassetownerresponsibleforeachdevice,andthedepartmentassociatedwitheachdevice.TheinventoryshouldincludeeverysystemthathasanInternetprotocol(IP)addressonthenetwork,includingbutnotlimitedtodesktops,laptops,servers,networkequipment(routers,switches,firewalls,etc.),printers,storageareanetworks,VoiceOver-IPtelephones,multi-homedaddresses,virtualaddresses,etc.Theassetinventorycreatedmustalsoincludedataonwhetherthedeviceisaportableand/orpersonaldevice.Devicessuchasmobilephones,tablets,laptops,andotherportableelectronicdevicesthatstoreorprocessdatamustbeidentified,regardlessofwhethertheyareattachedtotheorganization’snetwork.

Y

System 1.5 Deploynetworklevelauthenticationvia802.1xtolimitandcontrolwhichdevicescanbeconnectedtothenetwork.The802.1xmustbetiedintotheinventorydatatodetermineauthorizedversusunauthorizedsystems. Y

Authenticationmechanismsarecloselycoupledto

managementofhardwareinventory

System 1.6 Useclientcertificatestovalidateandauthenticatesystemspriortoconnectingtotheprivatenetwork.

Y

CSC1ProceduresandTools

ThisControlrequiresbothtechnicalandproceduralactions,unitedinaprocessthataccountsforandmanagestheinventoryofhardwareandallassociatedinformationthroughoutitslifecycle.Itlinkstobusinessgovernancebyestablishinginformation/assetownerswhoareresponsibleforeachcomponentofabusinessprocessthatincludesinformation,software,andhardware.Organizationscanuselarge-scale,comprehensiveenterpriseproductstomaintainITassetinventories.Othersusemoremodesttoolstogatherthedatabysweepingthenetwork,andmanagetheresultsseparatelyinadatabase.

MaintainingacurrentandaccurateviewofITassetsisanongoinganddynamicprocess.Organizationscanactivelyscanonaregularbasis,sendingavarietyofdifferentpackettypestoidentifydevicesconnectedtothenetwork.Beforesuchscanningcantakeplace,organizationsshouldverifythattheyhaveadequatebandwidthforsuchperiodicscansby

Page 12: The CIS Critical Security Controls for Effective Cyber Defense

8

consultingloadhistoryandcapacitiesfortheirnetworks.Inconductinginventoryscans,scanningtoolscouldsendtraditionalpingpackets(ICMPEchoRequest)lookingforpingresponsestoidentifyasystematagivenIPaddress.Becausesomesystemsblockinboundpingpackets,inadditiontotraditionalpings,scannerscanalsoidentifydevicesonthenetworkusingtransmissioncontrolprotocol(TCP)synchronize(SYN)oracknowledge(ACK)packets.OncetheyhaveidentifiedIPaddressesofdevicesonthenetwork,somescannersproviderobustfingerprintingfeaturestodeterminetheoperatingsystemtypeofthediscoveredmachine.

Inadditiontoactivescanningtoolsthatsweepthenetwork,otherassetidentificationtoolspassivelylistenonnetworkinterfacesfordevicestoannouncetheirpresencebysendingtraffic.Suchpassivetoolscanbeconnectedtoswitchspanportsatcriticalplacesinthenetworktoviewalldataflowingthroughsuchswitches,maximizingthechanceofidentifyingsystemscommunicatingthroughthoseswitches.

Manyorganizationsalsopullinformationfromnetworkassetssuchasswitchesandroutersregardingthemachinesconnectedtothenetwork.Usingsecurelyauthenticatedandencryptednetworkmanagementprotocols,toolscanretrieveMACaddressesandotherinformationfromnetworkdevicesthatcanbereconciledwiththeorganization’sassetinventoryofservers,workstations,laptops,andotherdevices.OnceMACaddressesareconfirmed,switchesshouldimplement802.1xandNACtoonlyallowauthorizedsystemsthatareproperlyconfiguredtoconnecttothenetwork.

Wirelessdevices(andwiredlaptops)mayperiodicallyjoinanetworkandthendisappear,makingtheinventoryofcurrentlyavailablesystemsverydynamic.Likewise,virtualmachinescanbedifficulttotrackinassetinventorieswhentheyareshutdownorpaused.Additionally,remotemachinesaccessingthenetworkusingvirtualprivatenetwork(VPN)technologymayappearonthenetworkforatime,andthenbedisconnectedfromit.Whetherphysicalorvirtual,eachmachineusinganIPaddressshouldbeincludedinanorganization’sassetinventory.

Page 13: The CIS Critical Security Controls for Effective Cyber Defense

9

CSC1SystemEntityRelationshipDiagram

AssetInventoryDatabase

PublicKeyInfrastructure(PKI)

ComputingSystems

NetworkLevelAuthentication(NLA)

PassiveDeviceDiscovery

ActiveDeviceDiscovery

Alerting/ReportingAnalyticsSystem

Page 14: The CIS Critical Security Controls for Effective Cyber Defense

10

CSC2:InventoryofAuthorizedandUnauthorizedSoftware

Activelymanage(inventory,track,andcorrect)allsoftwareonthenetworksothatonlyauthorizedsoftwareisinstalledandcanexecute,andthatunauthorizedandunmanagedsoftwareisfoundandpreventedfrominstallationorexecution.

WhyIsThisControlCritical?

Attackerscontinuouslyscantargetorganizationslookingforvulnerableversionsofsoftwarethatcanberemotelyexploited.Someattackersalsodistributehostilewebpages,documentfiles,mediafiles,andothercontentviatheirownwebpagesorotherwisetrustworthythird-partysites.Whenunsuspectingvictimsaccessthiscontentwithavulnerablebrowserorotherclient-sideprogram,attackerscompromisetheirmachines,ofteninstallingbackdoorprogramsandbotsthatgivetheattackerlong-termcontrolofthesystem.Somesophisticatedattackersmayusezero-dayexploits,whichtakeadvantageofpreviouslyunknownvulnerabilitiesforwhichnopatchhasyetbeenreleasedbythesoftwarevendor.Withoutproperknowledgeorcontrolofthesoftwaredeployedinanorganization,defenderscannotproperlysecuretheirassets.

Poorlycontrolledmachinesaremorelikelytobeeitherrunningsoftwarethatisunneededforbusinesspurposes(introducingpotentialsecurityflaws),orrunningmalwareintroducedbyanattackerafterasystemiscompromised.Onceasinglemachinehasbeenexploited,attackersoftenuseitasastagingpointforcollectingsensitiveinformationfromthecompromisedsystemandfromothersystemsconnectedtoit.Inaddition,compromisedmachinesareusedasalaunchingpointformovementthroughoutthenetworkandpartneringnetworks.Inthisway,attackersmayquicklyturnonecompromisedmachineintomany.Organizationsthatdonothavecompletesoftwareinventoriesareunabletofindsystemsrunningvulnerableormalicioussoftwaretomitigateproblemsorrootoutattackers.

Managedcontrolofallsoftwarealsoplaysacriticalroleinplanningandexecutingsystembackupandrecovery.

CSC2:InventoryofAuthorizedandUnauthorizedSoftwareFamily CSC ControlDescription Foun-

dationalAdvanced

System 2.1 Devisealistofauthorizedsoftwareandversionthatisrequiredintheenterpriseforeachtypeofsystem,includingservers,workstations,andlaptopsofvariouskindsanduses.Thislistshouldbemonitoredbyfileintegritycheckingtoolstovalidatethattheauthorizedsoftwarehasnotbeenmodified.

Y

Fileintegrityisverifiedaspartofacontinuousmonitoringprogram.

Page 15: The CIS Critical Security Controls for Effective Cyber Defense

11

Family CSC ControlDescription Foun-dational

Advanced

System 2.2 Deployapplicationwhitelistingthatallowssystemstorunsoftwareonlyifitisincludedonthewhitelistandpreventsexecutionofallothersoftwareonthesystem.Thewhitelistmaybeveryextensive(asisavailablefromcommercialwhitelistvendors),sothatusersarenotinconveniencedwhenusingcommonsoftware.Or,forsomespecial-purposesystems(whichrequireonlyasmallnumberofprogramstoachievetheirneededbusinessfunctionality),thewhitelistmaybequitenarrow.

Y

Whitelistapplicationlibraries(suchasDLLs)inadditiontoexecutablebinaries(suchasEXEsandMSIs.

System 2.3 Deploysoftwareinventorytoolsthroughouttheorganizationcoveringeachoftheoperatingsystemtypesinuse,includingservers,workstations,andlaptops.Thesoftwareinventorysystemshouldtracktheversionoftheunderlyingoperatingsystemaswellastheapplicationsinstalledonit.Thesoftwareinventorysystemsmustbetiedintothehardwareassetinventorysoalldevicesandassociatedsoftwarearetrackedfromasinglelocation.

Y

Hardwareandsoftwareinventory

managementarecloselycoupled,andmanagedcentrally.

System 2.4 Virtualmachinesand/orair-gappedsystemsshouldbeusedtoisolateandrunapplicationsthatarerequiredforbusinessoperationsbutbasedonhigherriskshouldnotbeinstalledwithinanetworkedenvironment.

Y

CSC2ProceduresandTools

Whitelistingcanbeimplementedusingacombinationofcommercialwhitelistingtools,policiesorapplicationexecutiontoolsthatcomewithanti-virussuitesandwithWindows.Commercialsoftwareandassetinventorytoolsarewidelyavailableandinuseinmanyenterprisestoday.Thebestofthesetoolsprovideaninventorycheckofhundredsofcommonapplicationsusedinenterprises,pullinginformationaboutthepatchlevelofeachinstalledprogramtoensurethatitisthelatestversionandleveragingstandardizedapplicationnames,suchasthosefoundinthecommonplatformenumerationspecification.

Featuresthatimplementwhitelistsareincludedinmanymodernendpointsecuritysuites.Moreover,commercialsolutionsareincreasinglybundlingtogetheranti-virus,anti-spyware,personalfirewall,andhost-basedintrusiondetectionsystems(IDS)andintrusionpreventionsystems(IPS),alongwithapplicationwhiteandblacklisting.Inparticular,mostendpointsecuritysolutionscanlookatthename,filesystemlocation,and/orcryptographichashofagivenexecutabletodeterminewhethertheapplicationshouldbeallowedtorunontheprotectedmachine.Themosteffectiveofthesetoolsoffercustomwhitelistsbasedonexecutablepath,hash,orregularexpressionmatching.Someeven

Page 16: The CIS Critical Security Controls for Effective Cyber Defense

12

includeagraylistfunctionthatallowsadministratorstodefinerulesforexecutionofspecificprogramsonlybycertainusersandatcertaintimesofday.

CSC2SystemEntityRelationshipDiagram

AssetInventoryDatabase

ComputingSystems

SoftwareInventoryTool

SoftwareWhitelisting

OSVirtualizationSystem

Alerting/ReportingAnalyticsSystem

Page 17: The CIS Critical Security Controls for Effective Cyber Defense

13

CSC3:SecureConfigurationsforHardwareandSoftwareonMobileDevices,Laptops,Workstations,andServers

Establish,implement,andactivelymanage(track,reporton,correct)thesecurityconfigurationoflaptops,servers,andworkstationsusingarigorousconfigurationmanagementandchangecontrolprocessinordertopreventattackersfromexploitingvulnerableservicesandsettings.

WhyIsThisControlCritical?

Asdeliveredbymanufacturersandresellers,thedefaultconfigurationsforoperatingsystemsandapplicationsarenormallygearedtoease-of-deploymentandease-of-use–notsecurity.Basiccontrols,openservicesandports,defaultaccountsorpasswords,older(vulnerable)protocols,pre-installationofunneededsoftware;allcanbeexploitableintheirdefaultstate.

Developingconfigurationsettingswithgoodsecuritypropertiesisacomplextaskbeyondtheabilityofindividualusers,requiringanalysisofpotentiallyhundredsorthousandsofoptionsinordertomakegoodchoices(theProceduresandToolsectionbelowprovidesresourcesforsecureconfigurations).Evenifastronginitialconfigurationisdevelopedandinstalled,itmustbecontinuallymanagedtoavoidsecurity“decay”assoftwareisupdatedorpatched,newsecurityvulnerabilitiesarereported,andconfigurationsare“tweaked”toallowtheinstallationofnewsoftwareorsupportnewoperationalrequirements.Ifnot,attackerswillfindopportunitiestoexploitbothnetwork-accessibleservicesandclientsoftware.

CSC3:SecureConfigurationsforHardwareandSoftwareFamily CSC ControlDescription Foun-

dationalAdvanced

System 3.1 Establishstandardsecureconfigurationsofoperatingsystemsandsoftwareapplications.Standardizedimagesshouldrepresenthardenedversionsoftheunderlyingoperatingsystemandtheapplicationsinstalledonthesystem.Theseimagesshouldbevalidatedandrefreshedonaregularbasistoupdatetheirsecurityconfigurationinlightofrecentvulnerabilitiesandattackvectors.

Y

System 3.2 Followstrictconfigurationmanagement,buildingasecureimagethatisusedtobuildallnewsystemsthataredeployedintheenterprise.Anyexistingsystemthatbecomescompromisedshouldbere-imagedwiththesecurebuild.Regularupdatesorexceptionstothisimageshouldbeintegratedintotheorganization’schangemanagementprocesses.Imagesshouldbecreatedforworkstations,servers,andothersystemtypesusedbytheorganization.

Y

Page 18: The CIS Critical Security Controls for Effective Cyber Defense

14

Family CSC ControlDescription Foun-dational

Advanced

System 3.3 Storethemasterimagesonsecurelyconfiguredservers,validatedwithintegritycheckingtoolscapableofcontinuousinspection,andchangemanagementtoensurethatonlyauthorizedchangestotheimagesarepossible.Alternatively,thesemasterimagescanbestoredinofflinemachines,air-gappedfromtheproductionnetwork,withimagescopiedviasecuremediatomovethembetweentheimagestorageserversandtheproductionnetwork.

Y

Fileintegrityofmasterimagesareverifiedas

partofacontinuousmonitoringprogram.

System 3.4 Performallremoteadministrationofservers,workstation,networkdevices,andsimilarequipmentoversecurechannels.Protocolssuchastelnet,VNC,RDP,orothersthatdonotactivelysupportstrongencryptionshouldonlybeusediftheyareperformedoverasecondaryencryptionchannel,suchasSSL,TLSorIPSEC.

Y

System 3.5 Usefileintegritycheckingtoolstoensurethatcriticalsystemfiles(includingsensitivesystemandapplicationexecutables,libraries,andconfigurations)havenotbeenaltered.Thereportingsystemshould:havetheabilitytoaccountforroutineandexpectedchanges;highlightandalertonunusualorunexpectedalterations;showthehistoryofconfigurationchangesovertimeandidentifywhomadethechange(includingtheoriginallogged-inaccountintheeventofauserIDswitch,suchaswiththesuorsudocommand).Theseintegritychecksshouldidentifysuspicioussystemalterationssuchas:ownerandpermissionschangestofilesordirectories;theuseofalternatedatastreamswhichcouldbeusedtohidemaliciousactivities;andtheintroductionofextrafilesintokeysystemareas(whichcouldindicatemaliciouspayloadsleftbyattackersoradditionalfilesinappropriatelyaddedduringbatchdistributionprocesses).

Y

Fileintegrityofcriticalsystemfilesareverifiedaspartofacontinuousmonitoringprogram.

System 3.6 Implementandtestanautomatedconfigurationmonitoringsystemthatverifiesallremotelytestablesecureconfigurationelements,andalertswhenunauthorizedchangesoccur.Thisincludesdetectingnewlisteningports,newadministrativeusers,changestogroupandlocalpolicyobjects(whereapplicable),andnewservicesrunningonasystem.WheneverpossibleusetoolscompliantwiththeSecurityContentAutomationProtocol(SCAP)inordertostreamlinereportingandintegration.

Y

Page 19: The CIS Critical Security Controls for Effective Cyber Defense

15

Family CSC ControlDescription Foun-dational

Advanced

System 3.7 Deploysystemconfigurationmanagementtools,suchasActiveDirectoryGroupPolicyObjectsforMicrosoftWindowssystemsorPuppetforUNIXsystemsthatwillautomaticallyenforceandredeployconfigurationsettingstosystemsatregularlyscheduledintervals.Theyshouldbecapableoftriggeringredeploymentofconfigurationsettingsonascheduled,manual,orevent-drivenbasis.

Y

CSC3ProceduresandTools

Ratherthanstartfromscratchdevelopingasecuritybaselineforeachsoftwaresystem,organizationsshouldstartfrompubliclydeveloped,vetted,andsupportedsecuritybenchmarks,securityguides,orchecklists.Excellentresourcesinclude:

• TheCenterforInternetSecurityBenchmarksProgram(www.cisecurity.org)• TheNISTNationalChecklistProgram(checklists.nist.gov)

Organizationsshouldaugmentoradjustthesebaselinestosatisfylocalpoliciesandrequirements,butdeviationsandrationaleshouldbedocumentedtofacilitatelaterreviewsoraudits.

Foracomplexenterprise,theestablishmentofasinglesecuritybaselineconfiguration(forexample,asingleinstallationimageforallworkstationsacrosstheentireenterprise)issometimesnotpracticalordeemedunacceptable.Itislikelythatyouwillneedtosupportdifferentstandardizedimages,basedontheproperhardeningtoaddressrisksandneededfunctionalityoftheintendeddeployment(example,awebserverintheDMZvs.anemailorotherapplicationserverintheinternalnetwork).Thenumberofvariationsshouldbekepttoaminimuminordertobetterunderstandandmanagethesecuritypropertiesofeach,butorganizationsthenmustbepreparedtomanagemultiplebaselines.

Commercialand/orfreeconfigurationmanagementtoolscanthenbeemployedtomeasurethesettingsofoperatingsystemsandapplicationsofmanagedmachinestolookfordeviationsfromthestandardimageconfigurations.Typicalconfigurationmanagementtoolsusesomecombinationofanagentinstalledoneachmanagedsystem,oragentlessinspectionofsystemsbyremotelyloggingintoeachmanagedmachineusingadministratorcredentials.Additionally,ahybridapproachissometimesusedwherebyaremotesessionisinitiated,atemporaryordynamicagentisdeployedonthetargetsystemforthescan,andthentheagentisremoved.

Page 20: The CIS Critical Security Controls for Effective Cyber Defense

16

CSC3SystemEntityRelationshipDiagram

ComputingSystems

FileIntegrityAssessment(FIA)

SystemImages&Baselines

SCAPConfigurationScanner

ConfigurationEnforcementSystem

Alerting/ReportingAnalyticsSystem

Page 21: The CIS Critical Security Controls for Effective Cyber Defense

17

CSC4:ContinuousVulnerabilityAssessmentandRemediation

Continuouslyacquire,assess,andtakeactiononnewinformationinordertoidentifyvulnerabilities,remediate,andminimizethewindowofopportunityforattackers.

WhyIsThisControlCritical?

Cyberdefendersmustoperateinaconstantstreamofnewinformation:softwareupdates,patches,securityadvisories,threatbulletins,etc.Understandingandmanagingvulnerabilitieshasbecomeacontinuousactivity,requiringsignificanttime,attention,andresources.

Attackershaveaccesstothesameinformationandcantakeadvantageofgapsbetweentheappearanceofnewknowledgeandremediation.Forexample,whenresearchersreportnewvulnerabilities,aracestartsamongallparties,including:attackers(to“weaponize”,deployanattack,exploit);vendors(todevelop,deploypatchesorsignaturesandupdates),anddefenders(toassessrisk,regression-testpatches,install).

Organizationsthatdonotscanforvulnerabilitiesandproactivelyaddressdiscoveredflawsfaceasignificantlikelihoodofhavingtheircomputersystemscompromised.Defendersfaceparticularchallengesinscalingremediationacrossanentireenterprise,andprioritizingactionswithconflictingpriorities,andsometimes-uncertainsideeffects.

CSC4:ContinuousVulnerabilityAssessmentandRemediationFamily CSC ControlDescription Foun-

dationalAdvanced

System 4.1 Runautomatedvulnerabilityscanningtoolsagainstallsystemsonthenetworkonaweeklyormorefrequentbasisanddeliverprioritizedlistsofthemostcriticalvulnerabilitiestoeachresponsiblesystemadministratoralongwithriskscoresthatcomparetheeffectivenessofsystemadministratorsanddepartmentsinreducingrisk.UseaSCAP-validatedvulnerabilityscannerthatlooksforbothcode-basedvulnerabilities(suchasthosedescribedbyCommonVulnerabilitiesandExposuresentries)andconfiguration-basedvulnerabilities(asenumeratedbytheCommonConfigurationEnumerationProject).

