Temp2
Jump to navigation
Jump to search
CIS Control | CIS Safeguard | Asset Type | Security Function | Title |
1 | Inventory and Control of Enterprise Assets | |||
1 | 1,1 | Devices | Identify | Establish and Maintain Detailed Enterprise Asset Inventory |
1 | 1,2 | Devices | Respond | Address Unauthorized Assets |
1 | 1,3 | Devices | Detect | Utilize an Active Discovery Tool |
1 | 1,4 | Devices | Identify | Use Dynamic Host Configuration Protocol (DHCP) Logging to Update Enterprise Asset Inventory |
1 | 1,5 | Devices | Detect | Use a Passive Asset Discovery Tool |
2 | Inventory and Control of Software Assets | |||
2 | 2,1 | Applications | Identify | Establish and Maintain a Software Inventory |
2 | 2,2 | Applications | Identify | Ensure Authorized Software is Currently Supported |
2 | 2,3 | Applications | Respond | Address Unauthorized Software |
2 | 2,4 | Applications | Detect | Utilize Automated Software Inventory Tools |
2 | 2,5 | Applications | Protect | Allowlist Authorized Software |
2 | 2,6 | Applications | Protect | Allowlist Authorized Libraries |
2 | 2,7 | Applications | Protect | Allowlist Authorized Scripts |
3 | Data Protection | |||
3 | 3,1 | Data | Identify | Establish and Maintain a Data Management Process |
3 | 3,2 | Data | Identify | Establish and Maintain a Data Inventory |
3 | 3,3 | Data | Protect | Configure Data Access Control Lists |
3 | 3,4 | Data | Protect | Enforce Data Retention |
3 | 3,5 | Data | Protect | Securely Dispose of Data |
3 | 3,6 | Devices | Protect | Encrypt Data on End-User Devices |
3 | 3,7 | Data | Identify | Establish and Maintain a Data Classification Scheme |
3 | 3,8 | Data | Identify | Document Data Flows |
3 | 3,9 | Data | Protect | Encrypt Data on Removable Media |
3 | 3,10 | Data | Protect | Encrypt Sensitive Data in Transit |
3 | 3,11 | Data | Protect | Encrypt Sensitive Data at Rest |
3 | 3,12 | Network | Protect | Segment Data Processing and Storage Based on Sensitivity |
3 | 3,13 | Data | Protect | Deploy a Data Loss Prevention Solution |
3 | 3,14 | Data | Detect | Log Sensitive Data Access |
4 | Secure Configuration of Enterprise Assets and Software | |||
4 | 4,1 | Applications | Protect | Establish and Maintain a Secure Configuration Process |
4 | 4,2 | Network | Protect | Establish and Maintain a Secure Configuration Process for Network Infrastructure |
4 | 4,3 | Users | Protect | Configure Automatic Session Locking on Enterprise Assets |
4 | 4,4 | Devices | Protect | Implement and Manage a Firewall on Servers |
4 | 4,5 | Devices | Protect | Implement and Manage a Firewall on End-User Devices |
4 | 4,6 | Network | Protect | Securely Manage Enterprise Assets and Software |
4 | 4,7 | Users | Protect | Manage Default Accounts on Enterprise Assets and Software |
4 | 4,8 | Devices | Protect | Uninstall or Disable Unnecessary Services on Enterprise Assets and Software |
4 | 4,9 | Devices | Protect | Configure Trusted DNS Servers on Enterprise Assets |
4 | 4,10 | Devices | Respond | Enforce Automatic Device Lockout on Portable End-User Devices |
4 | 4,11 | Devices | Protect | Enforce Remote Wipe Capability on Portable End-User Devices |
4 | 4,12 | Devices | Protect | Separate Enterprise Workspaces on Mobile End-User Devices |
5 | Account Management | |||
5 | 5,1 | Users | Identify | Establish and Maintain an Inventory of Accounts |
5 | 5,2 | Users | Protect | Use Unique Passwords |
5 | 5,3 | Users | Respond | Disable Dormant Accounts |
5 | 5,4 | Users | Protect | Restrict Administrator Privileges to Dedicated Administrator Accounts |
5 | 5,5 | Users | Identify | Establish and Maintain an Inventory of Service Accounts |
5 | 5,6 | Users | Protect | Centralize Account Management |
6 | Access Control Management | |||
6 | 6,1 | Users | Protect | Establish an Access Granting Process |
6 | 6,2 | Users | Protect | Establish an Access Revoking Process |
6 | 6,3 | Users | Protect | Require MFA for Externally-Exposed Applications |
6 | 6,4 | Users | Protect | Require MFA for Remote Network Access |
6 | 6,5 | Users | Protect | Require MFA for Administrative Access |
6 | 6,6 | Users | Identify | Establish and Maintain an Inventory of Authentication and Authorization Systems |
6 | 6,7 | Users | Protect | Centralize Access Control |
6 | 6,8 | Data | Protect | Define and Maintain Role-Based Access Control |
7 | Continuous Vulnerability Management | |||
