Temp2

From Braindump
Revision as of 09:41, 24 May 2022 by Jan (talk | contribs) (cis controls)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search
CIS Control CIS Safeguard Asset Type Security Function Title
1 Inventory and Control of Enterprise Assets
1 1,1 Devices Identify Establish and Maintain Detailed Enterprise Asset Inventory
1 1,2 Devices Respond Address Unauthorized Assets
1 1,3 Devices Detect Utilize an Active Discovery Tool
1 1,4 Devices Identify Use Dynamic Host Configuration Protocol (DHCP) Logging to Update Enterprise Asset Inventory
1 1,5 Devices Detect Use a Passive Asset Discovery Tool
2 Inventory and Control of Software Assets
2 2,1 Applications Identify Establish and Maintain a Software Inventory
2 2,2 Applications Identify Ensure Authorized Software is Currently Supported
2 2,3 Applications Respond Address Unauthorized Software
2 2,4 Applications Detect Utilize Automated Software Inventory Tools
2 2,5 Applications Protect Allowlist Authorized Software
2 2,6 Applications Protect Allowlist Authorized Libraries
2 2,7 Applications Protect Allowlist Authorized Scripts
3 Data Protection
3 3,1 Data Identify Establish and Maintain a Data Management Process
3 3,2 Data Identify Establish and Maintain a Data Inventory
3 3,3 Data Protect Configure Data Access Control Lists
3 3,4 Data Protect Enforce Data Retention
3 3,5 Data Protect Securely Dispose of Data
3 3,6 Devices Protect Encrypt Data on End-User Devices
3 3,7 Data Identify Establish and Maintain a Data Classification Scheme
3 3,8 Data Identify Document Data Flows
3 3,9 Data Protect Encrypt Data on Removable Media
3 3,10 Data Protect Encrypt Sensitive Data in Transit
3 3,11 Data Protect Encrypt Sensitive Data at Rest
3 3,12 Network Protect Segment Data Processing and Storage Based on Sensitivity
3 3,13 Data Protect Deploy a Data Loss Prevention Solution
3 3,14 Data Detect Log Sensitive Data Access
4 Secure Configuration of Enterprise Assets and Software
4 4,1 Applications Protect Establish and Maintain a Secure Configuration Process
4 4,2 Network Protect Establish and Maintain a Secure Configuration Process for Network Infrastructure
4 4,3 Users Protect Configure Automatic Session Locking on Enterprise Assets
4 4,4 Devices Protect Implement and Manage a Firewall on Servers
4 4,5 Devices Protect Implement and Manage a Firewall on End-User Devices
4 4,6 Network Protect Securely Manage Enterprise Assets and Software
4 4,7 Users Protect Manage Default Accounts on Enterprise Assets and Software
4 4,8 Devices Protect Uninstall or Disable Unnecessary Services on Enterprise Assets and Software
4 4,9 Devices Protect Configure Trusted DNS Servers on Enterprise Assets
4 4,10 Devices Respond Enforce Automatic Device Lockout on Portable End-User Devices
4 4,11 Devices Protect Enforce Remote Wipe Capability on Portable End-User Devices
4 4,12 Devices Protect Separate Enterprise Workspaces on Mobile End-User Devices
5 Account Management
5 5,1 Users Identify Establish and Maintain an Inventory of Accounts
5 5,2 Users Protect Use Unique Passwords
5 5,3 Users Respond Disable Dormant Accounts
5 5,4 Users Protect Restrict Administrator Privileges to Dedicated Administrator Accounts
5 5,5 Users Identify Establish and Maintain an Inventory of Service Accounts
5 5,6 Users Protect Centralize Account Management
6 Access Control Management
6 6,1 Users Protect Establish an Access Granting Process
6 6,2 Users Protect Establish an Access Revoking Process
6 6,3 Users Protect Require MFA for Externally-Exposed Applications
6 6,4 Users Protect Require MFA for Remote Network Access
6 6,5 Users Protect Require MFA for Administrative Access
6 6,6 Users Identify Establish and Maintain an Inventory of Authentication and Authorization Systems
6 6,7 Users Protect Centralize Access Control
6 6,8 Data Protect Define and Maintain Role-Based Access Control