Y

Vulnerabilityriskscoringiscentrally

measuredandmanaged,andintegratedintoactionplanning.

System 4.2 Correlateeventlogswithinformationfromvulnerabilityscanstofulfilltwogoals.First,personnelshouldverifythattheactivityoftheregularvulnerabilityscanningtoolsisitselflogged.Second,personnelshouldbeabletocorrelateattackdetectioneventswithpriorvulnerabilityscanningresultstodeterminewhetherthegivenexploitwasusedagainstatargetknowntobevulnerable.

Y

Page 22: The CIS Critical Security Controls for Effective Cyber Defense

18

Family CSC ControlDescription Foun-dational

Advanced

System 4.3 Performvulnerabilityscanninginauthenticatedmodeeitherwithagentsrunninglocallyoneachendsystemtoanalyzethesecurityconfigurationorwithremotescannersthataregivenadministrativerightsonthesystembeingtested.Useadedicatedaccountforauthenticatedvulnerabilityscans,whichshouldnotbeusedforanyotheradministrativeactivitiesandshouldbetiedtospecificmachinesatspecificIPaddresses.Ensurethatonlyauthorizedemployeeshaveaccesstothevulnerabilitymanagementuserinterfaceandthatrolesareappliedtoeachuser.

Y

System 4.4 Subscribetovulnerabilityintelligenceservicesinordertostayawareofemergingexposures,andusetheinformationgainedfromthissubscriptiontoupdatetheorganization’svulnerabilityscanningactivitiesonatleastamonthlybasis.Alternatively,ensurethatthevulnerabilityscanningtoolsyouuseareregularlyupdatedwithallrelevantimportantsecurityvulnerabilities.

Y

System 4.5 Deployautomatedpatchmanagementtoolsandsoftwareupdatetoolsforoperatingsystemandsoftware/applicationsonallsystemsforwhichsuchtoolsareavailableandsafe.Patchesshouldbeappliedtoallsystems,evensystemsthatareproperlyairgapped.

Y

System 4.6 Monitorlogsassociatedwithanyscanningactivityandassociatedadministratoraccountstoensurethatthisactivityislimitedtothetimeframesoflegitimatescans.

Y

System 4.7 Comparetheresultsfromback-to-backvulnerabilityscanstoverifythatvulnerabilitieswereaddressed,eitherbypatching,implementingacompensatingcontrol,ordocumentingandacceptingareasonablebusinessrisk.Suchacceptanceofbusinessrisksforexistingvulnerabilitiesshouldbeperiodicallyreviewedtodetermineifnewercompensatingcontrolsorsubsequentpatchescanaddressvulnerabilitiesthatwerepreviouslyaccepted,orifconditionshavechanged,increasingtherisk.

Y

System 4.8 Establishaprocesstorisk-ratevulnerabilitiesbasedontheexploitabilityandpotentialimpactofthevulnerability,andsegmentedbyappropriategroupsofassets(example,DMZservers,internalnetworkservers,desktops,laptops).Applypatchesfortheriskiestvulnerabilitiesfirst.Aphasedrolloutcanbeusedtominimizetheimpacttotheorganization.Establishexpectedpatchingtimelinesbasedontheriskratinglevel.

Y

Page 23: The CIS Critical Security Controls for Effective Cyber Defense

19

CSC4ProceduresandTools

Alargenumberofvulnerabilityscanningtoolsareavailabletoevaluatethesecurityconfigurationofsystems.Someenterpriseshavealsofoundcommercialservicesusingremotelymanagedscanningappliancestobeeffective.Tohelpstandardizethedefinitionsofdiscoveredvulnerabilitiesinmultipledepartmentsofanorganizationorevenacrossorganizations,itispreferabletousevulnerabilityscanningtoolsthatmeasuresecurityflawsandmapthemtovulnerabilitiesandissuescategorizedusingoneormoreofthefollowingindustry-recognizedvulnerability,configuration,andplatformclassificationschemesandlanguages:CVE,CCE,OVAL,CPE,CVSS,and/orXCCDF.

Advancedvulnerabilityscanningtoolscanbeconfiguredwithusercredentialstologintoscannedsystemsandperformmorecomprehensivescansthancanbeachievedwithoutlogincredentials.Thefrequencyofscanningactivities,however,shouldincreaseasthediversityofanorganization’ssystemsincreasestoaccountforthevaryingpatchcyclesofeachvendor.

Inadditiontothescanningtoolsthatcheckforvulnerabilitiesandmisconfigurationsacrossthenetwork,variousfreeandcommercialtoolscanevaluatesecuritysettingsandconfigurationsoflocalmachinesonwhichtheyareinstalled.Suchtoolscanprovidefine-grainedinsightintounauthorizedchangesinconfigurationortheinadvertentintroductionofsecurityweaknessesbyadministrators.

Effectiveorganizationslinktheirvulnerabilityscannerswithproblem-ticketingsystemsthatautomaticallymonitorandreportprogressonfixingproblems,andthatmakeunmitigatedcriticalvulnerabilitiesvisibletohigherlevelsofmanagementtoensuretheproblemsaresolved.

Themosteffectivevulnerabilityscanningtoolscomparetheresultsofthecurrentscanwithpreviousscanstodeterminehowthevulnerabilitiesintheenvironmenthavechangedovertime.Securitypersonnelusethesefeaturestoconductvulnerabilitytrendingfrommonthtomonth.

Asvulnerabilitiesrelatedtounpatchedsystemsarediscoveredbyscanningtools,securitypersonnelshoulddetermineanddocumenttheamountoftimethatelapsesbetweenthepublicreleaseofapatchforthesystemandtheoccurrenceofthevulnerabilityscan.Ifthistimewindowexceedstheorganization’sbenchmarksfordeploymentofthegivenpatch’scriticalitylevel,securitypersonnelshouldnotethedelayanddetermineifadeviationwasformallydocumentedforthesystemanditspatch.Ifnot,thesecurityteamshouldworkwithmanagementtoimprovethepatchingprocess.

Additionally,someautomatedpatchingtoolsmaynotdetectorinstallcertainpatchesduetoanerrorbythevendororadministrator.Becauseofthis,allpatchchecksshouldreconcilesystempatcheswithalistofpatcheseachvendorhasannouncedonitswebsite.

Page 24: The CIS Critical Security Controls for Effective Cyber Defense

20

CSC4SystemEntityRelationshipDiagram

ComputingSystems

SCAPVulnerabilityScanner

PatchManagement

Alerting/ReportingAnalyticsSystem

Page 25: The CIS Critical Security Controls for Effective Cyber Defense

21

CSC5:ControlledUseofAdministrativePrivileges

Theprocessesandtoolsusedtotrack/control/prevent/correcttheuse,assignment,andconfigurationofadministrativeprivilegesoncomputers,networks,andapplications.

WhyIsThisControlCritical?

Themisuseofadministrativeprivilegesisaprimarymethodforattackerstospreadinsideatargetenterprise.Twoverycommonattackertechniquestakeadvantageofuncontrolledadministrativeprivileges.Inthefirst,aworkstationuserrunningasaprivilegeduser,isfooledintoopeningamaliciousemailattachment,downloadingandopeningafilefromamaliciouswebsite,orsimplysurfingtoawebsitehostingattackercontentthatcanautomaticallyexploitbrowsers.Thefileorexploitcontainsexecutablecodethatrunsonthevictim’smachineeitherautomaticallyorbytrickingtheuserintoexecutingtheattacker’scontent.Ifthevictimuser’saccounthasadministrativeprivileges,theattackercantakeoverthevictim’smachinecompletelyandinstallkeystrokeloggers,sniffers,andremotecontrolsoftwaretofindadministrativepasswordsandothersensitivedata.Similarattacksoccurwithemail.Anadministratorinadvertentlyopensanemailthatcontainsaninfectedattachmentandthisisusedtoobtainapivotpointwithinthenetworkthatisusedtoattackothersystems.

Thesecondcommontechniqueusedbyattackersiselevationofprivilegesbyguessingorcrackingapasswordforanadministrativeusertogainaccesstoatargetmachine.Ifadministrativeprivilegesarelooselyandwidelydistributed,oridenticaltopasswordsusedonlesscriticalsystems,theattackerhasamucheasiertimegainingfullcontrolofsystems,becausetherearemanymoreaccountsthatcanactasavenuesfortheattackertocompromiseadministrativeprivileges.

CSC5:ControlledUseofAdministrativePrivilegesFamily CSC ControlDescription Foun-

dationalAdvanced

System 5.1 Minimizeadministrativeprivilegesandonlyuseadministrativeaccountswhentheyarerequired.Implementfocusedauditingontheuseofadministrativeprivilegedfunctionsandmonitorforanomalousbehavior.

Y

System 5.2 Useautomatedtoolstoinventoryalladministrativeaccountsandvalidatethateachpersonwithadministrativeprivilegesondesktops,laptops,andserversisauthorizedbyaseniorexecutive.

Y

System 5.3 Beforedeployinganynewdevicesinanetworkedenvironment,changealldefaultpasswordsforapplications,operatingsystems,routers,firewalls,wirelessaccesspoints,andothersystemstohavevaluesconsistentwithadministration-levelaccounts.

Y

Page 26: The CIS Critical Security Controls for Effective Cyber Defense

22

Family CSC ControlDescription Foun-dational

Advanced

System 5.4 Configuresystemstoissuealogentryandalertwhenanaccountisaddedtoorremovedfromadomainadministrators’group,orwhenanewlocaladministratoraccountisaddedonasystem.

Y

System 5.5 Configuresystemstoissuealogentryandalertonanyunsuccessfullogintoanadministrativeaccount. Y

System 5.6 Usemulti-factorauthenticationforalladministrativeaccess,includingdomainadministrativeaccess.Multi-factorauthenticationcanincludeavarietyoftechniques,toincludetheuseofsmartcards,certificates,OneTimePassword(OTP)tokens,biometrics,orothersimilarauthenticationmethods.

Y

System 5.7 Wheremulti-factorauthenticationisnotsupported,useraccountsshallberequiredtouselongpasswordsonthesystem(longerthan14characters).

Y

System 5.8 Administratorsshouldberequiredtoaccessasystemusingafullyloggedandnon-administrativeaccount.Then,onceloggedontothemachinewithoutadministrativeprivileges,theadministratorshouldtransitiontoadministrativeprivilegesusingtoolssuchasSudoonLinux/UNIX,RunAsonWindows,andothersimilarfacilitiesforothertypesofsystems.

Y

System 5.9 Administratorsshalluseadedicatedmachineforalladministrativetasksortasksrequiringelevatedaccess.Thismachineshallbeisolatedfromtheorganization'sprimarynetworkandnotbeallowedInternetaccess.Thismachineshallnotbeusedforreadingemail,composingdocuments,orsurfingtheInternet.

Y

CSC5ProceduresandTools

Built-inoperatingsystemfeaturescanextractlistsofaccountswithsuper-userprivileges,bothlocallyonindividualsystemsandonoveralldomaincontrollers.Toverifythatuserswithhigh-privilegedaccountsdonotusesuchaccountsforday-to-daywebsurfingandemailreading,securitypersonnelshouldperiodicallygatheralistofrunningprocessestodeterminewhetheranybrowsersoremailreadersarerunningwithhighprivileges.Suchinformationgatheringcanbescripted,withshortshellscriptssearchingforadozenormoredifferentbrowsers,emailreaders,anddocumenteditingprogramsrunningwithhighprivilegesonmachines.Somelegitimatesystemadministrationactivitymayrequiretheexecutionofsuchprogramsovertheshortterm,butlong-termorfrequentuseofsuchprogramswithadministrativeprivilegescouldindicatethatanadministratorisnotadheringtothiscontrol.

Page 27: The CIS Critical Security Controls for Effective Cyber Defense

23

Toenforcetherequirementforstrongpasswords,built-inoperatingsystemfeaturesforminimumpasswordlengthcanbeconfiguredtopreventusersfromchoosingshortpasswords.Toenforcepasswordcomplexity(requiringpasswordstobeastringofpseudo-randomcharacters),built-inoperatingsystemsettingsorthird-partypasswordcomplexityenforcementtoolscanbeapplied.

CSC5SystemEntityRelationshipDiagram

ComputingSystems

AuthenticationSystem

Identity&AccessManagementSystem Workforce

Members

Alerting/ReportingAnalyticsSystem

DedicatedAdministrationSystems

Page 28: The CIS Critical Security Controls for Effective Cyber Defense

24

CSC6:Maintenance,Monitoring,andAnalysisofAuditLogs

Collect,manage,andanalyzeauditlogsofeventsthatcouldhelpdetect,understand,orrecoverfromanattack.

WhyIsThisControlCritical?

Deficienciesinsecurityloggingandanalysisallowattackerstohidetheirlocation,malicioussoftware,andactivitiesonvictimmachines.Evenifthevictimsknowthattheirsystemshavebeencompromised,withoutprotectedandcompleteloggingrecordstheyareblindtothedetailsoftheattackandtosubsequentactionstakenbytheattackers.Withoutsolidauditlogs,anattackmaygounnoticedindefinitelyandtheparticulardamagesdonemaybeirreversible.

Sometimesloggingrecordsaretheonlyevidenceofasuccessfulattack.Manyorganizationskeepauditrecordsforcompliancepurposes,butattackersrelyonthefactthatsuchorganizationsrarelylookattheauditlogs,sotheydonotknowthattheirsystemshavebeencompromised.Becauseofpoorornonexistentloganalysisprocesses,attackerssometimescontrolvictimmachinesformonthsoryearswithoutanyoneinthetargetorganizationknowing,eventhoughtheevidenceoftheattackhasbeenrecordedinunexaminedlogfiles.

CSC6:Maintenance,Monitoring,andAnalysisofAuditLogsFamily CSC ControlDescription Foun-

dationalAdvanced

System 6.1 Includeatleasttwosynchronizedtimesourcesfromwhichallserversandnetworkequipmentretrievetimeinformationonaregularbasissothattimestampsinlogsareconsistent.

Y

System 6.2 Validateauditlogsettingsforeachhardwaredeviceandthesoftwareinstalledonit,ensuringthatlogsincludeadate,timestamp,sourceaddresses,destinationaddresses,andvariousotherusefulelementsofeachpacketand/ortransaction.SystemsshouldrecordlogsinastandardizedformatsuchassyslogentriesorthoseoutlinedbytheCommonEventExpressioninitiative.Ifsystemscannotgeneratelogsinastandardizedformat,lognormalizationtoolscanbedeployedtoconvertlogsintosuchaformat.

Y

System 6.3 Ensurethatallsystemsthatstorelogshaveadequatestoragespaceforthelogsgeneratedonaregularbasis,sothatlogfileswillnotfillupbetweenlogrotationintervals.Thelogsmustbearchivedanddigitallysignedonaperiodicbasis.

Y

System 6.4 Havesecuritypersonneland/orsystemadministratorsrunbiweeklyreportsthatidentifyanomaliesinlogs.Theyshouldthenactivelyreviewtheanomalies,documentingtheirfindings.

Y

Page 29: The CIS Critical Security Controls for Effective Cyber Defense

25

Family CSC ControlDescription Foun-dational

Advanced

System 6.5 Configurenetworkboundarydevices,includingfirewalls,network-basedIPS,andinboundandoutboundproxies,toverboselylogalltraffic(bothallowedandblocked)arrivingatthedevice.

Y

System 6.6 DeployaSIEM(SecurityInformationandEventManagement)orloganalytictoolsforlogaggregationandconsolidationfrommultiplemachinesandforlogcorrelationandanalysis.UsingtheSIEMtool,systemadministratorsandsecuritypersonnelshoulddeviseprofilesofcommoneventsfromgivensystemssothattheycantunedetectiontofocusonunusualactivity,avoidfalsepositives,morerapidlyidentifyanomalies,andpreventoverwhelminganalystswithinsignificantalerts.

Y

CSC6ProceduresandTools

Mostfreeandcommercialoperatingsystems,networkservices,andfirewalltechnologiesofferloggingcapabilities.Suchloggingshouldbeactivated,withlogssenttocentralizedloggingservers.Firewalls,proxies,andremoteaccesssystems(VPN,dial-up,etc.)shouldallbeconfiguredforverboselogging,storingalltheinformationavailableforloggingintheeventafollow-upinvestigationisrequired.Furthermore,operatingsystems,especiallythoseofservers,shouldbeconfiguredtocreateaccesscontrollogswhenauserattemptstoaccessresourceswithouttheappropriateprivileges.Toevaluatewhethersuchloggingisinplace,anorganizationshouldperiodicallyscanthroughitslogsandcomparethemwiththeassetinventoryassembledaspartofCriticalControl1inordertoensurethateachmanageditemactivelyconnectedtothenetworkisperiodicallygeneratinglogs.

AnalyticalprogramssuchasSIM/SEMsolutionsforreviewinglogscanprovidevalue,butthecapabilitiesemployedtoanalyzeauditlogsarequiteextensive,evenincluding,importantly,justacursoryexaminationbyaperson.Actualcorrelationtoolscanmakeauditlogsfarmoreusefulforsubsequentmanualinspection.Suchtoolscanbequitehelpfulinidentifyingsubtleattacks.However,thesetoolsareneitherapanaceanorareplacementforskilledinformationsecuritypersonnelandsystemadministrators.Evenwithautomatedloganalysistools,humanexpertiseandintuitionareoftenrequiredtoidentifyandunderstandattacks.

Page 30: The CIS Critical Security Controls for Effective Cyber Defense

26

CSC6SystemEntityRelationshipDiagram

ComputingSystems

NetworkTimeProtocol(NTP)System

Alerting/ReportingAnalyticsSystem

Page 31: The CIS Critical Security Controls for Effective Cyber Defense

27

CSC7:EmailandWebBrowserProtections

Minimizetheattacksurfaceandtheopportunitiesforattackerstomanipulatehumanbehaviorthoughtheirinteractionwithwebbrowsersandemailsystems.

WhyIsThisControlCritical?

Webbrowsersandemailclientsareverycommonpointsofentryandattackbecauseoftheirhightechnicalcomplexityandflexibility,andtheirdirectinteractionwithusersandwiththeothersystemsandwebsites.Contentcanbecraftedtoenticeorspoofusersintotakingactionsthatgreatlyincreaseriskandallowintroductionofmaliciouscode,lossofvaluabledata,andotherattacks.

CSC7:EmailandWebBrowserProtectionsFamily CSC ControlDescription Foun-

dationalAdvanced

System 7.1 Ensurethatonlyfullysupportedwebbrowsersandemailclientsareallowedtoexecuteintheorganization,ideallyonlyusingthelatestversionofthebrowsersprovidedbythevendorinordertotakeadvantageofthelatestsecurityfunctionsandfixes.

Y

System 7.2 Uninstallordisableanyunnecessaryorunauthorizedbrowseroremailclientpluginsoradd-onapplications.Eachpluginshallutilizeapplication/URLwhitelistingandonlyallowtheuseoftheapplicationforpre-approveddomains.

Y

System 7.3 Limittheuseofunnecessaryscriptinglanguagesinallwebbrowsersandemailclients.ThisincludestheuseoflanguagessuchasActiveXandJavaScriptonsystemswhereitisunnecessarytosupportsuchcapabilities.

Y

System 7.4 LogallURLrequestsfromeachoftheorganization'ssystems,whetheronsiteoramobiledevice,inordertoidentifypotentiallymaliciousactivityandassistincidenthandlerswithidentifyingpotentiallycompromisedsystems.

Y Includemobiledevices.

System 7.5 Deploytwoseparatebrowserconfigurationstoeachsystem.Oneconfigurationshoulddisabletheuseofallplugins,unnecessaryscriptinglanguages,andgenerallybeconfiguredwithlimitedfunctionalityandbeusedforgeneralwebbrowsing.Theotherconfigurationshallallowformorebrowserfunctionalitybutshouldonlybeusedtoaccessspecificwebsitesthatrequiretheuseofsuchfunctionality.