7 | 7,1 | Applications | Protect | Establish and Maintain a Vulnerability Management Process |
7 | 7,2 | Applications | Respond | Establish and Maintain a Remediation Process |
7 | 7,3 | Applications | Protect | Perform Automated Operating System Patch Management |
7 | 7,4 | Applications | Protect | Perform Automated Application Patch Management |
7 | 7,5 | Applications | Identify | Perform Automated Vulnerability Scans of Internal Enterprise Assets |
7 | 7,6 | Applications | Identify | Perform Automated Vulnerability Scans of Externally-Exposed Enterprise Assets |
7 | 7,7 | Applications | Respond | Remediate Detected Vulnerabilities |
8 | Audit Log Management | |||
8 | 8,1 | Network | Protect | Establish and Maintain an Audit Log Management Process |
8 | 8,2 | Network | Detect | Collect Audit Logs |
8 | 8,3 | Network | Protect | Ensure Adequate Audit Log Storage |
8 | 8,4 | Network | Protect | Standardize Time Synchronization |
8 | 8,5 | Network | Detect | Collect Detailed Audit Logs |
8 | 8,6 | Network | Detect | Collect DNS Query Audit Logs |
8 | 8,7 | Network | Detect | Collect URL Request Audit Logs |
8 | 8,8 | Devices | Detect | Collect Command-Line Audit Logs |
8 | 8,9 | Network | Detect | Centralize Audit Logs |
8 | 8,10 | Network | Protect | Retain Audit Logs |
8 | 8,11 | Network | Detect | Conduct Audit Log Reviews |
8 | 8,12 | Data | Detect | Collect Service Provider Logs |
9 | Email and Web Browser Protections | |||
9 | 9,1 | Applications | Protect | Ensure Use of Only Fully Supported Browsers and Email Clients |
9 | 9,2 | Network | Protect | Use DNS Filtering Services |
9 | 9,3 | Network | Protect | Maintain and Enforce Network-Based URL Filters |
9 | 9,4 | Applications | Protect | Restrict Unnecessary or Unauthorized Browser and Email Client Extensions |
9 | 9,5 | Network | Protect | Implement DMARC |
9 | 9,6 | Network | Protect | Block Unnecessary File Types |
9 | 9,7 | Network | Protect | Deploy and Maintain Email Server Anti-Malware Protections |
10 | Malware Defenses | |||
10 | 10,1 | Devices | Protect | Deploy and Maintain Anti-Malware Software |
10 | 10,2 | Devices | Protect | Configure Automatic Anti-Malware Signature Updates |
10 | 10,3 | Devices | Protect | Disable Autorun and Autoplay for Removable Media |
10 | 10,4 | Devices | Detect | Configure Automatic Anti-Malware Scanning of Removable Media |
10 | 10,5 | Devices | Protect | Enable Anti-Exploitation Features |
10 | 10,6 | Devices | Protect | Centrally Manage Anti-Malware Software |
10 | 10,7 | Devices | Detect | Use Behavior-Based Anti-Malware Software |
11 | Data Recovery | |||
11 | 11,1 | Data | Recover | Establish and Maintain a Data Recovery Process |
11 | 11,2 | Data | Recover | Perform Automated Backups |
11 | 11,3 | Data | Protect | Protect Recovery Data |
11 | 11,4 | Data | Recover | Establish and Maintain an Isolated Instance of Recovery Data |
11 | 11,5 | Data | Recover | Test Data Recovery |
12 | Network Infrastructure Management | |||
12 | 12,1 | Network | Protect | Ensure Network Infrastructure is Up-to-Date |
12 | 12,2 | Network | Protect | Establish and Maintain a Secure Network Architecture |
12 | 12,3 | Network | Protect | Securely Manage Network Infrastructure |
12 | 12,4 | Network | Identify | Establish and Maintain Architecture Diagram(s) |
12 | 12,5 | Network | Protect | Centralize Network Authentication, Authorization, and Auditing (AAA) |
12 | 12,6 | Network | Protect | Use of Secure Network Management and Communication Protocols |
12 | 12,7 | Devices | Protect | Ensure Remote Devices Utilize a VPN and are Connecting to an Enterprise’s AAA Infrastructure |
12 | 12,8 | Devices | Protect | Establish and Maintain Dedicated Computing Resources for All Administrative Work |
13 | Network Monitoring and Defense | |||
13 | 13,1 | Network | Detect | Centralize Security Event Alerting |
13 | 13,2 | Devices | Detect | Deploy a Host-Based Intrusion Detection Solution |
13 | 13,3 | Network | Detect | Deploy a Network Intrusion Detection Solution |
13 | 13,4 | Network | Protect | Perform Traffic Filtering Between Network Segments |
13 | 13,5 | Devices | Protect | Manage Access Control for Remote Assets |
13 | 13,6 | Network | Detect | Collect Network Traffic Flow Logs |
13 | 13,7 | Devices | Protect | Deploy a Host-Based Intrusion Prevention Solution |
13 | 13,8 | Network | Protect | Deploy a Network Intrusion Prevention Solution |
