RSI Security

How to Implement the CIS CSC at your Business

CIS

Cybercrime is a significant problem for businesses across the country, one that’s not going away any time soon. In fact, it’s only getting worse. In 2018 “the average cost of cybercrime for an organization has increased $1.4 million over the past year, to $13.0 million, and the average number of security breaches in the last year rose by 11 percent from 130 to 145.”

Fortunately, there’s a way you can protect your business from 97 percent of cyberattacks. How?

By implementing the 20 CIS critical security controls framework.

To help aid you in this process let’s run through each one and then discuss how to properly implement them at your business, company, or organization.
 

How to Implement the CIS CSC at your Business   

The Center for Internet Security Critical Security controls are fondly referred to as the 20 Commandments of cybersecurity. Although there’s no cis security certification process or legal requirments for a company to apply them, if you follow the contorls, your organization’s cybersecurity will be strengthened.

CIS organized them into three tiers by order of importance:

  1. Basic – Critical Controls 1-6
  2. Foundational – Critical Controls 7-16
  3. Organizational – Critical Controls 17-20

So how do you start implementing them in your business?

You begin with the basic controls, which cover the vast majority of common cyberthreats. The remaining gaps in your cyberdefenses can then be mitigated by the foundational and organizational controls. It takes a concerted and coordinated organizational effort, but by rigorously applying all twenty, you can fully secure your business.

Note: Entire chapters have been written on each of these controls. For the sake of brevity, we’ll focus on the six most important measures cybersecurity measures your business can take. The remaining we’ll review, but in less detail.
 
Assess your cybersecurity

 

Implementing the Basic Critical Security Controls 1-6 

The first six critical controls are the most important security protocols. They’ll shield you from basic cyberattacks. By embracing controls 1-6 on a continuous, evolving basis, you can dramatically reduce your cyber risk.

CSC 1 – Inventory and Control of Hardware Assets

One of the primary ways hackers breach an organization is through unprotected hardware assets, mostly Bring-Your-Own-Devices (BYOD) connecting to the network. All it takes is one insecure device for them to latch onto your system and establish a staging point for further intrusions.

You can thwart that threat through active management of all hardware devices. Active management is defined as “inventory, tracking, and correcting.” Inventory and control ensures that only approved devices are able to gain entry to your network.

How to implement CSC 1:

This step typically involves a worthwhile investment in a service such as Microsoft System Center Configuration Manager (SCCM). With these digital tools even small IT teams can make an instant impact on your security.
  

Here are a few more articles to help you learn more about CIS CSC :

 

CSC 2 – Inventory and Control of Software Assets

Do you know what software is running on your system and network?

Hackers often attempt to gain access through software security exploits. Or, they send malware, which unsuspecting employees click on. When that happens the entire system can be held hostage.

To counter software vulnerabilities perform active management on all software on your network. Software must be authorized before it’s installed and executed.
 
How to implement CSC 2:

By managing your inventory you make it easier and quicker to respond to an incident. Inventory management simplifies policy development, implementation, and enforcement. Also, it will help you out with controls seven, eight, and thirteen.
 

CS3 – Continuous Vulnerability Management

The cyberthreats your organization faces are constantly evolving. Each time there’s an update, fix, or protocol, attackers seek a new point of entry.

You need to be able to instantly identify and then respond to a threat. But that requires a constant flow of information.

How to implement CSC 3:

 

CS4 – Controlled Use of Administrative Privileges 

Hackers typically gain administrative access in one of two ways:

  1. A privileged user clicks on malware, loads a malicious website or surfs on unprotected webcontent. 
  2. Hacker guesses admin’s password then gains entry into the system.

To prevent this it’s important that your organization diligently monitor administrative privileges on all computers, networks, and applications. Correct administrative configurations, uses, and assignments need to be tracked and controlled.

How to implement CSC 4:

By limiting and controlling admin access you reduce risk and simplify operations.

