CIS Critical Security Controls (CSC)

The CIS Critical Security Controls (CSC) is a set of cybersecurity best practices and guidelines designed to provide organizations with a prioritized approach to improve their security posture. These controls, developed by the Center for Internet Security (CIS), help organizations protect their information systems and data from common cyber threats.

The CIS CSC consists of 20 controls that are organized into three implementation groups: Basic, Foundational, and Organizational. These controls are meant to be implemented in a progressive manner, starting from the Basic Controls and gradually advancing to the more comprehensive Organizational Controls. Here’s an overview of the three groups and some examples of their implementation:

  1. Basic Controls (CSC 1-6):
    • Inventory and Control of Hardware and Software: Maintain an up-to-date inventory of authorized devices and software in the organization.
    • Continuous Vulnerability Management: Regularly scan systems for vulnerabilities and apply security patches promptly.
    • Secure Configurations for Hardware and Software: Establish and enforce secure configuration standards for all devices and applications.
    • Controlled Use of Administrative Privileges: Limit and monitor administrative access to systems and resources.
    • Maintenance, Monitoring, and Analysis of Audit Logs: Enable and regularly review logs to detect and respond to security incidents.
    • Email and Web Browser Protections: Implement security measures to protect against phishing attacks, malicious email attachments, and unsafe websites.
  2. Foundational Controls (CSC 7-16):
    • Malware Defenses: Deploy and maintain anti-malware solutions to protect systems from malicious software.
    • Data Recovery Capabilities: Regularly back up critical data and test the restoration process.
    • Secure Configurations for Network Devices: Apply secure configurations to routers, switches, and firewalls to reduce potential vulnerabilities.
    • Boundary Defense: Implement network segmentation and firewall rules to control traffic and protect sensitive data.
    • Data Protection: Encrypt sensitive information at rest and in transit to prevent unauthorized access.
    • Account Monitoring and Control: Monitor user accounts for suspicious activity and implement strong authentication mechanisms.
  3. Organizational Controls (CSC 17-20):
    • Security Awareness and Training Programs: Provide cybersecurity training to employees to promote awareness and best practices.
    • Application Software Security: Develop and implement secure coding practices and conduct regular security testing of applications.
    • Incident Response and Management: Establish an incident response plan to detect, respond, and recover from security incidents effectively.
    • Penetration Testing and Red Team Exercises: Conduct periodic security assessments to identify vulnerabilities and test the organization’s defenses.

Implementation examples of the CIS Critical Security Controls may vary depending on the organization’s size, industry, and specific security requirements. For instance:

  • An organization could implement the Inventory and Control of Hardware and Software control by using automated tools to discover and track all authorized devices and software applications in their network.
  • To enforce Secure Configurations for Hardware and Software, an organization may establish a standardized configuration management process and use tools to enforce compliance with the defined security baselines.
  • For Incident Response and Management, an organization might develop an incident response plan that outlines the roles and responsibilities of team members, defines communication protocols, and includes procedures for investigating and containing security incidents.

CIS Critical Security Controls provides a framework for organizations to establish a robust security foundation, prioritize their efforts, and mitigate common security risks effectively.

Author: tonyhughes