Y

Page 32: The CIS Critical Security Controls for Effective Cyber Defense

28

Family CSC ControlDescription Foun-dational

Advanced

System 7.6 TheorganizationshallmaintainandenforcenetworkbasedURLfiltersthatlimitasystem'sabilitytoconnecttowebsitesnotapprovedbytheorganization.TheorganizationshallsubscribetoURLcategorizationservicestoensurethattheyareup-to-datewiththemostrecentwebsitecategorydefinitionsavailable.Uncategorizedsitesshallbeblockedbydefault.Thisfilteringshallbeenforcedforeachoftheorganization'ssystems,whethertheyarephysicallyatanorganization'sfacilitiesornot.

Y

System 7.7 Tolowerthechanceofspoofedemailmessages,implementtheSenderPolicyFramework(SPF)bydeployingSPFrecordsinDNSandenablingreceiver-sideverificationinmailservers.

Y

System 7.8 Scanandblockallemailattachmentsenteringtheorganization'semailgatewayiftheycontainmaliciouscodeorfiletypesthatareunnecessaryfortheorganization'sbusiness.Thisscanningshouldbedonebeforetheemailisplacedintheuser'sinbox.Thisincludesemailcontentfilteringandwebcontentfiltering.

Y

CSC7ProceduresandTools

WebBrowser

Mostwebbrowserstodayhavebasicsecurityfeatures,butitisnotadequatetorelyononeaspectofsecurity.Awebserverismadeupoflayersthatprovidemultipleavenuesofattack.Thefoundationofanywebbrowseristheoperatingsystemandthesecrettoensuringthatitremainssecureissimple:keepitupdatedwiththelatestsecuritypatches.Ensurethatyourpatchesareup-to-dateandinstalledproperly,asanyserverrunningoldpatcheswillbecomeavictim.

Updateanysoftwarecomponentsthatrunonawebserver.Anythingthatisnon-essential,suchasDNSserversandremoteadministrationtoolslikeVNCorRemoteDesktop,shouldbedisabledorremoved.Ifremoteadministrationtoolsareessential,however,thenavoidusingdefaultpasswordsoranythingthatcanbeeasilyguessed.Thisisnotonlyapplicableforremoteaccesstools,butuseraccounts,switchesandroutersaswell.

Aflexiblefirewallisoneofthestrongestformsofdefenseagainstsecuritybreaches.Whenawebserveristargetedtheattackwillattempttouploadhackingtoolsormalwareimmediately,soastotakeadvantageofthesecuritybreachbeforeitisfixed.Withoutagoodanti-viruspackage,abreachinsecuritycangounnoticedforasignificantamountoftime.

Page 33: The CIS Critical Security Controls for Effective Cyber Defense

29

Cybercriminalscanexploitcookiesinmaliciousways.Changingyourbrowsersettingstoblockthirdpartycookieswillhelpreducethisrisk.Theautocompleteorautofillfeaturesaveskeystrokesbystoringinformationyourecentlytyped.However,autocompleteforlogininformationposesabigriskifyourlaptopislostorstolen.Andrestrictingadd-onstoanabsoluteminimumwillreducetheattacksurface.Add-onscanharbormalwareandincreasethepossibilitiesforattackingyourbrowser.Configureyourbrowserstopreventthemfrominstallingadd-onswithoutaprompt.

Mostpopularbrowsersemployadatabaseofphishingand/ormalwaresitestoprotectagainstthemostcommonthreats.Makesurethatyouandyourusersenablecontentfilters.Andturnonthepopupblockers.Popupsarenotonlyannoying,theyalsocanhostembeddedmalwaredirectlyorlureusersintoclickingonsomethingusingsocialengineeringtricks.Besurethatyourselectedbrowserhaspopupblockingenabled

EmailEmailrepresentsonethemostinteractivewayshumansworkwithcomputers,encouragingtherightbehaviorisjustasimportantasthetechnicalsettings.

Passwordscontainingcommonwordsorphrasesareeasytocrack.Ensurecomplexpasswordsarecreated;acombinationofletters,numbersandspecialcharactersiscomplexenough.Passwordsshouldbechangedonaregularbasis,every45-60days.

Implementingtwo-factorauthenticationisanotherwaytoensuretheuserisauthentic,reducingtheattacksurface.Usingaspam-filteringtoolreducesthenumberofmaliciousemailsthatcomeintoyournetwork.InitiatingaSenderPolicyFrameworktoverifythatthedomainanemailiscomingfromisauthentic,helpsreduceSpamandPhishingactivities.Installinganencryptiontooltosecureemailandcommunicationsaddsanotherlayerofuserandnetworkedbasedsecurity.

Page 34: The CIS Critical Security Controls for Effective Cyber Defense

30

CSC7SystemEntityRelationshipDiagram

NetworkDevices

Alerting/ReportingAnalyticsSystem ConfigurationEnforcementSystem

URL/EmailFilteringProxySystem

Page 35: The CIS Critical Security Controls for Effective Cyber Defense

31

CSC8:MalwareDefenses

Controltheinstallation,spread,andexecutionofmaliciouscodeatmultiplepointsintheenterprise,whileoptimizingtheuseofautomationtoenablerapidupdatingofdefense,datagathering,andcorrectiveaction.

WhyIsThisControlCritical?

MalicioussoftwareisanintegralanddangerousaspectofInternetthreats,andcanbedesignedtoattackyoursystems,devices,oryourdata.Itcanbefast-moving,fast-changing,andenterthroughanynumberofpointslikeend-userdevices,emailattachments,webpages,cloudservices,useractions,andremovablemedia.Modernmalwarecanbedesignedtoavoiddefenses,ortoattackordisablethem.

Malwaredefensesmustbeabletooperateinthisdynamicenvironmentthroughlarge-scaleautomation,rapidupdating,andintegrationwithprocesseslikeIncidentResponse.Theymustalsobedeployedatmultiplepossiblepoints-of-attacktodetect,stopthemovementof,orcontroltheexecutionofmalicioussoftware.Enterpriseendpointsecuritysuitesprovideadministrativefeaturestoverifythatalldefensesareactiveandcurrentoneverymanagedsystem.

CSC8:MalwareDefensesFamily CSC ControlDescription Foun-

dationalAdvanced

System 8.1 Employautomatedtoolstocontinuouslymonitorworkstations,servers,andmobiledeviceswithanti-virus,anti-spyware,personalfirewalls,andhost-basedIPSfunctionality.Allmalwaredetectioneventsshouldbesenttoenterpriseanti-malwareadministrationtoolsandeventlogservers.

Y

System 8.2 Employanti-malwaresoftwarethatoffersacentralizedinfrastructurethatcompilesinformationonfilereputationsorhaveadministratorsmanuallypushupdatestoallmachines.Afterapplyinganupdate,automatedsystemsshouldverifythateachsystemhasreceiveditssignatureupdate.

Y

System 8.3 Limituseofexternaldevicestothosewithanapproved,documentedbusinessneed.Monitorforuseandattempteduseofexternaldevices.Configurelaptops,workstations,andserverssothattheywillnotauto-runcontentfromremovablemedia,likeUSBtokens(i.e.,“thumbdrives”),USBharddrives,CDs/DVDs,FireWiredevices,externalserialadvancedtechnologyattachmentdevices,andmountednetworkshares.Configuresystemssothattheyautomaticallyconductananti-malwarescanofremovablemediawheninserted.

Y

Activelymonitortheuseof

externaldevices(inadditionto

logging).

Page 36: The CIS Critical Security Controls for Effective Cyber Defense

32

Family CSC ControlDescription Foun-dational

Advanced

System 8.4 Enableanti-exploitationfeaturessuchasDataExecutionPrevention(DEP),AddressSpaceLayoutRandomization(ASLR),virtualization/containerization,etc.Forincreasedprotection,deploycapabilitiessuchasEnhancedMitigationExperienceToolkit(EMET)thatcanbeconfiguredtoapplytheseprotectionstoabroadersetofapplicationsandexecutables.

Y

System 8.5 Usenetwork-basedanti-malwaretoolstoidentifyexecutablesinallnetworktrafficandusetechniquesotherthansignature-baseddetectiontoidentifyandfilteroutmaliciouscontentbeforeitarrivesattheendpoint.

Y

System 8.6 Enabledomainnamesystem(DNS)queryloggingtodetecthostnamelookupforknownmaliciousC2domains. Y

CSC8ProceduresandTools

Toensureanti-virussignaturesareuptodate,organizationsuseautomation.Theyusethebuilt-inadministrativefeaturesofenterpriseendpointsecuritysuitestoverifythatanti-virus,anti-spyware,andhost-basedIDSfeaturesareactiveoneverymanagedsystem.Theyrunautomatedassessmentsdailyandreviewtheresultstofindandmitigatesystemsthathavedeactivatedsuchprotections,aswellassystemsthatdonothavethelatestmalwaredefinitions.

Someenterprisesdeployfreeorcommercialhoneypotand“tarpit”toolstoidentifyattackersintheirenvironment.Securitypersonnelshouldcontinuouslymonitorthesetoolstodeterminewhethertrafficisdirectedtothemandaccountloginsareattempted.Whentheyidentifysuchevents,thesepersonnelshouldgatherthesourceaddressfromwhichthistrafficoriginatesandotherdetailsassociatedwiththeattackforfollow-oninvestigation.

Page 37: The CIS Critical Security Controls for Effective Cyber Defense

33

CSC8SystemEntityRelationshipDiagram

ComputingSystems

NetworkMalwareDetection

EndPointProtectionSoftware/EMET

Alerting/ReportingAnalyticsSystem

Page 38: The CIS Critical Security Controls for Effective Cyber Defense

34

CSC9:LimitationandControlofNetworkPorts,Protocols,andServices

Manage(track/control/correct)theongoingoperationaluseofports,protocols,andservicesonnetworkeddevicesinordertominimizewindowsofvulnerabilityavailabletoattackers.

WhyIsThisControlCritical?

Attackerssearchforremotelyaccessiblenetworkservicesthatarevulnerabletoexploitation.Commonexamplesincludepoorlyconfiguredwebservers,mailservers,fileandprintservices,anddomainnamesystem(DNS)serversinstalledbydefaultonavarietyofdifferentdevicetypes,oftenwithoutabusinessneedforthegivenservice.Manysoftwarepackagesautomaticallyinstallservicesandturnthemonaspartoftheinstallationofthemainsoftwarepackagewithoutinformingauseroradministratorthattheserviceshavebeenenabled.Attackersscanforsuchissuesandattempttoexploittheseservices,oftenattemptingdefaultuserIDsandpasswordsorwidelyavailableexploitationcode.

CSC9:LimitationandControlofNetworkPortsFamily CSC ControlDescription Foun-

dationalAdvanced

System 9.1 Ensurethatonlyports,protocols,andserviceswithvalidatedbusinessneedsarerunningoneachsystem. Y

System 9.2 Applyhost-basedfirewallsorportfilteringtoolsonendsystems,withadefault-denyrulethatdropsalltrafficexceptthoseservicesandportsthatareexplicitlyallowed.

Y

System 9.3 Performautomatedportscansonaregularbasisagainstallkeyserversandcomparetoaknowneffectivebaseline.Ifachangethatisnotlistedontheorganization’sapprovedbaselineisdiscovered,analertshouldbegeneratedandreviewed.

Y

System 9.4 VerifyanyserverthatisvisiblefromtheInternetoranuntrustednetwork,andifitisnotrequiredforbusinesspurposes,moveittoaninternalVLANandgiveitaprivateaddress.

Y

System 9.5 Operatecriticalservicesonseparatephysicalorlogicalhostmachines,suchasDNS,file,mail,web,anddatabaseservers. Y

System 9.6 Placeapplicationfirewallsinfrontofanycriticalserverstoverifyandvalidatethetrafficgoingtotheserver.Anyunauthorizedservicesortrafficshouldbeblockedandanalertgenerated.

Y

Page 39: The CIS Critical Security Controls for Effective Cyber Defense

35

CSC9ProceduresandTools

Portscanningtoolsareusedtodeterminewhichservicesarelisteningonthenetworkforarangeoftargetsystems.Inadditiontodeterminingwhichportsareopen,effectiveportscannerscanbeconfiguredtoidentifytheversionoftheprotocolandservicelisteningoneachdiscoveredopenport.Thislistofservicesandtheirversionsarecomparedagainstaninventoryofservicesrequiredbytheorganizationforeachserverandworkstationinanassetmanagementsystem.Recentlyaddedfeaturesintheseportscannersarebeingusedtodeterminethechangesinservicesofferedbyscannedmachinesonthenetworksincethepreviousscan,helpingsecuritypersonnelidentifydifferencesovertime.

CSC9SystemEntityRelationshipDiagram

ComputingSystems

SCAPVulnerabilityScanner

Host/ApplicationFirewallSystems

Alerting/ReportingAnalyticsSystem

Page 40: The CIS Critical Security Controls for Effective Cyber Defense

36

CSC10:DataRecoveryCapability

Theprocessesandtoolsusedtoproperlybackupcriticalinformationwithaprovenmethodologyfortimelyrecoveryofit.

WhyIsThisControlCritical?

Whenattackerscompromisemachines,theyoftenmakesignificantchangestoconfigurationsandsoftware.Sometimesattackersalsomakesubtlealterationsofdatastoredoncompromisedmachines,potentiallyjeopardizingorganizationaleffectivenesswithpollutedinformation.Whentheattackersarediscovered,itcanbeextremelydifficultfororganizationswithoutatrustworthydatarecoverycapabilitytoremoveallaspectsoftheattacker’spresenceonthemachine.

CSC10:DataRecoveryCapabilityFamily CSC ControlDescription Foun-

dationalAdvanced

System 10.1 Ensurethateachsystemisautomaticallybackeduponatleastaweeklybasis,andmoreoftenforsystemsstoringsensitiveinformation.Tohelpensuretheabilitytorapidlyrestoreasystemfrombackup,theoperatingsystem,applicationsoftware,anddataonamachineshouldeachbeincludedintheoverallbackupprocedure.Thesethreecomponentsofasystemdonothavetobeincludedinthesamebackupfileorusethesamebackupsoftware.Thereshouldbemultiplebackupsovertime,sothatintheeventofmalwareinfection,restorationcanbefromaversionthatisbelievedtopredatetheoriginalinfection.Allbackuppoliciesshouldbecompliantwithanyregulatoryorofficialrequirements.

Y

System 10.2 Testdataonbackupmediaonaregularbasisbyperformingadatarestorationprocesstoensurethatthebackupisproperlyworking.

Y

System 10.3 Ensurethatbackupsareproperlyprotectedviaphysicalsecurityorencryptionwhentheyarestored,aswellaswhentheyaremovedacrossthenetwork.Thisincludesremotebackupsandcloudservices.

Y

System 10.4 Ensurethatkeysystemshaveatleastonebackupdestinationthatisnotcontinuouslyaddressablethroughoperatingsystemcalls.ThiswillmitigatetheriskofattackslikeCryptoLockerwhichseektoencryptordamagedataonalladdressabledatashares,includingbackupdestinations.

Y

Page 41: The CIS Critical Security Controls for Effective Cyber Defense

37

CSC10ProceduresandTools

Onceperquarter(orwhenevernewbackupequipmentispurchased),atestingteamshouldevaluatearandomsampleofsystembackupsbyattemptingtorestorethemonatestbedenvironment.Therestoredsystemsshouldbeverifiedtoensurethattheoperatingsystem,application,anddatafromthebackupareallintactandfunctional.

Intheeventofmalwareinfection,restorationproceduresshoulduseaversionofthebackupthatisbelievedtopredatetheoriginalinfection.

CSC10SystemEntityRelationshipDiagram

ComputingSystems

DataBackupSystem

Offsite/OfflineBackups

Alerting/ReportingAnalyticsSystem

Page 42: The CIS Critical Security Controls for Effective Cyber Defense

38

CSC11:SecureConfigurationsforNetworkDevicessuchasFirewalls,Routers,andSwitches

Establish,implement,andactivelymanage(track,reporton,correct)thesecurityconfigurationofnetworkinfrastructuredevicesusingarigorousconfigurationmanagementandchangecontrolprocessinordertopreventattackersfromexploitingvulnerableservicesandsettings.

WhyIsThisControlCritical?

Asdeliveredfrommanufacturersandresellers,thedefaultconfigurationsfornetworkinfrastructuredevicesaregearedforease-of-deploymentandease-of-use–notsecurity.Openservicesandports,defaultaccounts(includingserviceaccounts)orpasswords,supportforolder(vulnerable)protocols,pre-installationofunneededsoftware;allcanbeexploitableintheirdefaultstate.

Attackerstakeadvantageofnetworkdevicesbecominglesssecurelyconfiguredovertimeasusersdemandexceptionsforspecificbusinessneeds.Sometimestheexceptionsaredeployedandthenleftundonewhentheyarenolongerapplicabletothebusinessneeds.Insomecases,thesecurityriskoftheexceptionisneitherproperlyanalyzednormeasuredagainsttheassociatedbusinessneedandcanchangeovertime.Attackerssearchforvulnerabledefaultsettings,electronicholesinfirewalls,routers,andswitchesandusethosetopenetratedefenses.Theyexploitflawsinthesedevicestogainaccesstonetworks,redirecttrafficonanetwork,andinterceptinformationwhileintransmission.Throughsuchactions,theattackergainsaccesstosensitivedata,altersimportantinformation,orevenusesacompromisedmachinetoposeasanothertrustedsystemonthenetwork.

CSC11:SecureConfigurationsforNetworkDevicesFamily CSC ControlDescription Foun-

dationalAdvanced

Network 11.1 Comparefirewall,router,andswitchconfigurationagainststandardsecureconfigurationsdefinedforeachtypeofnetworkdeviceinuseintheorganization.Thesecurityconfigurationofsuchdevicesshouldbedocumented,reviewed,andapprovedbyanorganizationchangecontrolboard.Anydeviationsfromthestandardconfigurationorupdatestothestandardconfigurationshouldbedocumentedandapprovedinachangecontrolsystem.

Y

Page 43: The CIS Critical Security Controls for Effective Cyber Defense

39

Family CSC ControlDescription Foun-dational

Advanced

Network 11.2 Allnewconfigurationrulesbeyondabaseline-hardenedconfigurationthatallowtraffictoflowthroughnetworksecuritydevices,suchasfirewallsandnetwork-basedIPS,shouldbedocumentedandrecordedinaconfigurationmanagementsystem,withaspecificbusinessreasonforeachchange,aspecificindividual’snameresponsibleforthatbusinessneed,andanexpecteddurationoftheneed.

Y

Network 11.3 Useautomatedtoolstoverifystandarddeviceconfigurationsanddetectchanges.Allalterationstosuchfilesshouldbeloggedandautomaticallyreportedtosecuritypersonnel.

Y

Network 11.4 Managenetworkdevicesusingtwo-factorauthenticationandencryptedsessions. Y

Network 11.5 Installthelateststableversionofanysecurity-relatedupdatesonallnetworkdevices. Y

Network 11.6 Networkengineersshalluseadedicatedmachineforalladministrativetasksortasksrequiringelevatedaccess.Thismachineshallbeisolatedfromtheorganization'sprimarynetworkandnotbeallowedInternetaccess.Thismachineshallnotbeusedforreadingemail,composingdocuments,orsurfingtheInternet.

Y

Network 11.7 Managethenetworkinfrastructureacrossnetworkconnectionsthatareseparatedfromthebusinessuseofthatnetwork,relyingonseparateVLANsor,preferably,onentirelydifferentphysicalconnectivityformanagementsessionsfornetworkdevices.

Y

CSC11ProceduresandTools

Someorganizationsusecommercialtoolsthatevaluatetherulesetofnetworkfilteringdevicestodeterminewhethertheyareconsistentorinconflict,providinganautomatedsanitycheckofnetworkfiltersandsearchforerrorsinrulesetsoraccesscontrolslists(ACLs)thatmayallowunintendedservicesthroughthedevice.Suchtoolsshouldberuneachtimesignificantchangesaremadetofirewallrulesets,routerACLs,orotherfilteringtechnologies.

Page 44: The CIS Critical Security Controls for Effective Cyber Defense

40

CSC11SystemEntityRelationshipDiagram

NetworkDeviceManagementSystem

NetworkDevices

Alerting/ReportingAnalyticsSystem

DedicatedAdministrationSystems

AuthenticationSystem

Page 45: The CIS Critical Security Controls for Effective Cyber Defense

41

CSC12:BoundaryDefense

Detect/prevent/correcttheflowofinformationtransferringnetworksofdifferenttrustlevelswithafocusonsecurity-damagingdata.

WhyIsThisControlCritical?

