Course Content
Basics of Cyber Security
About Lesson

The threat landscape is constantly evolving, making it crucial for businesses to adopt effective security measures. One widely recognized framework that helps organizations enhance their cybersecurity posture is the Center for Internet Security (CIS) Critical Security Controls.

 

What are CIS Critical Security Controls?

The CIS Critical Security Controls, formerly known as the SANS Top 20, is a set of best practices designed to help organizations strengthen their cybersecurity defenses. Developed by a group of cybersecurity experts, the controls provide a roadmap for organizations to prioritize and implement essential security measures.

 

The 20 Controls

The CIS Critical Security Controls consist of 20 high-priority, action-oriented steps that organizations can take to improve their cybersecurity posture. These controls are organized into three categories:

 

Basic Cyber Hygiene (Controls 1-6)

  • Inventory and Control of Hardware Assets: Actively manage and secure hardware devices.
  • Inventory and Control of Software Assets: Actively manage and secure software.
  • Continuous Vulnerability Assessment and Remediation: Identify and remediate vulnerabilities on time.
  • Controlled Use of Administrative Privileges: Limit and control administrative privileges to reduce the risk of unauthorized access.
  • Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers: Establish and maintain secure configurations for devices and systems.
  • Maintenance, Monitoring, and Analysis of Audit Logs: Collect, manage, and analyze audit logs to detect and respond to security incidents.

 

Secure Configuration (Controls 7-16)

  • Email and Web Browser Protections: Minimize the attack surface and the opportunities for attackers to manipulate human behavior through their interaction with web browsers and email systems.
  • Malware Defenses: Implement defenses against malware to protect systems and data.
  • Limitation and Control of Network Ports, Protocols, and Services: Manage network ports, protocols, and services to minimize the attack surface.
  • Data Protection: Implement measures to prevent data exfiltration, encryption, and secure data storage.
  • Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches: Establish and maintain secure configurations for network devices.
  • Boundary Defense: Detect/prevent/correct the flow of information transferring networks of different trust levels.
  • Data Protection: Implement measures to prevent data exfiltration, encryption, and secure data storage.
  • Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches: Establish and maintain secure configurations for network devices.
  • Boundary Defense: Detect/prevent/correct the flow of information transferring networks of different trust levels.
  • Data Protection: Implement measures to prevent data exfiltration, encryption, and secure data storage.
  • Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches: Establish and maintain secure configurations for network devices.
  • Boundary Defense: Detect/prevent/correct the flow of information transferring networks of different trust levels.

 

Advanced Security Measures (Controls 17-20)

  • Implement a Security Awareness and Training Program: Educate employees and contractors about cybersecurity risks and best practices.
  • Incident Response and Management: Establish an incident response capability to effectively respond to and recover from cybersecurity incidents.
  • Penetration Tests and Red Team Exercises: Test the effectiveness of security controls through simulated cyber-attacks.
  • Continuous Monitoring and Analysis of Security Controls: Monitor, analyze, and respond to security events in real-time.

 

Why are CIS Critical Security Controls Important?

Implementing the CIS Critical Security Controls is crucial for several reasons:

  1. Risk Reduction: The controls help organizations identify and mitigate cybersecurity risks, reducing the likelihood and impact of security incidents.

  2. Prioritization: The controls provide a structured approach to cybersecurity, helping organizations prioritize their efforts based on the most critical security measures.

  3. Adaptability: As the threat landscape evolves, the controls are regularly updated to address emerging risks, ensuring that organizations stay resilient against new and evolving threats.

  4. Compliance: Following the CIS Critical Security Controls helps organizations meet regulatory requirements and industry standards, demonstrating a commitment to cybersecurity best practices.

 

CIS Critical Security Controls offer a comprehensive and practical framework for organizations to enhance their cybersecurity defenses. By implementing these controls, businesses can better protect their assets, sensitive data, and overall digital infrastructure in an increasingly complex and dynamic threat landscape.