 

CS5 – Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers

Most manufacturers are focused on ease-of-deployment and functionality over security. Recently acquired devices come in their default mode, which is easily exploitable.

You can mitigate this threat by actively managing the security configurations on all organizational assets including mobile devices, tablets, laptops, and desktops.

How to implement CSC 5:

Remember that configuration changes are continuous. Staying atop vulnerabilities that come from patches, updates, or new software deployment is the only way to ensure your continued security.

CS6 – Maintenance, Monitoring, and Analysis of Audit Logs

Audit logs are a vital part of security compliance. With them you can find the details of an attack and see what actions attackers take. When audit logs are deficient, you lack the visibility to locate possible threats or root out attacks that have successfully penetrated the system.

How to implement CSC 6:

 

Applying the Foundational Critical Controls 7-16

The foundational security controls add further protections to the basic security perimeter. These technical best practices are directed towards specific security exposure gaps. They include:

 

  1. Implement content filtering
  2. Embrace a Sender Policy Framework (SPF)
  3. Disable browser plugins
  4. Only allow authorized scripting language for unvetted software

 

  1. Use centrally managed anti-virus and anti-malware software, and keep it up-to-date
  2. Centralize anti-malware logs to monitor incidents and track them over time
  3. Ensure that each device on your network uses antivirus tech
  4. Enable DNS query logging and command-line audit logging

 

  1. Conduct port scans using a vulnerability scanner
  2. Limit system communication between servers via host-based firewalls
  3. Station application firewalls before essential servers
  4. Scan servers to ensure that only authorized traffic gains access

 

  1. Automatically back the system at least once per week
  2. Ensure backup policies are compliant with regulatory and official requirements
  3. Conduct regular data restoration tests
  4. Protect backups via encryption and physical security
  5. Make sure that all backups have at least one backup destination that’s removed from the operating system.

 

  1. Compare security configurations against standard protocols
  2. Set up change management and change detection
  3. Use Two-factor authentication and encryption
  4. Update security regularly
  5. Limit administrative access

 

  1. Keep an up-to-date inventory of network boundaries
  2. Segment network and control flow
  3. Deploy intrusion detection systems (IDS) and intrusion prevention systems (IPS) throughout the network
  4. Track and monitor firewall logs
  5. Restrict access for remote login access
  6. Require remote logins to use multi-factor authentication

 

  1. Managerial controls such as data inventory and tracking
  2. Procedural controls like performing scans or developing data protection configurations
  3. Technical controls can include data loss prevention tools (DLP), privileged account management (PAM) tools, and account control lists (ACL)

 

  1. Create an expansive data classification policy for all IT systems based on level of sensitivity
  2. Segment your network using your classification policy
  3. Utilize ACLs on every system
  4. Encrypt data that’s resting and in transit
  5. Remove and archive old data sets

 

  1. Keep your network name (SSID) private
  2. Apply protocols like extensible authentication protocol-transport layer security (EAP/TLS) certificates
  3. Restrict your radio broadcast levels to your building
  4. Create a guest network
  5. Actively monitor who’s connected to your network

 

  1. Perform regular account lifecycle management
  2. Review the various types of accounts and deactivate those out of use
  3. Change configuration settings to automatically log users off
  4. Set lock screens on all devices
  5. Require two-factor authentication

 

The Organizational Security Controls 

Similarly, the four remaining controls cover active steps your business can take to ensure your cybersecurity defense is strong. They include:

 

Implementing CIS CSC at Your Business 

The cyberthreats your business faces are constantly changing. Fortunately, most of them can be minimized or wholly elminatined by active management and implementation of the CIS critical security controls, including:

Ready to get started? RSI Security can help you apply the CIS controls throughout your business. As cybersecurity experts we specialize in compliance, penetration testing, cloud computing security services, and managed network security servicesReach out now to communicate with our dexterous staff and start fortifying your cyberdefenses!

 


Speak with a Cybersecurity expert today – Schedule a Free Consultation


 

Exit mobile version