AttackersfocusonexploitingsystemsthattheycanreachacrosstheInternet,includingnotonlyDMZsystemsbutalsoworkstationandlaptopcomputersthatpullcontentfromtheInternetthroughnetworkboundaries.Threatssuchasorganizedcrimegroupsandnation-statesuseconfigurationandarchitecturalweaknessesfoundonperimetersystems,networkdevices,andInternet-accessingclientmachinestogaininitialaccessintoanorganization.Then,withabaseofoperationsonthesemachines,attackersoftenpivottogetdeeperinsidetheboundarytostealorchangeinformationortosetupapersistentpresenceforlaterattacksagainstinternalhosts.Additionally,manyattacksoccurbetweenbusinesspartnernetworks,sometimesreferredtoasextranets,asattackershopfromoneorganization’snetworktoanother,exploitingvulnerablesystemsonextranetperimeters.

Tocontroltheflowoftrafficthroughnetworkbordersandpolicecontentbylookingforattacksandevidenceofcompromisedmachines,boundarydefensesshouldbemulti-layered,relyingonfirewalls,proxies,DMZperimeternetworks,andnetwork-basedIPSandIDS.Itisalsocriticaltofilterbothinboundandoutboundtraffic.

Itshouldbenotedthatboundarylinesbetweeninternalandexternalnetworksarediminishingasaresultofincreasedinterconnectivitywithinandbetweenorganizationsaswellastherapidriseindeploymentofwirelesstechnologies.Theseblurringlinessometimesallowattackerstogainaccessinsidenetworkswhilebypassingboundarysystems.However,evenwiththisblurringofboundaries,effectivesecuritydeploymentsstillrelyoncarefullyconfiguredboundarydefensesthatseparatenetworkswithdifferentthreatlevels,setsofusers,andlevelsofcontrol.Anddespitetheblurringofinternalandexternalnetworks,effectivemulti-layereddefensesofperimeternetworkshelplowerthenumberofsuccessfulattacks,allowingsecuritypersonneltofocusonattackerswhohavedevisedmethodstobypassboundaryrestrictions.

Page 46: The CIS Critical Security Controls for Effective Cyber Defense

42

CSC12:BoundaryDefenseFamily CSC ControlDescription Foun-

dationalAdvanced

Network 12.1 Denycommunicationswith(orlimitdataflowto)knownmaliciousIPaddresses(blacklists),orlimitaccessonlytotrustedsites(whitelists).TestscanbeperiodicallycarriedoutbysendingpacketsfrombogonsourceIPaddresses(non-routableorotherwiseunusedIPaddresses)intothenetworktoverifythattheyarenottransmittedthroughnetworkperimeters.ListsofbogonaddressesarepubliclyavailableontheInternetfromvarioussources,andindicateaseriesofIPaddressesthatshouldnotbeusedforlegitimatetraffictraversingtheInternet.

Y

Network 12.2 OnDMZnetworks,configuremonitoringsystems(whichmaybebuiltintotheIDSsensorsordeployedasaseparatetechnology)torecordatleastpacketheaderinformation,andpreferablyfullpacketheaderandpayloadsofthetrafficdestinedfororpassingthroughthenetworkborder.ThistrafficshouldbesenttoaproperlyconfiguredSecurityInformationEventManagement(SIEM)orloganalyticssystemsothateventscanbecorrelatedfromalldevicesonthenetwork.

Y

Network 12.3 Deploynetwork-basedIDSsensorsonInternetandextranetDMZsystemsandnetworksthatlookforunusualattackmechanismsanddetectcompromiseofthesesystems.Thesenetwork-basedIDSsensorsmaydetectattacksthroughtheuseofsignatures,networkbehavioranalysis,orothermechanismstoanalyzetraffic.

Y

Network 12.4 Network-basedIPSdevicesshouldbedeployedtocomplementIDSbyblockingknownbadsignaturesorthebehaviorofpotentialattacks.Asattacksbecomeautomated,methodssuchasIDStypicallydelaytheamountoftimeittakesforsomeonetoreacttoanattack.Aproperlyconfigurednetwork-basedIPScanprovideautomationtoblockbadtraffic.Whenevaluatingnetwork-basedIPSproducts,includethoseusingtechniquesotherthansignature-baseddetection(suchasvirtualmachineorsandbox-basedapproaches)forconsideration.

Y

Page 47: The CIS Critical Security Controls for Effective Cyber Defense

43

Family CSC ControlDescription Foun-dational

Advanced

Network 12.5 DesignandimplementnetworkperimeterssothatalloutgoingnetworktraffictotheInternetmustpassthroughatleastoneapplicationlayerfilteringproxyserver.Theproxyshouldsupportdecryptingnetworktraffic,loggingindividualTCPsessions,blockingspecificURLs,domainnames,andIPaddressestoimplementablacklist,andapplyingwhitelistsofallowedsitesthatcanbeaccessedthroughtheproxywhileblockingallothersites.OrganizationsshouldforceoutboundtraffictotheInternetthroughanauthenticatedproxyserverontheenterpriseperimeter.

Y

Network 12.6 Requireallremoteloginaccess(includingVPN,dial-up,andotherformsofaccessthatallowlogintointernalsystems)tousetwo-factorauthentication.

Y

Network 12.7 Allenterprisedevicesremotelyloggingintotheinternalnetworkshouldbemanagedbytheenterprise,withremotecontroloftheirconfiguration,installedsoftware,andpatchlevels.Forthird-partydevices(e.g.,subcontractors/vendors),publishminimumsecuritystandardsforaccesstotheenterprisenetworkandperformasecurityscanbeforeallowingaccess.

Y

Network 12.8 Periodicallyscanforback-channelconnectionstotheInternetthatbypasstheDMZ,includingunauthorizedVPNconnectionsanddual-homedhostsconnectedtotheenterprisenetworkandtoothernetworksviawireless,dial-upmodems,orothermechanisms.

Y

Network 12.9 DeployNetFlowcollectionandanalysistoDMZnetworkflowstodetectanomalousactivity. Y

Network 12.10

Tohelpidentifycovertchannelsexfiltratingdatathroughafirewall,configurethebuilt-infirewallsessiontrackingmechanismsincludedinmanycommercialfirewallstoidentifyTCPsessionsthatlastanunusuallylongtimeforthegivenorganizationandfirewalldevice,alertingpersonnelaboutthesourceanddestinationaddressesassociatedwiththeselongsessions.

Y

CSC12ProceduresandTools

TheboundarydefensesincludedinthiscontrolbuildonCriticalControl10.TheadditionalrecommendationsherefocusonimprovingtheoverallarchitectureandimplementationofbothInternetandinternalnetworkboundarypoints.Internalnetworksegmentationiscentraltothiscontrolbecauseonceinsideanetwork,manyintrudersattempttotargetthemostsensitivemachines.Usually,internalnetworkprotectionisnotsetuptodefendagainstaninternalattacker.Settingupevenabasiclevelofsecuritysegmentationacross

Page 48: The CIS Critical Security Controls for Effective Cyber Defense

44

thenetworkandprotectingeachsegmentwithaproxyandafirewallwillgreatlyreduceanintruder’saccesstotheotherpartsofthenetwork.

OneelementofthiscontrolcanbeimplementedusingfreeorcommercialIDSandsnifferstolookforattacksfromexternalsourcesdirectedatDMZandinternalsystems,aswellasattacksoriginatingfrominternalsystemsagainsttheDMZorInternet.Securitypersonnelshouldregularlytestthesesensorsbylaunchingvulnerability-scanningtoolsagainstthemtoverifythatthescannertraffictriggersanappropriatealert.ThecapturedpacketsoftheIDSsensorsshouldbereviewedusinganautomatedscripteachdaytoensurethatlogvolumesarewithinexpectedparametersandthatthelogsareformattedproperlyandhavenotbeencorrupted.

Additionally,packetsniffersshouldbedeployedonDMZstolookforHypertextTransferProtocol(HTTP)trafficthatbypassesHTTPproxies.Bysamplingtrafficregularly,suchasoverathree-hourperiodonceaweek,informationsecuritypersonnelcansearchforHTTPtrafficthatisneithersourcedbynordestinedforaDMZproxy,implyingthattherequirementforproxyuseisbeingbypassed.

Toidentifyback-channelconnectionsthatbypassapprovedDMZs,networksecuritypersonnelcanestablishanInternet-accessiblesystemtouseasareceiverfortestingoutboundaccess.Thissystemisconfiguredwithafreeorcommercialpacketsniffer.Then,securitypersonnelcanconnectasendingtestsystemtovariouspointsontheorganization’sinternalnetwork,sendingeasilyidentifiabletraffictothesniffingreceiverontheInternet.Thesepacketscanbegeneratedusingfreeorcommercialtoolswithapayloadthatcontainsacustomfileusedforthetest.Whenthepacketsarriveatthereceiversystem,thesourceaddressofthepacketsshouldbeverifiedagainstacceptableDMZaddressesallowedfortheorganization.Ifsourceaddressesarediscoveredthatarenotincludedinlegitimate,registeredDMZs,moredetailcanbegatheredbyusingatraceroutetooltodeterminethepaththatpacketstakefromthesendertothereceiversystem.

Page 49: The CIS Critical Security Controls for Effective Cyber Defense

45

CSC12SystemEntityRelationshipDiagram

NetworkDevices

NetworkMonitoringSystems(IDS&IPS)

AuthenticationSystem

ConfigurationEnforcementSystem

NetworkDeviceManagementSystem

ApplicationFirewall/ProxySystem

Alerting/ReportingAnalyticsSystem

Page 50: The CIS Critical Security Controls for Effective Cyber Defense

46

CSC13:DataProtection

Theprocessesandtoolsusedtopreventdataexfiltration,mitigatetheeffectsofexfiltrateddata,andensuretheprivacyandintegrityofsensitiveinformation.

WhyIsThisControlCritical?

Dataresidesinmanyplaces.Protectionofthatdataisbestachievedthroughtheapplicationofacombinationofencryption,integrityprotectionanddatalosspreventiontechniques.Asorganizationscontinuetheirmovetowardscloudcomputingandmobileaccess,itisimportantthatpropercarebetakentolimitandreportondataexfiltrationwhilealsomitigatingtheeffectsofdatacompromise.

Theadoptionofdataencryption,bothintransitandatrest,providesmitigationagainstdatacompromise.Thisistrueifpropercarehasbeentakenintheprocessesandtechnologiesassociatedwiththeencryptionoperations.Anexampleofthisisthemanagementofcryptographickeysusedbythevariousalgorithmsthatprotectdata.Theprocessforgeneration,useanddestructionofkeysshouldbebasedonprovenprocessesasdefinedinstandardssuchasNISTSP800-57.

Careshouldalsobetakentoensurethatproductsusedwithinanenterpriseimplementwellknownandvettedcryptographicalgorithms,asidentifiedbyNIST.Re-evaluationofthealgorithmsandkeysizesusedwithintheenterpriseonanannualbasisisalsorecommendedtoensurethatorganizationsarenotfallingbehindinthestrengthofprotectionappliedtotheirdata.

Fororganizationsthataremovingdatatothecloud,itisimportanttounderstandthesecuritycontrolsappliedtodatainthecloudmulti-tenantenvironment,anddeterminethebestcourseofactionforapplicationofencryptioncontrolsandsecurityofkeys.Whenpossible,keysshouldbestoredwithinsecurecontainerssuchasHardwareSecurityModules(HSMs).

Encryptingdataprovidesalevelofassurancethatevenifdataiscompromised,itisimpracticaltoaccesstheplaintextwithoutsignificantresources,howevercontrolsshouldalsobeputinplacetomitigatethethreatofdataexfiltrationinthefirstplace.Manyattacksoccurredacrossthenetwork,whileothersinvolvedphysicaltheftoflaptopsandotherequipmentholdingsensitiveinformation.Yet,inmostcases,thevictimswerenotawarethatthesensitivedatawereleavingtheirsystemsbecausetheywerenotmonitoringdataoutflows.Themovementofdataacrossnetworkboundariesbothelectronicallyandphysicallymustbecarefullyscrutinizedtominimizeitsexposuretoattackers.

Thelossofcontroloverprotectedorsensitivedatabyorganizationsisaseriousthreattobusinessoperationsandapotentialthreattonationalsecurity.Whilesomedataareleakedorlostasaresultoftheftorespionage,thevastmajorityoftheseproblemsresultfrompoorlyunderstooddatapractices,alackofeffectivepolicyarchitectures,andusererror.

Page 51: The CIS Critical Security Controls for Effective Cyber Defense

47

Datalosscanevenoccurasaresultoflegitimateactivitiessuchase-Discoveryduringlitigation,particularlywhenrecordsretentionpracticesareineffectiveornonexistent.

Datalossprevention(DLP)referstoacomprehensiveapproachcoveringpeople,processes,andsystemsthatidentify,monitor,andprotectdatainuse(e.g.,endpointactions),datainmotion(e.g.,networkactions),anddataatrest(e.g.,datastorage)throughdeepcontentinspectionandwithacentralizedmanagementframework.Overthelastseveralyears,therehasbeenanoticeableshiftinattentionandinvestmentfromsecuringthenetworktosecuringsystemswithinthenetwork,andtosecuringthedataitself.DLPcontrolsarebasedonpolicy,andincludeclassifyingsensitivedata,discoveringthatdataacrossanenterprise,enforcingcontrols,andreportingandauditingtoensurepolicycompliance.

CSC13:DataProtectionFamily CSC ControlDescription Foun-

dationalAdvanced

Network 13.1 Performanassessmentofdatatoidentifysensitiveinformationthatrequirestheapplicationofencryptionandintegritycontrols.

Y

Network 13.2 Deployapprovedharddriveencryptionsoftwaretomobiledevicesandsystemsthatholdsensitivedata. Y

Network 13.3 Deployanautomatedtoolonnetworkperimetersthatmonitorsforsensitiveinformation(e.g.,personallyidentifiableinformation),keywords,andotherdocumentcharacteristicstodiscoverunauthorizedattemptstoexfiltratedataacrossnetworkboundariesandblocksuchtransferswhilealertinginformationsecuritypersonnel.

Y

Network 13.4 Conductperiodicscansofservermachinesusingautomatedtoolstodeterminewhethersensitivedata(e.g.,personallyidentifiableinformation,health,creditcard,orclassifiedinformation)ispresentonthesystemincleartext.Thesetools,whichsearchforpatternsthatindicatethepresenceofsensitiveinformation,canhelpidentifyifabusinessortechnicalprocessisleavingbehindorotherwiseleakingsensitiveinformation.

Y

Network 13.5 Ifthereisnobusinessneedforsupportingsuchdevices,configuresystemssothattheywillnotwritedatatoUSBtokensorUSBharddrives.Ifsuchdevicesarerequired,enterprisesoftwareshouldbeusedthatcanconfiguresystemstoallowonlyspecificUSBdevices(basedonserialnumberorotheruniqueproperty)tobeaccessed,andthatcanautomaticallyencryptalldataplacedonsuchdevices.Aninventoryofallauthorizeddevicesmustbemaintained.

Y

Page 52: The CIS Critical Security Controls for Effective Cyber Defense

48

Family CSC ControlDescription Foun-dational

Advanced

Network 13.6 Usenetwork-basedDLPsolutionstomonitorandcontroltheflowofdatawithinthenetwork.Anyanomaliesthatexceedthenormaltrafficpatternsshouldbenotedandappropriateactiontakentoaddressthem.

Y

Network 13.7 Monitoralltrafficleavingtheorganizationanddetectanyunauthorizeduseofencryption.Attackersoftenuseanencryptedchanneltobypassnetworksecuritydevices.Thereforeitisessentialthatorganizationsbeabletodetectrogueconnections,terminatetheconnection,andremediatetheinfectedsystem.

Y

Network 13.8 Blockaccesstoknownfiletransferandemailexfiltrationwebsites. Y

Network 13.9 Usehost-baseddatalossprevention(DLP)toenforceACLsevenwhendataiscopiedoffaserver.Inmostorganizations,accesstothedataiscontrolledbyACLsthatareimplementedontheserver.Oncethedatahavebeencopiedtoadesktopsystem,theACLsarenolongerenforcedandtheuserscansendthedatatowhomevertheywant.

Y

CSC13ProceduresandTools

Commercialtoolsareavailabletosupportenterprisemanagementofencryptionandkeymanagementwithinanenterpriseandincludetheabilitytosupportimplementationofencryptioncontrolswithincloudandmobileenvironments.

Definitionoflifecycleprocessesandrolesandresponsibilitiesassociatedwithkeymanagementshouldbeundertakenbyeachorganization.

CommercialDLPsolutionsareavailabletolookforexfiltrationattemptsanddetectothersuspiciousactivitiesassociatedwithaprotectednetworkholdingsensitiveinformation.Organizationsdeployingsuchtoolsshouldcarefullyinspecttheirlogsandfollowuponanydiscoveredattempts,eventhosethataresuccessfullyblocked,totransmitsensitiveinformationoutoftheorganizationwithoutauthorization.

Page 53: The CIS Critical Security Controls for Effective Cyber Defense

49

CSC13EntityRelationshipDiagram

Network&HostBasedDLP

EncryptionSystems NetworkDevices

EndPointProtection/RemovableMedia

Control

Alerting/ReportingAnalyticsSystem

ComputingSystems

Page 54: The CIS Critical Security Controls for Effective Cyber Defense

50

CSC14:ControlledAccessBasedontheNeedtoKnow

Theprocessesandtoolsusedtotrack/control/prevent/correctsecureaccesstocriticalassets(e.g.,information,resources,systems)accordingtotheformaldeterminationofwhichpersons,computers,andapplicationshaveaneedandrighttoaccessthesecriticalassetsbasedonanapprovedclassification.

WhyIsThisControlCritical?

Someorganizationsdonotcarefullyidentifyandseparatetheirmostsensitiveandcriticalassetsfromlesssensitive,publiclyaccessibleinformationontheirinternalnetworks.Inmanyenvironments,internalusershaveaccesstoallormostofthecriticalassets.Sensitiveassetsmayalsoincludesystemsthatprovidemanagementandcontrolofphysicalsystems(e.g.,SCADA).Onceattackershavepenetratedsuchanetwork,theycaneasilyfindandexfiltrateimportantinformation,causephysicaldamage,ordisruptoperationswithlittleresistance.Forexample,inseveralhigh-profilebreachesoverthepasttwoyears,attackerswereabletogainaccesstosensitivedatastoredonthesameserverswiththesamelevelofaccessasfarlessimportantdata.Therearealsoexamplesofusingaccesstothecorporatenetworktogainaccessto,thencontrolover,physicalassetsandcausedamage.

CSC14:ControlledAccessBasedontheNeedtoKnowFamily CSC ControlDescription Foun-

dationalAdvanced

Application 14.1 Segmentthenetworkbasedonthelabelorclassificationleveloftheinformationstoredontheservers.LocateallsensitiveinformationonseparatedVLANSwithfirewallfilteringtoensurethatonlyauthorizedindividualsareonlyabletocommunicatewithsystemsnecessarytofulfilltheirspecificresponsibilities.

Y

Application 14.2 Allcommunicationofsensitiveinformationoverless-trustednetworksshouldbeencrypted.Wheneverinformationflowsoveranetworkwithalowertrustlevel,theinformationshouldbeencrypted.

Y

Application 14.3 AllnetworkswitcheswillenablePrivateVirtualLocalAreaNetworks(VLANs)forsegmentedworkstationnetworkstolimittheabilityofdevicesonanetworktodirectlycommunicatewithotherdevicesonthesubnetandlimitanattackersabilitytolaterallymovetocompromiseneighboringsystems.

Y

Page 55: The CIS Critical Security Controls for Effective Cyber Defense

51

Family CSC ControlDescription Foun-dational

Advanced

Application 14.4 Allinformationstoredonsystemsshallbeprotectedwithfilesystem,networkshare,claims,application,ordatabasespecificaccesscontrollists.Thesecontrolswillenforcetheprinciplethatonlyauthorizedindividualsshouldhaveaccesstotheinformationbasedontheirneedtoaccesstheinformationasapartoftheirresponsibilities.

Y

Application 14.5 Sensitiveinformationstoredonsystemsshallbeencryptedatrestandrequireasecondaryauthenticationmechanism,notintegratedintotheoperatingsystem,inordertoaccesstheinformation.

Y

Application 14.6 Enforcedetailedauditloggingforaccesstononpublicdataandspecialauthenticationforsensitivedata. Y

Application 14.7 Archiveddatasetsorsystemsnotregularlyaccessedbytheorganizationshallberemovedfromtheorganization'snetwork.Thesesystemsshallonlybeusedasstandalonesystems(disconnectedfromthenetwork)bythebusinessunitneedingtooccasionallyusethesystemorcompletelyvirtualizedandpoweredoffuntilneeded.