7 Continuous Vulnerability Management
7 7,1 Applications Protect Establish and Maintain a Vulnerability Management Process
7 7,2 Applications Respond Establish and Maintain a Remediation Process
7 7,3 Applications Protect Perform Automated Operating System Patch Management
7 7,4 Applications Protect Perform Automated Application Patch Management
7 7,5 Applications Identify Perform Automated Vulnerability Scans of Internal Enterprise Assets
7 7,6 Applications Identify Perform Automated Vulnerability Scans of Externally-Exposed Enterprise Assets
7 7,7 Applications Respond Remediate Detected Vulnerabilities
8 Audit Log Management
8 8,1 Network Protect Establish and Maintain an Audit Log Management Process
8 8,2 Network Detect Collect Audit Logs
8 8,3 Network Protect Ensure Adequate Audit Log Storage
8 8,4 Network Protect Standardize Time Synchronization
8 8,5 Network Detect Collect Detailed Audit Logs
8 8,6 Network Detect Collect DNS Query Audit Logs
8 8,7 Network Detect Collect URL Request Audit Logs
8 8,8 Devices Detect Collect Command-Line Audit Logs
8 8,9 Network Detect Centralize Audit Logs
8 8,10 Network Protect Retain Audit Logs
8 8,11 Network Detect Conduct Audit Log Reviews
8 8,12 Data Detect Collect Service Provider Logs
9 Email and Web Browser Protections
9 9,1 Applications Protect Ensure Use of Only Fully Supported Browsers and Email Clients
9 9,2 Network Protect Use DNS Filtering Services
9 9,3 Network Protect Maintain and Enforce Network-Based URL Filters
9 9,4 Applications Protect Restrict Unnecessary or Unauthorized Browser and Email Client Extensions
9 9,5 Network Protect Implement DMARC
9 9,6 Network Protect Block Unnecessary File Types
9 9,7 Network Protect Deploy and Maintain Email Server Anti-Malware Protections
10 Malware Defenses
10 10,1 Devices Protect Deploy and Maintain Anti-Malware Software
10 10,2 Devices Protect Configure Automatic Anti-Malware Signature Updates
10 10,3 Devices Protect Disable Autorun and Autoplay for Removable Media
10 10,4 Devices Detect Configure Automatic Anti-Malware Scanning of Removable Media
10 10,5 Devices Protect Enable Anti-Exploitation Features
10 10,6 Devices Protect Centrally Manage Anti-Malware Software
10 10,7 Devices Detect Use Behavior-Based Anti-Malware Software
11 Data Recovery
11 11,1 Data Recover Establish and Maintain a Data Recovery Process
11 11,2 Data Recover Perform Automated Backups
11 11,3 Data Protect Protect Recovery Data
11 11,4 Data Recover Establish and Maintain an Isolated Instance of Recovery Data
11 11,5 Data Recover Test Data Recovery
12 Network Infrastructure Management
12 12,1 Network Protect Ensure Network Infrastructure is Up-to-Date
12 12,2 Network Protect Establish and Maintain a Secure Network Architecture
12 12,3 Network Protect Securely Manage Network Infrastructure
12 12,4 Network Identify Establish and Maintain Architecture Diagram(s)
12 12,5 Network Protect Centralize Network Authentication, Authorization, and Auditing (AAA)
12 12,6 Network Protect Use of Secure Network Management and Communication Protocols
12 12,7 Devices Protect Ensure Remote Devices Utilize a VPN and are Connecting to an Enterprise’s AAA Infrastructure
12 12,8 Devices Protect Establish and Maintain Dedicated Computing Resources for All Administrative Work
13 Network Monitoring and Defense
13 13,1 Network Detect Centralize Security Event Alerting
13 13,2 Devices Detect Deploy a Host-Based Intrusion Detection Solution
13 13,3 Network Detect Deploy a Network Intrusion Detection Solution
13 13,4 Network Protect Perform Traffic Filtering Between Network Segments
13 13,5 Devices Protect Manage Access Control for Remote Assets
13 13,6 Network Detect Collect Network Traffic Flow Logs
13 13,7 Devices Protect Deploy a Host-Based Intrusion Prevention Solution
13 13,8 Network Protect Deploy a Network Intrusion Prevention Solution