13 | 13,9 | Devices | Protect | Deploy Port-Level Access Control |
13 | 13,10 | Network | Protect | Perform Application Layer Filtering |
13 | 13,11 | Network | Detect | Tune Security Event Alerting Thresholds |
14 | Security Awareness and Skills Training | |||
14 | 14,1 | N/A | Protect | Establish and Maintain a Security Awareness Program |
14 | 14,2 | N/A | Protect | Train Workforce Members to Recognize Social Engineering Attacks |
14 | 14,3 | N/A | Protect | Train Workforce Members on Authentication Best Practices |
14 | 14,4 | N/A | Protect | Train Workforce on Data Handling Best Practices |
14 | 14,5 | N/A | Protect | Train Workforce Members on Causes of Unintentional Data Exposure |
14 | 14,6 | N/A | Protect | Train Workforce Members on Recognizing and Reporting Security Incidents |
14 | 14,7 | N/A | Protect | Train Workforce on How to Identify and Report if Their Enterprise Assets are Missing Security Updates |
14 | 14,8 | N/A | Protect | Train Workforce on the Dangers of Connecting to and Transmitting Enterprise Data Over Insecure Networks |
14 | 14,9 | N/A | Protect | Conduct Role-Specific Security Awareness and Skills Training |
15 | Service Provider Management | |||
15 | 15,1 | N/A | Identify | Establish and Maintain an Inventory of Service Providers |
15 | 15,2 | N/A | Identify | Establish and Maintain a Service Provider Management Policy |
15 | 15,3 | N/A | Identify | Classify Service Providers |
15 | 15,4 | N/A | Protect | Ensure Service Provider Contracts Include Security Requirements |
15 | 15,5 | N/A | Identify | Assess Service Providers |
15 | 15,6 | Data | Detect | Monitor Service Providers |
15 | 15,7 | Data | Protect | Securely Decommission Service Providers |
16 | Application Software Security | |||
16 | 16,1 | Applications | Protect | Establish and Maintain a Secure Application Development Process |
16 | 16,2 | Applications | Protect | Establish and Maintain a Process to Accept and Address Software Vulnerabilities |
16 | 16,3 | Applications | Protect | Perform Root Cause Analysis on Security Vulnerabilities |
16 | 16,4 | Applications | Protect | Establish and Manage an Inventory of Third-Party Software Components |
16 | 16,5 | Applications | Protect | Use Up-to-Date and Trusted Third-Party Software Components |
16 | 16,6 | Applications | Protect | Establish and Maintain a Severity Rating System and Process for Application Vulnerabilities |
16 | 16,7 | Applications | Protect | Use Standard Hardening Configuration Templates for Application Infrastructure |
16 | 16,8 | Applications | Protect | Separate Production and Non-Production Systems |
16 | 16,9 | Applications | Protect | Train Developers in Application Security Concepts and Secure Coding |
16 | 16,10 | Applications | Protect | Apply Secure Design Principles in Application Architectures |
16 | 16,11 | Applications | Protect | Leverage Vetted Modules or Services for Application Security Components |
16 | 16,12 | Applications | Protect | Implement Code-Level Security Checks |
16 | 16,13 | Applications | Protect | Conduct Application Penetration Testing |
16 | 16,14 | Applications | Protect | Conduct Threat Modeling |
17 | Incident Response Management | |||
17 | 17,1 | N/A | Respond | Designate Personnel to Manage Incident Handling |
17 | 17,2 | N/A | Respond | Establish and Maintain Contact Information for Reporting Security Incidents |
17 | 17,3 | N/A | Respond | Establish and Maintain an Enterprise Process for Reporting Incidents |
17 | 17,4 | N/A | Respond | Establish and Maintain an Incident Response Process |
17 | 17,5 | N/A | Respond | Assign Key Roles and Responsibilities |
17 | 17,6 | N/A | Respond | Define Mechanisms for Communicating During Incident Response |
17 | 17,7 | N/A | Recover | Conduct Routine Incident Response Exercises |
17 | 17,8 | N/A | Recover | Conduct Post-Incident Reviews |
17 | 17,9 | N/A | Recover | Establish and Maintain Security Incident Thresholds |
18 | Penetration Testing | |||
18 | 18,1 | N/A | Identify | Establish and Maintain a Penetration Testing Program |
18 | 18,2 | Network | Identify | Perform Periodic External Penetration Tests |
18 | 18,3 | Network | Protect | Remediate Penetration Test Findings |
18 | 18,4 | Network | Protect | Validate Security Measures |
18 | 18,5 | N/A | Identify | Perform Periodic Internal Penetration Tests |