Y

CSC14ProceduresandTools

Itisimportantthatanorganizationunderstandwhatitssensitiveinformationis,whereitresides,andwhoneedsaccesstoit.Toderivesensitivitylevels,organizationsneedtoputtogetheralistofthekeytypesofdataandtheoverallimportancetotheorganization.Thisanalysiswouldbeusedtocreateanoveralldataclassificationschemefortheorganization.Atabaselevel,adataclassificationschemeisbrokendownintotwolevels:public(unclassified)andprivate(classified).Oncetheprivateinformationhasbeenidentified,itcanthenbefurthersubdividedbasedontheimpactitwouldhavetotheorganizationifitwerecompromised.

Oncethesensitivityofthedatahasbeenidentified,thedataneedtobetracedbacktobusinessapplicationsandthephysicalserversthathousethoseapplications.Thenetworkthenneedstobesegmentedsothatsystemsofthesamesensitivitylevelareonthesamenetworkandsegmentedfromsystemswithdifferenttrustlevels.Ifpossible,firewallsneedtocontrolaccesstoeachsegment.Ifdataareflowingoveranetworkwithalowertrustlevel,encryptionshouldbeused.

Jobrequirementsshouldbecreatedforeachusergrouptodeterminewhatinformationthegroupneedsaccesstoinordertoperformitsjobs.Basedontherequirements,accessshouldonlybegiventothesegmentsorserversthatareneededforeachjobfunction.

Page 56: The CIS Critical Security Controls for Effective Cyber Defense

52

Detailedloggingshouldbeturnedonforallserversinordertotrackaccessandexaminesituationswheresomeoneisaccessingdatathattheyshouldnotbeaccessing.

CSC14SystemEntityRelationshipDiagram

HostBasedDataLossPrevention(DLP)

EncryptionSystems

NetworkDevices

Alerting/ReportingAnalyticsSystem

NetworkDeviceManagementSystem

Page 57: The CIS Critical Security Controls for Effective Cyber Defense

53

CSC15:WirelessAccessControl

Theprocessesandtoolsusedtotrack/control/prevent/correctthesecurityuseofwirelesslocalareanetworks(LANS),accesspoints,andwirelessclientsystems.

WhyIsThisControlCritical?

Majortheftsofdatahavebeeninitiatedbyattackerswhohavegainedwirelessaccesstoorganizationsfromoutsidethephysicalbuilding,bypassingorganizations’securityperimetersbyconnectingwirelesslytoaccesspointsinsidetheorganization.Wirelessclientsaccompanyingtravelingofficialsareinfectedonaregularbasisthroughremoteexploitationduringairtravelorincybercafes.Suchexploitedsystemsarethenusedasbackdoorswhentheyarereconnectedtothenetworkofatargetorganization.Stillotherorganizationshavereportedthediscoveryofunauthorizedwirelessaccesspointsontheirnetworks,plantedandsometimeshiddenforunrestrictedaccesstoaninternalnetwork.Becausetheydonotrequiredirectphysicalconnections,wirelessdevicesareaconvenientvectorforattackerstomaintainlong-termaccessintoatargetenvironment.

CSC15:WirelessAccessControlFamily CSC ControlDescription Foun-

dationalAdvanced

Network 15.1 Ensurethateachwirelessdeviceconnectedtothenetworkmatchesanauthorizedconfigurationandsecurityprofile,withadocumentedowneroftheconnectionandadefinedbusinessneed.Organizationsshoulddenyaccesstothosewirelessdevicesthatdonothavesuchaconfigurationandprofile.

Y

Network 15.2 Configurenetworkvulnerabilityscanningtoolstodetectwirelessaccesspointsconnectedtothewirednetwork.Identifieddevicesshouldbereconciledagainstalistofauthorizedwirelessaccesspoints.Unauthorized(i.e.,rogue)accesspointsshouldbedeactivated.

Y

Network 15.3 Usewirelessintrusiondetectionsystems(WIDS)toidentifyroguewirelessdevicesanddetectattackattemptsandsuccessfulcompromises.InadditiontoWIDS,allwirelesstrafficshouldbemonitoredbyWIDSastrafficpassesintothewirednetwork.

Y

Network 15.4 Whereaspecificbusinessneedforwirelessaccesshasbeenidentified,configurewirelessaccessonclientmachinestoallowaccessonlytoauthorizedwirelessnetworks.Fordevicesthatdonothaveanessentialwirelessbusinesspurpose,disablewirelessaccessinthehardwareconfiguration(basicinput/outputsystemorextensiblefirmwareinterface).

Y

Page 58: The CIS Critical Security Controls for Effective Cyber Defense

54

Family CSC ControlDescription Foun-dational

Advanced

Network 15.5 EnsurethatallwirelesstrafficleveragesatleastAdvancedEncryptionStandard(AES)encryptionusedwithatleastWi-FiProtectedAccess2(WPA2)protection.

Y

Network 15.6 EnsurethatwirelessnetworksuseauthenticationprotocolssuchasExtensibleAuthenticationProtocol-TransportLayerSecurity(EAP/TLS),whichprovidecredentialprotectionandmutualauthentication.

Y

Network 15.7 Disablepeer-to-peerwirelessnetworkcapabilitiesonwirelessclients. Y

Network 15.8 Disablewirelessperipheralaccessofdevices(suchasBluetooth),unlesssuchaccessisrequiredforadocumentedbusinessneed.

Y

Network 15.9 Createseparatevirtuallocalareanetworks(VLANs)forBYODsystemsorotheruntrusteddevices.InternetaccessfromthisVLANshouldgothroughatleastthesameborderascorporatetraffic.EnterpriseaccessfromthisVLANshouldbetreatedasuntrustedandfilteredandauditedaccordingly.

Y

CSC15ProceduresandTools

Effectiveorganizationsruncommercialwirelessscanning,detection,anddiscoverytoolsaswellascommercialwirelessintrusiondetectionsystems.

Additionally,thesecurityteamshouldperiodicallycapturewirelesstrafficfromwithinthebordersofafacilityandusefreeandcommercialanalysistoolstodeterminewhetherthewirelesstrafficwastransmittedusingweakerprotocolsorencryptionthantheorganizationmandates.Whendevicesrelyingonweakwirelesssecuritysettingsareidentified,theyshouldbefoundwithintheorganization’sassetinventoryandeitherreconfiguredmoresecurelyordeniedaccesstotheorganizationnetwork.

Additionally,thesecurityteamshouldemployremotemanagementtoolsonthewirednetworktopullinformationaboutthewirelesscapabilitiesanddevicesconnectedtomanagedsystems.

Page 59: The CIS Critical Security Controls for Effective Cyber Defense

55

CSC15SystemEntityRelationshipDiagram

ComputingSystems

SCAPVulnerabilityScanner

ConfigurationEnforcementSystem

WirelessIntrusionDetectionSystem(WIDS)

PublicKeyInfrastructure(PKI)

NetworkAccessControl(NAC)Alerting/ReportingAnalyticsSystem

NetworkDevices

NetworkDeviceManagementSystem

Page 60: The CIS Critical Security Controls for Effective Cyber Defense

56

CSC16:AccountMonitoringandControl

Activelymanagethelifecycleofsystemandapplicationaccounts–theircreation,use,dormancy,deletion–inordertominimizeopportunitiesforattackerstoleveragethem.

WhyIsThisControlCritical?

Attackersfrequentlydiscoverandexploitlegitimatebutinactiveuseraccountstoimpersonatelegitimateusers,therebymakingdiscoveryofattackerbehaviordifficultfornetworkwatchers.AccountsofcontractorsandemployeeswhohavebeenterminatedandaccountsformerlysetupforRedTeamtesting(butnotdeletedafterwards)haveoftenbeenmisusedinthisway.Additionally,somemaliciousinsidersorformeremployeeshaveaccessedaccountsleftbehindinasystemlongaftercontractexpiration,maintainingtheiraccesstoanorganization’scomputingsystemandsensitivedataforunauthorizedandsometimesmaliciouspurposes.

CSC16:AccountMonitoringandControlFamily CSC ControlDescription Foun-

dationalAdvanced

Application 16.1 Reviewallsystemaccountsanddisableanyaccountthatcannotbeassociatedwithabusinessprocessandowner. Y

Application 16.2 Ensurethatallaccountshaveanexpirationdatethatismonitoredandenforced. Y

Application 16.3 Establishandfollowaprocessforrevokingsystemaccessbydisablingaccountsimmediatelyuponterminationofanemployeeorcontractor.Disablinginsteadofdeletingaccountsallowspreservationofaudittrails.

Y

Application 16.4 Regularlymonitortheuseofallaccounts,automaticallyloggingoffusersafterastandardperiodofinactivity. Y

Application 16.5 Configurescreenlocksonsystemstolimitaccesstounattendedworkstations. Y

Application 16.6 Monitoraccountusagetodeterminedormantaccounts,notifyingtheuseroruser’smanager.Disablesuchaccountsifnotneeded,ordocumentandmonitorexceptions(e.g.,vendormaintenanceaccountsneededforsystemrecoveryorcontinuityoperations).Requirethatmanagersmatchactiveemployeesandcontractorswitheachaccountbelongingtotheirmanagedstaff.Securityorsystemadministratorsshouldthendisableaccountsthatarenotassignedtovalidworkforcemembers.

Y

Page 61: The CIS Critical Security Controls for Effective Cyber Defense

57

Family CSC ControlDescription Foun-dational

Advanced

Application 16.7 Useandconfigureaccountlockoutssuchthatafterasetnumberoffailedloginattemptstheaccountislockedforastandardperiodoftime.

Y

Application 16.8 Monitorattemptstoaccessdeactivatedaccountsthroughauditlogging. Y

Application 16.9 Configureaccessforallaccountsthroughacentralizedpointofauthentication,forexampleActiveDirectoryorLDAP.Configurenetworkandsecuritydevicesforcentralizedauthenticationaswell.

Y

Application 16.10 Profileeachuser’stypicalaccountusagebydeterminingnormaltime-of-dayaccessandaccessduration.Reportsshouldbegeneratedthatindicateuserswhohaveloggedinduringunusualhoursorhaveexceededtheirnormalloginduration.Thisincludesflaggingtheuseoftheuser’scredentialsfromacomputerotherthancomputersonwhichtheusergenerallyworks.

Y

Application 16.11 Requiremulti-factorauthenticationforalluseraccountsthathaveaccesstosensitivedataorsystems.Multi-factorauthenticationcanbeachievedusingsmartcards,certificates,OneTimePassword(OTP)tokens,orbiometrics.

Y

Application 16.12 Wheremulti-factorauthenticationisnotsupported,useraccountsshallberequiredtouselongpasswordsonthesystem(longerthan14characters).

Y

Application 16.13 Ensurethatallaccountusernamesandauthenticationcredentialsaretransmittedacrossnetworksusingencryptedchannels.

Y

Application 16.14 Verifythatallauthenticationfilesareencryptedorhashedandthatthesefilescannotbeaccessedwithoutrootoradministratorprivileges.Auditallaccesstopasswordfilesinthesystem.

Y

CSCProceduresandTools

Althoughmostoperatingsystemsincludecapabilitiesforlogginginformationaboutaccountusage,thesefeaturesaresometimesdisabledbydefault.Evenwhensuchfeaturesarepresentandactive,theyoftendonotprovidefine-graineddetailaboutaccesstothesystembydefault.Securitypersonnelcanconfiguresystemstorecordmoredetailedinformationaboutaccountaccess,andusehome-grownscriptsorthird-partyloganalysistoolstoanalyzethisinformationandprofileuseraccessofvarioussystems.

Page 62: The CIS Critical Security Controls for Effective Cyber Defense

58

Accountsmustalsobetrackedveryclosely.Anyaccountthatisdormantmustbedisabledandeventuallyremovedfromthesystem.Allactiveaccountsmustbetracedbacktoauthorizedusersofthesystem,anditmustbeensuredthattheirpasswordsarerobustandchangedonaregularbasis.Usersmustalsobeloggedoutofthesystemafteraperiodofnoactivitytominimizethepossibilityofanattackerusingtheirsystemtoextractinformationfromtheorganization.

CSC16SystemEntityRelationshipDiagram

ComputingSystems

AuthenticationSystem

Identity&AccessManagementSystem Workforce

Members

ConfigurationEnforcementSystem

Alerting/ReportingAnalyticsSystem

Page 63: The CIS Critical Security Controls for Effective Cyber Defense

59

CSC17:SecuritySkillsAssessmentandAppropriateTrainingtoFillGaps

Forallfunctionalrolesintheorganization(prioritizingthosemission-criticaltothebusinessanditssecurity),identifythespecificknowledge,skills,andabilitiesneededtosupportdefenseoftheenterprise;developandexecuteanintegratedplantoassess,identifygaps,andremediatethroughpolicy,organizationalplanning,training,andawarenessprograms.

WhyIsThisControlCritical?

Itistemptingtothinkofcyberdefenseprimarilyasatechnicalchallenge,buttheactionsofpeoplealsoplayacriticalpartinthesuccessorfailureofanenterprise.Peoplefulfillimportantfunctionsateverystageofsystemdesign,implementation,operation,use,andoversight.Examplesinclude:systemdevelopersandprogrammers(whomaynotunderstandtheopportunitytoresolverootcausevulnerabilitiesearlyinthesystemlifecycle);IToperationsprofessionals(whomaynotrecognizethesecurityimplicationsofITartifactsandlogs);endusers(whomaybesusceptibletosocialengineeringschemessuchasphishing);securityanalysts(whostruggletokeepupwithanexplosionofnewinformation);andexecutivesandsystemowners(whostruggletoquantifytherolethatcybersecurityplaysinoveralloperational/missionrisk,andhavenoreasonablewaytomakerelevantinvestmentdecisions).

Attackersareveryconsciousoftheseissuesandusethemtoplantheirexploitationsby,forexample:carefullycraftingphishingmessagesthatlooklikeroutineandexpectedtraffictoanunwaryuser;exploitingthegapsorseamsbetweenpolicyandtechnology(e.g.,policiesthathavenotechnicalenforcement);workingwithinthetimewindowofpatchingorlogreview;usingnominallynon-security-criticalsystemsasjumppointsorbots.

Nocyberdefenseapproachcaneffectivelyaddresscyberriskwithoutameanstoaddressthisfundamentalvulnerability.Conversely,empoweringpeoplewithgoodcyberdefensehabitscansignificantlyincreasereadiness.

CSC17:SecuritySkillsAssessmentandAppropriateTrainingtoFillGapsFamily CSC ControlDescription Foun-

dationalAdvanced

Application 17.1 PerformgapanalysistoseewhichskillsemployeesneedtoimplementtheotherControls,andwhichbehaviorsemployeesarenotadheringto,usingthisinformationtobuildabaselinetrainingandawarenessroadmapforallemployees.

Y

Page 64: The CIS Critical Security Controls for Effective Cyber Defense

60

Family CSC ControlDescription Foun-dational

Advanced

Application 17.2 Delivertrainingtofilltheskillsgap.Ifpossible,usemoreseniorstafftodeliverthetraining.Asecondoptionistohaveoutsideteachersprovidetrainingonsitesotheexamplesusedwillbedirectlyrelevant.Ifyouhavesmallnumbersofpeopletotrain,usetrainingconferencesoronlinetrainingtofillthegaps.

Y

Application 17.3Implementasecurityawarenessprogramthat(1)focusesonthemethodscommonlyusedinintrusionsthatcanbeblockedthroughindividualaction,(2)isdeliveredinshortonlinemodulesconvenientforemployees(3)isupdatedfrequently(atleastannually)torepresentthelatestattacktechniques,(4)ismandatedforcompletionbyallemployeesatleastannually,(5)isreliablymonitoredforemployeecompletion,and6)includestheseniorleadershipteam’spersonalmessaging,involvementintraining,andaccountabilitythroughperformancemetrics.

Y

Application 17.4 Validateandimproveawarenesslevelsthroughperiodicteststoseewhetheremployeeswillclickonalinkfromsuspiciousemailorprovidesensitiveinformationonthetelephonewithoutfollowingappropriateproceduresforauthenticatingacaller;targetedtrainingshouldbeprovidedtothosewhofallvictimtotheexercise.

Y

Application 17.5 Usesecurityskillsassessmentsforeachofthemission-criticalrolestoidentifyskillsgaps.Usehands-on,real-worldexamplestomeasuremastery.Ifyoudonothavesuchassessments,useoneoftheavailableonlinecompetitionsthatsimulatereal-worldscenariosforeachoftheidentifiedjobsinordertomeasuremasteryofskillsmastery.

Y

CSC17ProceduresandTools

Aneffectiveenterprise-widetrainingprogramshouldtakeaholisticapproachandconsiderpolicyandtechnologyatthesametimeasthetrainingofpeople.Forexample,policiesshouldbedesignedwithtechnicalmeasurementandenforcementwhenpossible,reinforcedbytrainingtofillgaps,technicalcontrolscanbeimplementedtoboundandminimizetheopportunityforpeopletomakemistakes,andsofocusthetrainingonthingsthatcannotbemanagedtechnically.

Tobeeffectiveinbothcostandoutcome,securitytrainingshouldbeprioritized,focused,specific,andmeasurable.Akeywaytoprioritizetrainingistofocusfirstonthosejobsand

Page 65: The CIS Critical Security Controls for Effective Cyber Defense

61

rolesthatarecriticaltothemissionorbusinessoutcomeoftheenterprise.Onewaytoidentifythesemission-criticaljobsistoreferencetheworkofthe2012TaskForceonCyberSkillsestablishedbytheSecretaryofHomelandSecurity:1)SystemandNetworkPenetrationTesters,2)ApplicationPenetrationTesters,3)SecurityMonitoringandEventAnalysts,4)IncidentRespondersIn-Depth,5)Counter-Intelligence/InsiderThreatAnalysts,6)RiskAssessmentEngineers,7)SecureCodersandCodeReviewers,8)SecurityEngineers/ArchitectureandDesign,9)SecurityEngineers/Operations,and10)AdvancedForensicsAnalysts.AcomprehensivetaxonomyofcybersecurityrolesisavailablethroughtheNationalCybersecurityWorkforceFramework,developedbytheNationalInstituteofStandardsandTechnology(NIST),whichmapstorolescommonlyfoundinenterprisesandgovernmentorganizations.

Generalawarenesstrainingforallusersalsoplaysanimportantrole.Buteventhistrainingshouldbetailoredtofunctionalrolesandfocusedonspecificactionsthatputtheorganizationatrisk,andmeasuredinordertodriveremediation.

Thekeytoupgradingskillsismeasurementthroughassessmentsthatshowboththeemployeeandtheemployerwhereknowledgeissufficientandwheretherearegaps.Oncethegapshavebeenidentified,thoseemployeeswhohavetherequisiteskillsandknowledgecanbecalledupontomentoremployeeswhoneedtoimprovetheirskills.Inaddition,theorganizationcandeveloptrainingplanstofillthegapsandmaintainemployeereadiness.

AfulltreatmentofthistopicisbeyondthescopeoftheCriticalSecurityControls.However,theCybersecurityWorkforceHandbookpublishedbytheCenterforInternetSecurity(www.cisecurity.org)providesfoundationalstepstotakeinoptimizingtheworkforceforenterprisesecurity.

Page 66: The CIS Critical Security Controls for Effective Cyber Defense

62

CSC17SystemEntityRelationshipDiagram

UserAssessments

EducationPlans/TrainingPrograms

WorkforceMembers

Alerting/ReportingAnalyticsSystem

Page 67: The CIS Critical Security Controls for Effective Cyber Defense

63

CSC18:ApplicationSoftwareSecurity

Managethesecuritylifecycleofallin-housedevelopedandacquiredsoftwareinordertoprevent,detect,andcorrectsecurityweaknesses.

WhyIsThisControlCritical?