13 13,9 Devices Protect Deploy Port-Level Access Control
13 13,10 Network Protect Perform Application Layer Filtering
13 13,11 Network Detect Tune Security Event Alerting Thresholds
14 Security Awareness and Skills Training
14 14,1 N/A Protect Establish and Maintain a Security Awareness Program
14 14,2 N/A Protect Train Workforce Members to Recognize Social Engineering Attacks
14 14,3 N/A Protect Train Workforce Members on Authentication Best Practices
14 14,4 N/A Protect Train Workforce on Data Handling Best Practices
14 14,5 N/A Protect Train Workforce Members on Causes of Unintentional Data Exposure
14 14,6 N/A Protect Train Workforce Members on Recognizing and Reporting Security Incidents
14 14,7 N/A Protect Train Workforce on How to Identify and Report if Their Enterprise Assets are Missing Security Updates
14 14,8 N/A Protect Train Workforce on the Dangers of Connecting to and Transmitting Enterprise Data Over Insecure Networks
14 14,9 N/A Protect Conduct Role-Specific Security Awareness and Skills Training
15 Service Provider Management
15 15,1 N/A Identify Establish and Maintain an Inventory of Service Providers
15 15,2 N/A Identify Establish and Maintain a Service Provider Management Policy
15 15,3 N/A Identify Classify Service Providers
15 15,4 N/A Protect Ensure Service Provider Contracts Include Security Requirements
15 15,5 N/A Identify Assess Service Providers
15 15,6 Data Detect Monitor Service Providers
15 15,7 Data Protect Securely Decommission Service Providers
16 Application Software Security
16 16,1 Applications Protect Establish and Maintain a Secure Application Development Process
16 16,2 Applications Protect Establish and Maintain a Process to Accept and Address Software Vulnerabilities
16 16,3 Applications Protect Perform Root Cause Analysis on Security Vulnerabilities
16 16,4 Applications Protect Establish and Manage an Inventory of Third-Party Software Components
16 16,5 Applications Protect Use Up-to-Date and Trusted Third-Party Software Components
16 16,6 Applications Protect Establish and Maintain a Severity Rating System and Process for Application Vulnerabilities
16 16,7 Applications Protect Use Standard Hardening Configuration Templates for Application Infrastructure
16 16,8 Applications Protect Separate Production and Non-Production Systems
16 16,9 Applications Protect Train Developers in Application Security Concepts and Secure Coding
16 16,10 Applications Protect Apply Secure Design Principles in Application Architectures
16 16,11 Applications Protect Leverage Vetted Modules or Services for Application Security Components
16 16,12 Applications Protect Implement Code-Level Security Checks
16 16,13 Applications Protect Conduct Application Penetration Testing
16 16,14 Applications Protect Conduct Threat Modeling
17 Incident Response Management
17 17,1 N/A Respond Designate Personnel to Manage Incident Handling
17 17,2 N/A Respond Establish and Maintain Contact Information for Reporting Security Incidents
17 17,3 N/A Respond Establish and Maintain an Enterprise Process for Reporting Incidents
17 17,4 N/A Respond Establish and Maintain an Incident Response Process
17 17,5 N/A Respond Assign Key Roles and Responsibilities
17 17,6 N/A Respond Define Mechanisms for Communicating During Incident Response
17 17,7 N/A Recover Conduct Routine Incident Response Exercises
17 17,8 N/A Recover Conduct Post-Incident Reviews
17 17,9 N/A Recover Establish and Maintain Security Incident Thresholds
18 Penetration Testing
18 18,1 N/A Identify Establish and Maintain a Penetration Testing Program
18 18,2 Network Identify Perform Periodic External Penetration Tests
18 18,3 Network Protect Remediate Penetration Test Findings
18 18,4 Network Protect Validate Security Measures
18 18,5 N/A Identify Perform Periodic Internal Penetration Tests