Attacksoftentakeadvantageofvulnerabilitiesfoundinweb-basedandotherapplicationsoftware.Vulnerabilitiescanbepresentformanyreasons,includingcodingmistakes,logicerrors,incompleterequirements,andfailuretotestforunusualorunexpectedconditions.Examplesofspecificerrorsinclude:thefailuretocheckthesizeofuserinput;failuretofilteroutunneededbutpotentiallymaliciouscharactersequencesfrominputstreams;failuretoinitializeandclearvariables;andpoormemorymanagementallowingflawsinonepartofthesoftwaretoaffectunrelated(andmoresecuritycritical)portions.Thereisafloodofpublicandprivateinformationaboutsuchvulnerabilitiesavailabletoattackersanddefendersalike,aswellasarobustmarketplacefortoolsandtechniquestoallow“weaponization”ofvulnerabilitiesintoexploits.Attackerscaninjectspecificexploits,includingbufferoverflows,SQLinjectionattacks,cross-sitescripting,cross-siterequestforgery,andclick-jackingofcodetogaincontrolovervulnerablemachines.Inoneattack,morethan1millionwebserverswereexploitedandturnedintoinfectionenginesforvisitorstothosesitesusingSQLinjection.Duringthatattack,trustedwebsitesfromstategovernmentsandotherorganizationscompromisedbyattackerswereusedtoinfecthundredsofthousandsofbrowsersthataccessedthosewebsites.Manymorewebandnon-webapplicationvulnerabilitiesarediscoveredonaregularbasis.

CSC18:ApplicationSoftwareSecurityFamily CSC ControlDescription Foun-

dationalAdvanced

Application 18.1 Forallacquiredapplicationsoftware,checkthattheversionyouareusingisstillsupportedbythevendor.Ifnot,updatetothemostcurrentversionandinstallallrelevantpatchesandvendorsecurityrecommendations.

Y

Application 18.2 Protectwebapplicationsbydeployingwebapplicationfirewalls(WAFs)thatinspectalltrafficflowingtothewebapplicationforcommonwebapplicationattacks,includingbutnotlimitedtocross-sitescripting,SQLinjection,commandinjection,anddirectorytraversalattacks.Forapplicationsthatarenotweb-based,specificapplicationfirewallsshouldbedeployedifsuchtoolsareavailableforthegivenapplicationtype.Ifthetrafficisencrypted,thedeviceshouldeithersitbehindtheencryptionorbecapableofdecryptingthetrafficpriortoanalysis.Ifneitheroptionisappropriate,ahost-basedwebapplicationfirewallshouldbedeployed.

Y

Dealingwithencrypted/tunne

ledtrafficrequiresmoreplanningandresources.

Page 68: The CIS Critical Security Controls for Effective Cyber Defense

64

Family CSC ControlDescription Foun-dational

Advanced

Application 18.3 Forin-housedevelopedsoftware,ensurethatexpliciterrorcheckingisperformedanddocumentedforallinput,includingforsize,datatype,andacceptablerangesorformats.

Y

Application 18.4 Testin-house-developedandthird-party-procuredwebapplicationsforcommonsecurityweaknessesusingautomatedremotewebapplicationscannerspriortodeployment,wheneverupdatesaremadetotheapplication,andonaregularrecurringbasis.Inparticular,inputvalidationandoutputencodingroutinesofapplicationsoftwareshouldbereviewedandtested.

Y

Application 18.5 Donotdisplaysystemerrormessagestoend-users(outputsanitization). Y

Application 18.6 Maintainseparateenvironmentsforproductionandnonproductionsystems.Developersshouldnottypicallyhaveunmonitoredaccesstoproductionenvironments.

Y

Application 18.7 Forapplicationsthatrelyonadatabase,usestandardhardeningconfigurationtemplates.Allsystemsthatarepartofcriticalbusinessprocessesshouldalsobetested.

Y

Application 18.8 Ensurethatallsoftwaredevelopmentpersonnelreceivetraininginwritingsecurecodefortheirspecificdevelopmentenvironment.

Y

Application 18.9 Forin-housedevelopedapplications,ensurethatdevelopmentartifacts(sampledataandscripts;unusedlibraries,components,debugcode;ortools)arenotincludedinthedeployedsoftware,oraccessibleintheproductionenvironment.

Y

CSC18ProceduresandTools

Thesecurityofapplications(in-housedevelopedoracquired)isacomplexactivityrequiringacompleteprogramencompassingenterprise-widepolicy,technology,andtheroleofpeople.TheseareoftenbroadlydefinedorrequiredbyformalRiskManagementFrameworksandprocesses.

AcomprehensivetreatmentofthistopicisbeyondthescopeoftheCriticalSecurityControls.However,theactionsinCSC6providespecific,high-prioritystepsthatcanimproveApplicationSoftwareSecurity.Inaddition,werecommenduseofthemanyexcellentcomprehensiveresourcesdedicatedtothistopic.Examplesinclude:theDHS“BuildSecurityIn”Program<buildsecurityin.us-cert.gov>,andTheOpenWebApplicationSecurityProject(OWASP)<www.owasp.org>.

Page 69: The CIS Critical Security Controls for Effective Cyber Defense

65

CSC18SystemEntityRelationshipDiagram

CodeReview/

VulnerabilityScanner

PatchManagementSystem

WebApplicationFirewall(WAF)

WebApplicationServer

Alerting/ReportingAnalyticsSystem

Page 70: The CIS Critical Security Controls for Effective Cyber Defense

66

CSC19:IncidentResponseandManagement

Protecttheorganization’sinformation,aswellasitsreputation,bydevelopingandimplementinganincidentresponseinfrastructure(e.g.,plans,definedroles,training,communications,managementoversight)forquicklydiscoveringanattackandtheneffectivelycontainingthedamage,eradicatingtheattacker’spresence,andrestoringtheintegrityofthenetworkandsystems.

WhyIsThisControlCritical?

Cyberincidentsarenowjustpartofourwayoflife.Evenlarge,well-funded,andtechnicallysophisticatedenterprisesstruggletokeepupwiththefrequencyandcomplexityofattacks.Thequestionofasuccessfulcyber-attackagainstanenterpriseisnot“if”but“when.”

Whenanincidentoccurs,itistoolatetodeveloptherightprocedures,reporting,datacollection,managementresponsibility,legalprotocols,andcommunicationsstrategythatwillallowtheenterprisetosuccessfullyunderstand,manage,andrecover.Withoutanincidentresponseplan,anorganizationmaynotdiscoveranattackinthefirstplace,or,iftheattackisdetected,theorganizationmaynotfollowgoodprocedurestocontaindamage,eradicatetheattacker’spresence,andrecoverinasecurefashion.Thus,theattackermayhaveafargreaterimpact,causingmoredamage,infectingmoresystems,andpossiblyexfiltratemoresensitivedatathanwouldotherwisebepossiblewereaneffectiveincidentresponseplaninplace.

CSC19:IncidentResponseandManagementFamily CSC ControlDescription Foun-

dationalAdvanced

Application 19.1 Ensurethattherearewrittenincidentresponseproceduresthatincludeadefinitionofpersonnelrolesforhandlingincidents.Theproceduresshoulddefinethephasesofincidenthandling.

Y

Application 19.2 Assignjobtitlesanddutiesforhandlingcomputerandnetworkincidentstospecificindividuals. Y

Application 19.3 Definemanagementpersonnelwhowillsupporttheincidenthandlingprocessbyactinginkeydecision-makingroles.

Y

Application 19.4 Deviseorganization-widestandardsforthetimerequiredforsystemadministratorsandotherpersonneltoreportanomalouseventstotheincidenthandlingteam,themechanismsforsuchreporting,andthekindofinformationthatshouldbeincludedintheincidentnotification.ThisreportingshouldalsoincludenotifyingtheappropriateCommunityEmergencyResponseTeaminaccordancewithalllegalorregulatoryrequirementsforinvolvingthatorganizationincomputerincidents.

Y

Page 71: The CIS Critical Security Controls for Effective Cyber Defense

67

Family CSC ControlDescription Foun-dational

Advanced

Application 19.5 Assembleandmaintaininformationonthird-partycontactinformationtobeusedtoreportasecurityincident(e.g.,maintainanemailaddressofsecurity@organization.comorhaveawebpagehttp://organization.com/security).

Y

Application 19.6 Publishinformationforallpersonnel,includingemployeesandcontractors,regardingreportingcomputeranomaliesandincidentstotheincidenthandlingteam.Suchinformationshouldbeincludedinroutineemployeeawarenessactivities.

Y

Application 19.7 Conductperiodicincidentscenariosessionsforpersonnelassociatedwiththeincidenthandlingteamtoensurethattheyunderstandcurrentthreatsandrisks,aswellastheirresponsibilitiesinsupportingtheincidenthandlingteam.

Y

CSC19ProceduresandTools

Afterdefiningdetailedincidentresponseprocedures,theincidentresponseteamshouldengageinperiodicscenario-basedtraining,workingthroughaseriesofattackscenariosfine-tunedtothethreatsandvulnerabilitiestheorganizationfaces.Thesescenarioshelpensurethatteammembersunderstandtheirroleontheincidentresponseteamandalsohelppreparethemtohandleincidents.

AfulltreatmentofthistopicisbeyondthescopeoftheCriticalSecurityControls.However,theactionsinCSC18providespecific,high-prioritystepsthatcanimproveenterprisesecurity,andshouldbeapartofanycomprehensiveincidentandresponseplan.

Page 72: The CIS Critical Security Controls for Effective Cyber Defense

68

CSC19SystemEntityRelationshipDiagram

IncidentManagementDocumentation

WorkforceMembers

ThirdPartyAuthorities

Alerting/ReportingAnalyticsSystem

Page 73: The CIS Critical Security Controls for Effective Cyber Defense

69

CSC20:PenetrationTestsandRedTeamExercises

Testtheoverallstrengthofanorganization’sdefenses(thetechnology,theprocesses,andthepeople)bysimulatingtheobjectivesandactionsofanattacker.

WhyIsThisControlCritical?

Attackersoftenexploitthegapbetweengooddefensivedesignsandintentionsandimplementationormaintenance.Examplesinclude:thetimewindowbetweenannouncementofavulnerability,theavailabilityofavendorpatch,andactualinstallationoneverymachine;well-intentionedpolicieswhichhavenoenforcementmechanism(especiallythoseintendedtorestrictriskyhumanactions);failuretoapplygoodconfigurationsandotherpracticestotheentireenterprise,ortomachinesthatcomein-and-outofthenetwork;andfailuretounderstandtheinteractionamongmultipledefensivetools,orwithnormalsystemoperationsthathavesecurityimplications.

Inaddition,successfuldefenserequiresacomprehensiveprogramoftechnicaldefenses,goodpolicyandgovernance,andappropriateactionbypeople.Inacomplexenvironmentwheretechnologyisconstantlyevolving,andnewattackertradecraftappearsregularly,organizationsshouldperiodicallytesttheirdefensestoidentifygapsandtoassesstheirreadiness.

Penetrationtestingstartsfromtheidentificationandassessmentofvulnerabilitiesthatcanbeidentifiedintheenterprise.Itcomplementsthisbydesigningandexecutingteststhatdemonstratespecificallyhowanadversarycaneithersubverttheorganization’ssecuritygoals(e.g.,theprotectionofspecificIntellectualProperty)orachievespecificadversarialobjectives(e.g.,establishmentofacovertCommandandControlinfrastructure).Theresultprovidesdeeperinsight,throughdemonstration,intothebusinessrisksofvariousvulnerabilities.

RedTeamexercisestakeacomprehensiveapproachatthefullspectrumoforganizationpolicies,processes,anddefensesinordertoimproveorganizationalreadiness,improvetrainingfordefensivepractitioners,andinspectcurrentperformancelevels.IndependentRedTeamscanprovidevaluableandobjectiveinsightsabouttheexistenceofvulnerabilitiesandtheefficacyofdefensesandmitigatingcontrolsalreadyinplaceandevenofthoseplannedforfutureimplementation.

Page 74: The CIS Critical Security Controls for Effective Cyber Defense

70

CSC20:PenetrationTestsandRedTeamExercisesFamily CSC ControlDescription Foun-

dationalAdvanced

Application 20.1 Conductregularexternalandinternalpenetrationteststoidentifyvulnerabilitiesandattackvectorsthatcanbeusedtoexploitenterprisesystemssuccessfully.Penetrationtestingshouldoccurfromoutsidethenetworkperimeter(i.e.,theInternetorwirelessfrequenciesaroundanorganization)aswellasfromwithinitsboundaries(i.e.,ontheinternalnetwork)tosimulatebothoutsiderandinsiderattacks.

Y

Application 20.2 Anyuserorsystemaccountsusedtoperformpenetrationtestingshouldbecontrolledandmonitoredtomakesuretheyareonlybeingusedforlegitimatepurposes,andareremovedorrestoredtonormalfunctionaftertestingisover.

Y

Application 20.3 PerformperiodicRedTeamexercisestotestorganizationalreadinesstoidentifyandstopattacksortorespondquicklyandeffectively.

Y

Application 20.4 Includetestsforthepresenceofunprotectedsysteminformationandartifactsthatwouldbeusefultoattackers,includingnetworkdiagrams,configurationfiles,olderpenetrationtestreports,emailsordocumentscontainingpasswordsorotherinformationcriticaltosystemoperation.

Y

Application 20.5 Plancleargoalsofthepenetrationtestitselfwithblendedattacksinmind,identifyingthegoalmachineortargetasset.ManyAPT-styleattacksdeploymultiplevectors—oftensocialengineeringcombinedwithwebornetworkexploitation.RedTeammanualorautomatedtestingthatcapturespivotedandmulti-vectorattacksoffersamorerealisticassessmentofsecuritypostureandrisktocriticalassets.

Y

Application 20.6 Usevulnerabilityscanningandpenetrationtestingtoolsinconcert.Theresultsofvulnerabilityscanningassessmentsshouldbeusedasastartingpointtoguideandfocuspenetrationtestingefforts.

Y

Application 20.7 Whereverpossible,ensurethatRedTeamsresultsaredocumentedusingopen,machine-readablestandards(e.g.,SCAP).DeviseascoringmethodfordeterminingtheresultsofRedTeamexercisessothatresultscanbecomparedovertime.

Y

Page 75: The CIS Critical Security Controls for Effective Cyber Defense

71

Family CSC ControlDescription Foun-dational

Advanced

Application 20.8 CreateatestbedthatmimicsaproductionenvironmentforspecificpenetrationtestsandRedTeamattacksagainstelementsthatarenottypicallytestedinproduction,suchasattacksagainstsupervisorycontrolanddataacquisitionandothercontrolsystems.

Y

CSC20ProceduresandTools

PenetrationtestingandRedTeamingonlyprovidesignificantvaluewhenbasicdefensivemeasureshavealreadybeenputintoplace,andwhentheyareperformedaspartofacomprehensive,ongoingprogramofsecuritymanagementandimprovement.TheseareoftenspecifiedandrequiredbyformalRiskManagementFrameworksandprocesses.

EachorganizationshoulddefineaclearscopeandrulesofengagementforpenetrationtestingandRedTeamanalyses.Thescopeofsuchprojectsshouldinclude,ataminimum,systemswiththeorganization’shighestvalueinformationandproductionprocessingfunctionality.Otherlower-valuesystemsmayalsobetestedtoseeiftheycanbeusedaspivotpointstocompromisehigher-valuetargets.TherulesofengagementforpenetrationtestsandRedTeamanalysesshoulddescribe,ataminimum,timesofdayfortesting,durationoftests,andtheoveralltestapproach.

AfulltreatmentofthistopicisbeyondthescopeoftheCISCriticalSecurityControls.However,theactionsinCSC20providespecific,high-prioritystepsthatcanimproveenterprisesecurity,andshouldbeapartofanycomprehensivepenetrationtestingandRedTeamprogram.

Page 76: The CIS Critical Security Controls for Effective Cyber Defense

72

CSC20EntityRelationshipDiagram

PenetrationTesters

ComputingSystems

PenetrationTestingSystems

Alerting/ReportingAnalyticsSystem

Page 77: The CIS Critical Security Controls for Effective Cyber Defense

73

AppendixA:EvolvingAnAttackModelfortheCISCriticalSecurityControls.

Background

Sincetheirinception,theCISCriticalSecurityControls(“theControls”)havehadabasictenetof“OffenseInformsDefense”.Thatis,knowledgeofactualattacksthathavecompromisedsystems(theBadGuys’“offense”)isthekeyfactortoinformanddeterminethevalueofdefensiveactions.Youmaynotbeabletoaffordtodoeverythingyouwantorneedtodoandsocyberdefensemustbedrivenbyprioritization–whatshouldIdofirsttogetthemostvaluefrommydefensiveresources?Webelievethatvalueisbestdeterminedbytheattacker–whataretheydoingtousnow,andwhatarethemostuseful,scalableactionswecantaketostopthem?

TheControlsreflectandknowledgeofactualattacksandeffectivedefensesgatheredfromexpertsfromeverypartoftheecosystemacrossmanysectors.Todothis,ateamreviewedandanalyzedattackdatafrommanyoftheleadingvendorthreatreportstoensuretheControlsadequatelyalignedwiththemostprevalentthreats.Wecallthisprocessa“CommunityAttackModel”fortheCISCriticalSecurityControls–thegatheringofrelevantreal-lifeinformationaboutattacksandputtingthemintocontextsotheycanbeeasilyandreliablymappedtodefensiveaction.“Community”referstothebreadthoftheparticipantsandinformationsources,andalsotothesharedlaborthatoperatesthisprocess.ButwealsoemphasizethatthesearethethreatsthattheentireCommunityfaces–thedocumented,specificsuccessesoftheAttackers.Anyonespecificcategoryofattackmightnothavehityoutoday,butitcouldjustaseasilydosotomorrow.

ACommunityApproachtoUnderstandingAttacksandThreats

TheCommunityAttackModelbeganbyvalidatingandenrichingmappingfromawell-documentedandauthoritativesourceof“reallife”data–theVerizonDataBreachInvestigationsReport(2013,2014,2015).AftertheVerizonteamdidtheirprimaryanalysis,avolunteerpanelformedbytheCenterforInternetSecurityworkedwiththemtomapthemostimportantcategoriesofattacksseenintheprioryear’sdatadirectlyintheControls(atasub-Control)level,andthismapbecameakeypartoftheVerizonDBIRRecommendations.Morerecently,wecompletedsimilarmappingsusingannualreportsworkingwithSymantecInternetSecurityReport2015andHPCyberRiskReport2015.Thisapproachallowsreadersofthesedata-drivenannualreportstoeasilyandconsistentlymapintotheControls.

Acoupleofkeypointstonoteaboutthisworkflow.

• Themappingisfromthevendor’scategoryorsummarylevelofattacks–notfromdataabouteveryindividualattack.

Page 78: The CIS Critical Security Controls for Effective Cyber Defense

74

• Thedataiscreatedbythevendor’sbusinessmodel(e.g.,incidentresponse,managedsecurity,anti-malwaresensors,threatintelligence),andsoeachrepresentsanincompletebutwell-documentedsamplingoftheecosystem.

• Thecategoriesusedbythevendorsaretypicallyinnarrativeform,andnotpresentedinanystandardformortaxonomy.Recommendationsarealsotypicallyinnarrativeform,nottiedtoanyspecificdefensiveframework.Therefore,mappingfromanyonevendor’sreporttotheControlsrequiressomediscussionandanalyticjudgment.

Theuseofthisattackinformationandtheselectionofappropriatedefensiveactioncanbeseenaspartofabroader“FoundationalRiskAssessment”ofunderstandingvulnerabilities,thethreatsandtheresultingconsequences–onethatcanbeusedbyanindividualenterpriseasastartingpointforimmediate,high-valueaction,andcanalsoprovideabasisforcommonactionacrossanentirecommunity.

BuildingAnOperationalAttackModel

AsthecommunityaroundtheControlshasgrowninsizeanddiversity,andastheenvironmenthasgrownmorecomplex,wemustevolvethisModeltobemorescalable,repeatable,adaptabletodifferentcommunities,andmoreconsistentwithformalsecurityframeworks–allwithoutdisruptingthespiritofcooperationandcommongoodthathasbroughtusthisfar.

Whetheryouapproachthisproblemasanindividualenterpriseorasacommunityofenterprises,youmustcreateandoperateanongoing,repeatableprocesstofindrelevantnewinformationaboutAttackers,assesstheimplicationsforyourenvironment,makekeydecisions,andthentakeaction.Doingsowillhelpdetermineyourbestinvestmentsbothtacticallyandstrategically.

Attackers Solutions,servicesvendors

•collect,analyzeattackdata

•summarizebyclasses,categories;prioritize

•makerecommendations,publishreport

CenterforInternetSecurity

•foreachreport,mapfromclassesofproblemsintotheCSCs(sub-Controls)

•publisheachmapping

•refreshControlsasneeded

Page 79: The CIS Critical Security Controls for Effective Cyber Defense

75

Ausefulmodelwillhaveanumberofessentialattributes.

• Itshouldbedrivenbydatafromauthoritative,publiclyavailablesources,butalsobeabletomakeuseofspecialized(e.g.,uniquelyapplicabletoasector)orrestricted(e.g.,encumberedbyclassificationoragreement)knowledge.

• Itshouldhaveawell-definedprocesstotranslatefromattackstoaction(controls)inawaythatsupportsprioritizationandisconsistentwithformalRiskManagementFrameworks.

• Itshouldhaveanon-going“refresh”cyclethatallowsvalidationofpriordefensivechoices,aswellasassessmentofnewinformation.

• Itshouldbelowcost,andpreferablysharedcostacrossacommunity.• Itshouldbeopenlydemonstrabletoothersandnegotiable(sinceyourriskisalways

sharedwithothers).

SotheevolutionoftheCISCriticalSecurityControlswillfollowtheaboveguidelinestocontinuallyenrichandrefreshtheControls.Itwillexpandthenumberandvarietyofthreatreports,developastandardcategorizationortaxonomyofattackstomaptootherframeworksandwilltakeadvantageofexistingavenuesforinformationsharing,suchasusingtheMulti-StateInformationSharingandAnalysisCenter(MS-ISAC).

Page 80: The CIS Critical Security Controls for Effective Cyber Defense

76

AppendixB:AttackTypes

Historically,thefollowingAttackTypesweretheprimaryonesconsideredwhendevelopingtheCriticalSecurityControls.ThetypeswerealsomappedbackintotheControlsaspartofthediscussiontoensuregoodcoveragebytheControls.ThisapproachhasbeenphasedoutinfavoroftheCISCommunityAttackModel.

AttackSummaryAttackerscontinuallyscanfornew,unprotectedsystems,includingtestorexperimentalsystems,andexploitsuchsystemstogaincontrolofthem.AttackersdistributehostilecontentonInternet-accessible(andsometimesinternal)websitesthatexploitunpatchedandimproperlysecuredclientsoftwarerunningonvictimmachines.Attackerscontinuallyscanforvulnerablesoftwareandexploitittogaincontroloftargetmachines.Attackersusecurrentlyinfectedorcompromisedmachinestoidentifyandexploitothervulnerablemachinesacrossaninternalnetwork.Attackersexploitweakdefaultconfigurationsofsystemsthataremoregearedtoeaseofusethansecurity.Attackersexploitnewvulnerabilitiesonsystemsthatlackcriticalpatchesinorganizationsthatdonotknowthattheyarevulnerablebecausetheylackcontinuousvulnerabilityassessmentsandeffectiveremediation.Attackerscompromisetargetorganizationsthatdonotexercisetheirdefensestodetermineandcontinuallyimprovetheireffectiveness.Attackersusemaliciouscodetogainandmaintaincontroloftargetmachines,capturesensitivedata,andthenspreadittoothersystems,sometimeswieldingcodethatdisablesordodgessignature-basedanti-virustools.Attackersscanforremotelyaccessibleservicesontargetsystemsthatareoftenunneededforbusinessactivities,butprovideanavenueofattackandcompromiseoftheorganization.Attackersexploitweakapplicationsoftware,particularlywebapplications,throughattackvectorssuchasSQLinjection,cross-sitescripting,andsimilartools.Attackersexploitwirelessaccesspointstogainentryintoatargetorganization’sinternalnetwork,andexploitwirelessclientsystemstostealsensitiveinformation.Attackersexploitusersandsystemadministratorsviasocialengineeringscamsthatworkbecauseofalackofsecurityskillsandawareness.Attackersexploitandinfiltratethroughnetworkdeviceswhosesecurityconfigurationhasbeenweakenedovertimebygranting,forspecificshort-termbusinessneeds,supposedlytemporaryexceptionsthatareneverremoved.

Page 81: The CIS Critical Security Controls for Effective Cyber Defense

77

Attackerstrickauserwithanadministrator-levelaccountintoopeningaphishing-styleemailwithanattachmentorsurfingtotheattacker’scontentonanInternetwebsite,allowingtheattacker’smaliciouscodeorexploittorunonthevictimmachinewithfulladministratorprivileges.AttackersexploitboundarysystemsonInternet-accessibleDMZnetworks,andthenpivottogaindeeperaccessoninternalnetworks.Attackersexploitpoorlydesignednetworkarchitecturesbylocatingunneededorunprotectedconnections,weakfiltering,oralackofseparationofimportantsystemsorbusinessfunctions.

Attackersoperateundetectedforextendedperiodsoftimeoncompromisedsystemsbecauseofalackofloggingandlogreview.

Attackersgainaccesstosensitivedocumentsinanorganizationthatdoesnotproperlyidentifyandprotectsensitiveinformationorseparateitfromnon-sensitiveinformation.Attackerscompromiseinactiveuseraccountsleftbehindbytemporaryworkers,contractors,andformeremployees,includingaccountsleftbehindbytheattackersthemselveswhoareformeremployees.Attackersescalatetheirprivilegesonvictimmachinesbylaunchingpasswordguessing,passwordcracking,orprivilegeescalationexploitstogainadministratorcontrolofsystems,whichisthenusedtopropagatetoothervictimmachinesacrossanenterprise.Attackersgainaccesstointernalenterprisesystemsandgatherandexfiltratesensitiveinformationwithoutdetectionbythevictimorganization.Attackerscompromisesystemsandalterimportantdata,potentiallyjeopardizingorganizationaleffectivenessviapollutedinformation.Attackersoperateundiscoveredinorganizationswithouteffectiveincident-responsecapabilities,andwhentheattackersarediscovered,theorganizationsoftencannotproperlycontaintheattack,eradicatetheattacker’spresence,orrecovertoasecureproductionstate.

Page 82: The CIS Critical Security Controls for Effective Cyber Defense

78

AppendixC:TheNISTFrameworkforImprovingCriticalInfrastructureCybersecurity

SinceitsreleaseinFebruary2014,TheNISTFrameworkforImprovingCriticalInfrastructureCybersecurityhasbecomeamajorpartofthenationalconversationaboutcybersecurityforthecriticalinfrastructure(andbeyond),andwebelieveitrepresentsanimportantsteptowardslarge-scaleandspecificimprovementsinsecurityfortheUnitedStatesandinternationally.TheCenterforInternetSecuritywasanactiveparticipantinthedevelopmentoftheFramework,andtheCISCriticalSecurityControlsarecalledoutasoneofthe“InformativeReferences”thatcanbeusedtodrivespecificimplementation.TheFrameworkistruetoitsname–“asetofprinciples,ideas,etc.thatyouusewhenyouareformingyourdecisionsandjudgments”(fromtheMacMillanDictionary)–anditprovidesawaytoorganize,conduct,anddrivetheconversationaboutsecuritygoalsandimprovements,forindividualenterprisesandacrosscommunitiesofenterprises.Butitdoesnotincludeanyspecificriskmanagementprocess,orspecifyanypriorityofaction.Those“decisionsandjudgments”arelefttotheadoptertomanagefortheirspecificsituationandcontext.

Webelievethatforthevastmajorityofenterprises,thebestapproachtosolvingtheseproblemsistotacklethemasacommunity–notenterprise-by-enterprise.ThisistheessenceoftheCISnon-profitcommunitymodel,andisembodiedinprojectsliketheCISCriticalSecurityControls,theCISSecurityConfigurationBenchmarks,andtheNationalCyberHygieneCampaign.Weneedtobandtogethertoidentifykeyactions,createinformation,sharetools,andremovebarrierssothatwecanallsucceed.

InthatspirittheCenterforInternetSecuritywillcontinuetosupporttheevolutionoftheFramework,andalsohelpourcommunityleveragethecontent,processes,andprioritiesoftheCISCriticalSecurityControlsasanactionmechanisminalignmentwiththeNISTCybersecurityFramework.

BelowisanexampleoftheworkingaidsthatCISmaintainstohelpourcommunityleveragetheFramework.ThischartshowsthemappingfromtheCriticalSecurityControls(Version6.0)intothemostrelevantNISTCSF(Version1.0)CoreFunctionsandCategories.

CybersecurityFramework(CSF)CoreCISCriticalSecurityControls(V6.0) Identify Protect Detect Respond RecoverCSC1:InventoryofAuthorizedandUnauthorizedDevices AM

CSC2:InventoryofAuthorizedandUnauthorizedSoftware AM

Page 83: The CIS Critical Security Controls for Effective Cyber Defense

79

CybersecurityFramework(CSF)CoreCISCriticalSecurityControls(V6.0) Identify Protect Detect Respond RecoverCSC3:SecureConfigurationofEnduserdevices IP

CSC4:ContinuousVulnerabilityAssessmentandRemediation RA CM MI

CSC5:ControlledUseofAdministrativePrivileges AC

CSC6:Maintenance,Monitoring,andAnalysisofAuditLogs AE AN

CSC7:EmailandWebBrowserProtections PT

CSC8:MalwareDefense PT CM

CSC9:LimitationandControlofNetworkPorts,Protocols,andService

IP

CSC10:DataRecoveryCapability RP

CSC11:SecureConfigurationofNetworkDevices IP

CSC12:BoundaryDefense DP

CSC13:DataProtection DS

CSC14:ControlledAccessBasedonNeedtoKnow AC

CSC15:WirelessAccessControl AC

CSC16:AccountMonitoringandControl AC CM

CSC17:SecuritySkillsAssessmentandAppropriateTraining

AT

CSC18:ApplicationSoftwareSecurity IP

CSC19:IncidentResponseandManagement AE RP

CSC20:PenetrationTestsandRedTeamExercises IM IM

Page 84: The CIS Critical Security Controls for Effective Cyber Defense

80

AppendixD:TheNationalCyberHygieneCampaign

TheNationalCampaignforCyberHygienewasdevelopedtoprovideaplain-language,accessible,andlow-costfoundationforimplementationoftheCISCriticalSecurityControls.AlthoughtheControlsalreadysimplifythedauntingchallengesofcyberdefensebycreatingcommunityprioritiesandaction,manyenterprisesarestartingfromaverybasiclevelofsecurity.

TheCampaignstartswithafewbasicquestionsthateverycorporateandgovernmentleaderoughttobeabletoanswer.

• Doweknowwhatisconnectedtooursystemsandnetworks?(CSC1)• Doweknowwhatsoftwareisrunning(ortryingtorun)onoursystemsand

networks?(CSC2)• Arewecontinuouslymanagingoursystemsusing“knowngood”configurations?

(CSC3)• Arewecontinuouslylookingforandmanaging“knownbad”software?(CSC4)• Dowelimitandtrackthepeoplewhohavetheadministrativeprivilegestochange,

bypass,orover-rideoursecuritysettings?(CSC5)

Thesequestions,andtheactionsrequiredtoanswerthem,arerepresentedin“plainlanguage”bytheTop5PrioritiesoftheCampaign:“Count,Configure,ControlPatch,Repeat”.TosupporttheCampaign,volunteershavecreateddocumentationand“toolkits”toguideimplementation.

Althoughthelanguageissimpleandcatchy,behindthesceneseachofthesequestionsisassociatedwithaprimaryControlthatprovidesanactionplan.TheCampaignisalsodesignedtobeinalignmentwiththefirst5oftheCISCriticalSecurityControls,theAustralianSignalsDirectorate’s(ASD)“TopFourStrategiestoMitigateTargetedIntrusions,andtheDHSContinuousDiagnosticandMitigation(CDM)Program.ThisprovidesastronganddefendablebasisfortheCampaignPriorities,agrowthpathformaturitybeyondthesebasicactions,andthebenefitsofalargecommunityofexperts,users,andvendors.

TheNationalCampaignforCyberHygienehasbeenjointlyadoptedbytheCenterforInternetSecurity(homeoftheMulti-StateInformationSharingandAnalysisCenter)andtheNationalGovernor’sAssociationHomelandSecurityAdvisoryCouncil(GHSAC)asafoundationalcybersecurityprogramacrossmanyState,Local,Tribal,andTerritorialgovernmentsandofferstoolkitsandresourcesforanypublicorprivateorganization.

Formoreinformation,gotowww.cisecurity.org.

Page 85: The CIS Critical Security Controls for Effective Cyber Defense

81

AppendixE:CriticalGovernanceControlsandtheCISCriticalSecurityControls

Cybersecuritygovernanceisakeyresponsibilityoftheboardofdirectorsandseniorexecutives,anditmustbeanintegralpartofoverallenterprisegovernance.Becauseofitsdynamicnature,cybersecuritygovernancemustalsobealignedwithanoperationalcybersecurityframework.

Toexerciseeffectivegovernance,executivesmusthaveaclearunderstandingofwhattoexpectfromtheirinformationsecurityprogram.Theyneedtoknowhowtodirecttheimplementation,evaluatetheirownstatuswithregardtoexistingsecurityprograms,anddeterminethestrategyandobjectivesofaneffectivesecurityprogram.

HowtheCISCriticalSecurityControlsCanHelp

TheControlsareactionable,automatedactivitiesthatdetectandpreventattacksagainstyournetworkandmostimportantdata.Theysupportenterprisesecuritygovernanceprogramsbybridgingthegapfromanexecutiveviewofbusinessrisktoatechnicalviewofspecificactionsandoperationalcontrolstomanagethoserisks.Keyexecutiveconcernsaboutinformationsecurityriskscanbetranslatedintospecificprogramsforsecurityimprovement,andalsointoday-to-daysecuritytasksforfront-linepersonnel.Thisallowsbetteralignmenttop-to-bottomofcorporateriskmanagement.Also,sincetheControlsarecreatedandsupportedbyalargeindependentcommunityofpractitionersandvendors,theyprovideaspecific,supported,andopenbaselineformeasurementandnegotiationaboutsecurityimprovement–onethatisdemonstrablyinalignmentwithessentiallyallformalregulatory,governance,andoversightframeworks.FromGovernancetotheCISCriticalSecurityControlsTohelpimproveyourcompany'sabilitytomanageinformationrisks,herearesomesamplestepstohelpyoualigncorporategovernanceconcernswiththeimplementationofsecuritycontrols.Theseexamplesidentifytheprimary,butnottheonly,CISCriticalSecurityControlswhichshouldbeimplemented.Governanceitem#1:Identifyyourmostimportantinformationassetsandtheimpactonyourbusinessormissioniftheyweretobecompromised.

Informationisthelifebloodofeverymodernenterprise,andthemovement,storage,andcontrolofthatinformationisinextricablyboundtotheuseofInformationTechnology.ThereforethefollowingCISCriticalSecurityControlsaretheprimarymeanstotrackandcontrolthesystemcomponentsthatmanagetheflow,presentation,anduseofinformation.

CSC1—InventoryofAuthorizedandUnauthorizedDevices

CSC2—InventoryofAuthorizedandUnauthorizedandSoftware

Page 86: The CIS Critical Security Controls for Effective Cyber Defense

82

GovernanceItem#2:Managetheknowncybervulnerabilitiesofyourinformationandmakesurethenecessarysecuritypoliciesareinplacetomanagetherisk.

Ataminimum,youshouldbeabletoidentifyandmanagethelargevolumeofknownflawsandvulnerabilitiesfoundinInformationTechnologyandprocesses.ThefollowingCISCriticalSecurityControlsaretheprimarymeanstoestablishabaselineofresponsiblepracticesthatcanbemeasured,managed,andreported.

CSC3:SecureConfigurationsofHardwareandSoftware

CSC4:ContinuousVulnerabilityAssessmentandRemediation

GovernanceItem#3:Clearlyidentifythekeythreatstoyourinformationandassesstheweaknessesinyourdefense.

Threatstoyourinformation,systems,andprocessesevolveconstantly.ThefollowingCISCriticalSecurityControlsaretheprimarymeanstoestablishabaselineofresponsiblepracticesthatcanbemeasured,managed,andreported.

CSC8:MalwareDefenses

CSC20:PenetrationTestsandRedTeamExercises

GovernanceItem#4:Confirmandcontrolwhohasaccesstothemostimportantinformation.

Ensuringthattherightpeoplehaveaccesstocorporatedataandensuringprivilegesaremanagedaccuratelycanreducetheimpactofunauthorizedaccess,bothfrominternalthreatsandexternal.ThefollowingCISCriticalSecurityControlsaretheprimarymeanstoestablishabaselineofresponsiblepracticestoidentifyneedsandmanageaccess.

CSC5:ControlledUseofAdministrativePrivileges

CSC14:ControlledAccessBasedontheNeedtoKnow

Afundamentalgoalofinformationsecurityistoreduceadverseimpactsontheorganizationtoanacceptablelevelofrisk.Therefore,acrucialmetriccomprisestheadverseimpactsofinformationsecurityincidentsexperiencedbythecompany.Aneffectivesecurityprogramwillshowatrendofimpactreduction.Quantitativemeasurescanincludetrendanalysisofimpactsovertime.

Page 87: The CIS Critical Security Controls for Effective Cyber Defense

83

DevelopinganOverallGovernanceStrategy

WhiletheCISCriticalSecurityControlsprovideaneffectivewaytoplan,prioritize,andimplementprimarilytechnicalcontrolsforcyberdefense,theyarebestusedaspartofaholisticinformationgovernanceprogram–onethatalsoaddressespolicies,standards,andguidelinesthatsupporttechnicalimplementations.Forexample,conductinganinventoryofdevicesonyournetworkisanimportanttechnicalbestpractice,butanorganizationmustalsodefineandpublishpoliciesandprocessesthatclearlycommunicatetoemployeesthepurposeofthesecontrols,whatisexpectedofthemandtheroletheyplayinprotectingthecompany’sinterests.

Thefollowingtopicsprovideausefulframeworkfordevelopingyouroverallgovernancestrategy.Basedonourexperience,theseareprioritizedbasedontheirimpactinbuildingandsupportinganeffectiveinformationassuranceprogram.

ExecutiveSponsorship:Developinformationassurancecharterswithrolesandresponsibilities,steeringcommittees,andboardofdirectorbriefingstoestablishsupportandleadershipfromexecutives.

InformationAssuranceProgramManagement:Definemanagementandresourceallocationcontrols,suchasbudgeting,andprioritizationtogoverninformationassuranceprogramsunderexecutivesponsorship.

InformationAssurancePoliciesandStandardsManagement:Defineanddocumentpoliciesandstandardstoprovidedetailedguidanceregardinghowsecuritycontrolswillbecompletedtopromoteconsistencyindefense.

DataClassification:Identify,prioritizeandlabeldataassets,includinganalogorphysicalassets.

RiskManagement:Identifythoughtfulandpurposefuldefensestrategiesbasedonprioritydecisionsonhowbesttodefendvaluabledataassets.

ComplianceandLegalManagement:Addresscompliancerequirementsbasedontheregulatoryandcontractualrequirementsplacedonyourorganization.

SecurityAwarenessandEducation:Establisheducationplansforallworkforcememberstoensurethattheyhavethenecessaryskillstoprotectinformationassetsasapartoftheirresponsibilities.

AuditandAssessmentManagement:Conductauditsandassessmentstoensurethatinformationassuranceeffortsareconsistentwiththestandardsyouhavedefinedandtoassistinyoureffortstomanagerisk.

Page 88: The CIS Critical Security Controls for Effective Cyber Defense

84

PersonnelandHumanResourcesManagement:Specifypersonnelandhumanresourcescontrolstomanagethewaypeopleinteractwithdataassets.People,aswellastechnologycontrols,arecriticalforthedefenseofinformationassets.

BudgetsandResourceManagement:Allocateappropriateresourcesinordertobeeffectiveatdefense.Informationassurancearchitecturesarevitalfordefense,butwithoutbudgetsandresources,suchplanswillneverbeeffective.

PhysicalSecurity:Protecttheequipment,buildings,andlocationswheredataassetsarestoredtoprovideafoundationforthelogicalsecurityofdataassets.

IncidentResponseManagement:Specifytheplannedmanagementofhowyouwillrespondinthefaceofpotentiallyadverseevents.Thisactsasacomponentofbusinesscontinuityanddisastermanagement.

BusinessContinuityandDisasterRecoveryManagement:Specifyresiliencycontrolstohelpmitigatepotentiallossesduetopotentialdisruptionstobusinessoperations.

ProcurementandVendorManagement:Partnerwithbusinessassociatesindefendingtheirdataassets.TheControlsdefinehowanorganizationalignswiththirdpartiesandvendorstoprotecttheirdataassets.

ChangeandConfigurationManagement:Assess,acceptordeny,andlogchangestosystems,especiallyconfigurationchangesinasystematicformalmannerinordertodefendtheorganization’sinformationassets.

Organizationsareencouraged(andmanyarerequired)toimplementthesegovernancecontrolsinparallelwiththetechnicalcontrolsdefinedelsewhereinthisdocument.Bothtechnicalandgovernancerelatedcontrolsshouldbeconsideredequallyimportantpillarsinthearchitectureofanorganization’sdefense.

Page 89: The CIS Critical Security Controls for Effective Cyber Defense

85

AppendixF:TowardAPrivacyImpactAssessment(PIA)fortheCISCriticalSecurityControls

Introduction

Aneffectivepostureofenterprisecybersecurityneednot,and,indeed,shouldnotcompromiseindividualprivacy.Manylaws,regulations,guidelines,andrecommendationsexisttosafeguardprivacy,andenterpriseswill,inmanycases,adapttheirexistingpoliciesonprivacyastheyapplytheControls.

Ataminimum,useoftheControlsshouldconformtothegeneralprinciplesembodiedintheFairInformationPracticeprinciples(FIPs)2andinPrivacybyDesign.3AllenterprisesthatapplytheControlsshouldundertake–andmakeavailabletostakeholders–privacyimpactassessmentsofrelevantsystemstoensurethatappropriateprotectionsareinplaceastheControlsareimplemented.Everyenterpriseshouldalsoregularlyreviewtheseassessmentsasmaterialchangestoitscybersecuritypostureareadopted.TheaimistoassessandmitigatethemajorpotentialprivacyrisksassociatedwithimplementingspecificControlsaswellasevaluatetheoverallimpactoftheControlsonindividualprivacy.

ToassistenterprisesineffortstoconductaprivacyimpactassessmentwhenimplementingtheControlsandtocontributetotheestablishmentofamoregeneralreferencestandardforprivacyandtheControls,CISwillconvenetechnicalandprivacyexpertstorevieweachControlandofferrecommendationsforbestpractice.

ThefollowingframeworkwillhelpguidethiseffortandprovideapossibleoutlineforaPrivacyImpactAssessment.

PrivacyImpactAssessmentoftheCISCriticalSecurityControls

I.Overview

OutlinethepurposeofeachControlandprovidejustificationforanyactualorpotentialintersectionwithprivacy-sensitiveinformation.

• Wherepossible,identifyhowtechnologies,procedures,anddataflowsareusedtoimplementtheControl.ProvideabriefdescriptionofhowtheControlgenerally

2Seehttp://www.dhs.gov/publication/fair-information-practice-principles-fipps,andhttp://www.nist.gov/nstic/NSTIC-FIPPs.pdf.

3Seehttps://www.privacybydesign.ca.TheapproachdiscussedinthisAnnexdrawsheavilyonpublicsectorapproachesintheUnitedStates,butcanbeadaptedforanyjurisdiction.

Page 90: The CIS Critical Security Controls for Effective Cyber Defense

86

collectsandstoresinformation.IdentifythetypeofdatacollectedbytheControlandthekindsofinformationthatcanbederivedfromthisdata.IndiscussinghowtheControlmightcollectandusePII,includeatypicaltransactionthatdetailsthelifecycleofthatPIIfromcollectiontodisposal.

• Describethemeasuresnecessarytoprotectprivacydataandmitigateanyrisksofunauthorizedaccessorinadvertentdisclosureofthedata.Theaimhereisnottolisteverypossiblerisktoprivacy,butrather,toprovideaholisticviewoftheriskstoprivacythatcouldarisefromimplementationoftheControl.

• Describeanypotentialad-hocorroutineinformationsharingthatwillresultfromtheimplementationoftheControlbothwithintheenterpriseandwithexternalsharingpartners.Alsodescribehowsuchexternalsharingiscompatiblewiththeoriginalcollectionoftheinformation,andwhatagreementswouldneedtobeinplacetosupportthissharing.

II.Authorities

Identifythelegalauthoritiesorenterprisepoliciesthatwouldpermitor,conversely,limitorprohibitthecollectionoruseofinformationbytheControl.

• ListthestatutoryandregulatoryauthoritiesthatwouldgovernoperationoftheControl,includingtheauthoritiestocollecttheinformationidentifiedabove.Explainhowthestatutoryandregulatoryauthoritiespermitorwouldlimitcollectionanduseoftheinformationorgoverngeographicstoragerequirements.IftheControlwouldconceivablycollectPersonallyIdentifiableInformation(PII),alsoidentifythespecificstatutoryauthoritythatwouldpermitsuchcollection.

• Wouldtheresponsibleofficeofanenterprisebeabletorelyonauthoritiesofanotherparentorganization,subsidiary,partneroragency?

• MighttheinformationcollectedbytheControlbereceivedfromaforeignuser,organizationorgovernment?Ifso,doanyinternationalagreement,contract,privacypolicyormemorandumofunderstandingexisttosupportorotherwisegovernthiscollection?

III.CharacterizingControl-RelatedInformation

IdentifythetypeofdatatheControlcollects,uses,disseminates,ormaintains.

• ForeachControl,identifyboththecategoriesoftechnologysources,logs,orindividualsfromwhominformationwouldbecollected,and,foreachcategory,listanypotentialPII,thatmightbegathered,used,orstoredtosupporttheControl.

o Relevantinformationhereincludes(butisnotlimitedto):name;dateofbirth;mailingaddress;telephonenumbers;socialsecuritynumber;e-mailaddress;mother’smaidenname;medicalrecordslocators;bankaccountnumbers;healthplanbeneficiaries;anyotheraccountnumbers;certificatesorotherlicensenumbers;vehicleidentifiers,includinglicenseplates;

Page 91: The CIS Critical Security Controls for Effective Cyber Defense

87

marriagerecords;civilorcriminalhistoryinformation;medicalrecords;deviceidentifiersandserialnumbers;educationrecords;biometricidentifiers;photographicfacialimages;oranyotheruniqueidentifyingnumberorcharacteristic.

• IftheoutputoftheControl,orsystemonwhichitoperates,createsnewinformationfromdatacollected(forexample,ascoring,analysis,orreport),thismightthisnewinformationhaveprivacyimplications?Ifso,performthesameaboveanalysisonthenewlycreatedinformation.

• IftheControlusesinformationfromcommercialsourcesorpubliclyavailabledatatoenrichotherdatacollected,explainhowthisinformationmightbeused.

o Commercialdataincludesinformationfromdataaggregators(suchasLexisNexis,threatfeeds,ormalwaredatabases),orfromsocialnetworkingsourceswheretheinformationwasoriginallycollectedbyaprivateorganization.

o Publiclyavailabledataincludesinformationobtainedfromtheinternet,newsfeeds,orfromstateorlocalpublicrecords,suchascourtrecordswheretherecordsarereceiveddirectlyfromthestateorlocalagency,ratherthanfromacommercialdataaggregator.

o Identifyscenarioswiththisenricheddatamightderivedatathatcouldhaveprivacyimplications.Ifso,performthesameaboveanalysisonthenewlycreatedinformation.

• IdentifyanddiscusstheprivacyrisksforControlinformationandexplainhowtheyaremitigated.Specificrisksmaybeinherentinthesourcesormethodsofcollection.

• ConsiderthefollowingFairInformationPracticeprinciples(FIPs):o PrincipleofPurposeSpecification:ExplainhowthecollectionofPIIbythe

Controllinkstothecybersecurityneedsoftheenterprise.o PrincipleofMinimization:IsthePIIdatadirectlyrelevantandnecessaryto

accomplishthespecificpurposesoftheControl?o PrincipleofIndividualParticipation:DoestheControl,totheextentpossible

andpractical,collectPIIdirectlyfromindividuals?

IV.UsesofControl-RelatedInformation

DescribetheControl’suseofPIIorprivacyprotecteddata.DescribehowandwhytheControlusesthisdata.

• Listlikelyusesoftheinformationcollectedormaintained,bothinternalandexternaltotheenterprise.Explainhowandwhydifferentdataelementswillbeused.IfSocialSecuritynumbersarecollectedforanyreason,forexample,describewhysuchcollectionisnecessaryandhowsuchinformationwouldbeused.Describetypesofproceduresandprotectionstobeinplacetoensurethatinformationishandledappropriately,andpoliciesthatneedtobeinplacetoprovideusernotification.

• DoestheControlmakeuseoftechnologytoconductelectronicsearches,queries,oranalysesinadatabasetodiscoverorlocateapredictivepatternorananomaly?If

Page 92: The CIS Critical Security Controls for Effective Cyber Defense

88

so,describewhatresultswouldbeachievedandiftherewouldbepossibilityofprivacyimplications.

• SomeControlsrequiretheprocessingoflargeamountsofinformationinresponsetouserinquiryorprogrammedfunctions.TheControlsmayhelpidentifydatathatwerepreviouslynotidentifiableandmaygeneratetheneedforadditionalresearchbyanalystsorotheremployees.SomeControlsaredesignedtoperformcomplexanalyticaltasksresultinginothertypesofdata,matching,relationalanalysis,scoring,reporting,orpatternanalysis.

• Discusstheresultsgeneratedbytheusesdescribedabove,includinglinkanalysis,scoring,orotheranalyses.Theseresultsmaybegeneratedelectronicallybytheinformationsystem,ormanuallythroughreviewbyananalyst.Wouldtheseresultspotentiallyhaveprivacyimplications?

• Arethereotherofficesordepartmentswithinorconnectedtotheenterprisethatwouldreceiveanydatagenerated?Wouldtherebeprivacyimplicationstotheiruseorcollectionofthisdata?

• ConsiderthefollowingFIPs:o PrincipleofTransparency:IsthePIAandrelatedpoliciesclearabouttheuses

ofinformationgeneratedbytheControl?o PrincipleofUseLimitation:Istheuseofinformationcontainedinthesystem

relevanttothemissionoftheControl?

V.Security

Completeasecurityplanfortheinformationsystem(s)supportingtheControl.

• IsthereappropriateguidancewhenimplementingtheControltoensurethatappropriatephysical,personnel,IT,andothersafeguardsareinplacetoprotectprivacyprotecteddataflowingtoandgeneratedfromtheControl?

• ConsiderthefollowingFairInformationPracticeprinciple:o PrincipleofSecurity:Isthesecurityappropriateandproportionatetothe

protecteddata?

VI.Notice

IdentifyifanynoticetoindividualsmustbeputinplaceregardingimplementationoftheControl,PIIcollected,therighttoconsenttousesofinformation,andtherighttodeclinetoprovideinformation(ifpracticable).

• Definehowtheenterprisemightrequirenoticetoindividualspriortothecollectionofinformation.

• Enterprisesoftenprovidewrittenororalnoticetoemployees,customers,shareholders,andotherstakeholdersbeforetheycollectinformationfromindividuals.IntheU.S.government,thatnoticemayincludeapostedprivacypolicy,aPrivacyActstatement,aPrivacyImpactAssessment,oraStatementofRecords

Page 93: The CIS Critical Security Controls for Effective Cyber Defense

89

Notice(SORN)publishedintheU.S.FederalRegister.Forprivatecompanies,collectinginformationfromconsumers,publiclyavailableprivacypoliciesareused.DescribewhatnoticemightberelevanttoindividualswhoseinformationmightbecollectedbytheControl.

• Ifnoticemightnot,orcannotbeprovided,defineifoneisrequiredorhowitcanbemitigated.Forcertainlawenforcementoperations,noticemaynotbeappropriate–enterpriseswouldthenexplainhowprovidingdirectnoticetotheindividualatthetimeofcollectionwouldunderminealawenforcementmission.

• DiscusshowthenoticeprovidedcorrespondstothepurposeoftheControlandthedeclareduses.Discusshowthenoticegivenfortheinitialcollectionisconsistentwiththestateduse(s)oftheinformation.DescribehowimplementationoftheControlmitigatestherisksassociatedwithpotentiallyinsufficientnoticeandopportunitytodeclineorconsent.

• ConsiderthefollowingFIPs:o PrincipleofTransparency:WillthisControlallowsufficientnoticetobe

providedtoindividuals?o PrincipleofUseLimitation:Istheinformationusedonlyforthepurposefor

whichnoticewasprovidedeitherdirectlytoindividualsorthroughapublicnotice?Whatprocedurescanbeputinplacetoensurethatinformationisusedonlyforthepurposearticulatedinthenotice?

o PrincipleofIndividualParticipation:Willtheenterpriseberequiredtoprovidenoticetoindividualsregardingredress,includingaccessandcorrection,includingotherpurposesofnoticesuchastypesofinformationandcontrolsoversecurity,retention,disposal,etc.?

VII.DataRetention

Willtherebearequirementtodeveloparecordsretentionpolicy,subjecttoapprovalbytheappropriateenterpriseauthorities(e.g.,management,Board),togoverninformationgatheredandgeneratedbytheControl?

• ConsiderthefollowingFIPsbelowtoassistinprovidingaresponse:o PrincipleofMinimization:DoestheControlhavethecapacitytouseonlythe

informationnecessaryfordeclaredpurposes?WouldtheControlbeabletomanagePIIretainedonlyforaslongasnecessaryandrelevanttofulfillthespecifiedpurposes?

o PrincipleofDataQualityandIntegrity:DoesthePIAdescribepoliciesandproceduresrequiredbyanorganizationforhowPIIispurgedonceitisdeterminedtobenolongerrelevantandnecessary?

VIII.InformationSharing

DescribethescopeoftheinformationsharingwithinandexternaltotheenterprisethatcouldberequiredtosupporttheControl.Externalsharingencompassessharingwithother

Page 94: The CIS Critical Security Controls for Effective Cyber Defense

90

businesses,vendors,privatesectorgroups,orfederal,state,local,tribal,andterritorialgovernment,aswellaswithgovernmentsorofficialagenciesofothercountries.

• Forstateorlocalgovernmentagencies,orprivatesectororganizationslistthegeneraltypesthatmightbeapplicablefortheControl,ratherthanthespecificnames.

• Describeanyagreementsthatmightberequiredforanorganizationtoconductinformationsharingaspartofnormalenterpriseoperations.

• Discusstheprivacyrisksassociatedwiththesharingofinformationoutsideoftheenterprise.Howcanthoserisksbemitigated?

• DiscusshowthesharingofinformationiscompatiblewiththestatedpurposeanduseoftheoriginalcollectionfortheControl.

IX.Redress

EnterprisesshouldhaveinplaceproceduresforindividualstoseekredressiftheybelievetheirPIImayhavebeenimproperlyorinadvertentlydisclosedormisusedthroughimplementationoftheControls.Theseproceduresmayincludeallowingthemtofilecomplaintsaboutwhatdataiscollectedorhowit’sused.

• ConsiderthefollowingissuethatfallsundertheFIPprincipleofIndividualParticipation:

o CanamechanismbeappliedbywhichanindividualcanpreventPIIobtainedforonepurposefrombeingusedforotherpurposeswithouttheindividual’sknowledge?

X.AuditingandAccountability

DescribewhattechnicalandpolicybasedsafeguardsandsecuritymeasuresmightbeneededtosupporttheControl.Includeanexaminationoftechnicalandpolicysafeguards,suchasinformationsharingprotocols,specialaccessrestrictions,andothercontrols.

• DiscusswhethertheControlallowsforself-audits,permitsthirdpartyaudits,orallowsrealtimeorforensicreviewsbyappropriateoversightagencies.

• DotheITsystemssupportingtheControlhaveautomatedtoolstoindicatewheninformationispossiblybeingmisused?

• DescribewhatrequirementsforprivacytrainingshouldbeprovidedtouserseithergenerallyorspecificallyrelevanttotheControl,includinginformationhandlingproceduresandsensitivityofinformation.DiscusshowindividualswhohaveaccesstoPIIcollectedorgeneratedbytheControlshouldbetrainedtoappropriatelyhandlethatinformation.

• Discussthetypesofprocessesandproceduresnecessarytoreviewandapproveinformationsharingagreements,newusesofControlinformation,andnewaccesstoControlinformationbyotherparties.

Page 95: The CIS Critical Security Controls for Effective Cyber Defense

91

AppendixG:CategorizationfortheCISCriticalSecurityControls

Introduction

WhenwecreatedVersion6oftheCISControls,oneofthenotablechangeswasdeletionofthe“categories”foreachsub-Control(QuickWin,VisibilityandAttribution,ImprovedSecurityConfigurationandHygiene,andAdvanced).Thesehadprovedtobeproblematicforseveralreasons,andanumberofpeoplefoundthemtobemoreinconsistentthanuseful.

ButotheradopterstoldustheymissedthecategoriesandfoundthemhelpfulinprioritizingtheirControlsimplementationplans,especiallyinpresentingthoseplanstomanagement,sowewentbacktotakeanotherlookatthem.Inaddition,peopleaskedformorehelpinidentifyingsub-controlsthatweretruly“advanced”andwouldrequiresubstantialinvestmentoftimeandresources.

Thisdocumentpresentsasimplercategorizationschemeforeachsub-control,alongwithsomeexplanatoryinformationtoseparateactionsthatweconsider“Foundational”fromthosethatare“Advanced”.

Description

InVersion5oftheCISControls,eachsub-categorywasidentifiedinoneofthefollowingcategories:

• Quickwinsthatprovidesignificantriskreductionwithoutmajorfinancial,procedural,architectural,ortechnicalchangestoanenvironment,orthatprovidesuchsubstantialandimmediateriskreductionagainstverycommonattacksthatmostsecurity-awareorganizationsprioritizethesekeycontrols.

• Visibilityandattributionmeasurestoimprovetheprocess,architecture,andtechnicalcapabilitiesoforganizationstomonitortheirnetworksandcomputersystemstodetectattackattempts,locatepointsofentry,identifyalready-compromisedmachines,interruptinfiltratedattackers’activities,andgaininformationaboutthesourcesofanattack.

• Improvedinformationsecurityconfigurationandhygienetoreducethenumberandmagnitudeofsecurityvulnerabilitiesandimprovetheoperationsofnetworkedcomputersystems,withafocusonprotectingagainstpoorsecuritypracticesbysystemadministratorsandend-usersthatcouldgiveanattackeranadvantage.

• Advancedsub-controlsthatusenewtechnologiesorproceduresthatprovidemaximumsecuritybutarehardertodeployormoreexpensiveorrequiremorehighlyskilledstaffthancommoditizedsecuritysolutions.

Page 96: The CIS Critical Security Controls for Effective Cyber Defense

92

ForVersion6.1,wemadethissimplerandmovedtoa2-categorysystem.Asastartingpoint,weworkedfromtheoriginalVersion5categoriessincemostofthesub-controlscarriedoverinsomeform.

• Foundational:Theseprovideessentialimprovementstotheprocess,architecture,andtechnicalcapabilitiesoforganizationstomonitortheirnetworksandcomputersystemstodetectattackattempts,locatepointsofentry,identifyalready-compromisedmachines,interruptinfiltratedattackers’activities,andgaininformationaboutthesourcesofanattack.Theyreducethenumberandmagnitudeofsecurityvulnerabilitiesandimprovetheoperationsofnetworkedcomputersystems,withafocusonprotectingagainstpoorsecuritypracticesbysystemadministratorsandend-usersthatcouldgiveanattackeranadvantage.

• Advanced:Thesearesub-controlsthatusenewtechnologiesorproceduresformaximumsecurity,butarehardertodeployormoreexpensiveorrequiremorehighlyskilledstaffthancommoditizedsecuritysolutions.

Howeveranumberofadoptersnotedthatsomeoftheindividualsub-controlscontainwording,phrases,oraninterpretationthatdidnotfallneatlyintoeithercategory.Soforeachofthose,weidentifiedaprimarycategory(FoundationalorAdvanced,shownas“Y”inonecolumnofthecharts);andthenweaddedtexttoclarifyandseparateouttheotheraspectofthesub-control.

Forexample,wemightidentifyagivensub-controlasFoundational,butthoseseekingtobuilduponthesub-controlforanAdvancedsecurityprogramnowhavesomeguidance.Thisisnotaparticularlyelegantsolution,butwewantedtoprovideusefulguidancewithoutasignificantrewriteofthesub-controls.EnterprisesadoptingtheControlsdosomethinglikethisanyway–interpreteachofthesub-controlsinthecontextoftheirspecificsituation,technicalbase,andriskmanagement–inordertocreatearoadmapofphasedimplementation.