In 2019 cybercrime cost businesses and individuals $3.5 billion dollars in losses, an almost 30 percent increase from the $2.7 billion lost in 2018. This isn’t simply an annual uptick in cybercrime, hackers are now employing new, sophisticated tactics and techniques to penetrate systems.
Blog
-

What’s an Internal Network Segmentation Penetration Test?
Cyberattacks are increasing in scale, scope, and complexity with every passing day. As hackers and their attack methods become more sophisticated your business must respond in kind or else have your security perimeter overwhelmed.
-

Top Mobile Device Management Requirements
One of the fastest growing areas of technology is the wide umbrella of mobile devices. With a projected yearly growth of 9 percent there will be an estimated 7.2 billion smartphone users by 2023. And the number of mobile devices isn’t the only thing increasing.
-

Key Elements to Your Mobile Device Management Policy
Mobile devices are some of the fastest-growing pieces of tech in the market. They’re also one of the biggest targets and risk factors when it comes to cybersecurity.
-

Top Industries that Should Adopt CIS Critical Security Controls
As technology advances and our world becomes increasingly connected more industries are developing and growing their online presence. All businesses and organizations can benefit from the communication and outreach possibilities that the internet provides.
-

Is Telemedicine Affected By HIPAA Compliance?
For healthcare providers securing and protecting electronic personal health information (ePHI) is a formidable challenge—one that’s been made even more difficult by the industry-wide integration of telemedicine services. Now, as ePHI is digitally disseminated in real-time via telecommunication platforms, there are new variables added to the security and compliance equation.
-

What’s the Difference Between a Business and Technical Writer?
One of the most important skills for all kinds of businesses is clear effective writing. Written business communication takes many forms, and employees at every level of an organization inevitably come into contact with it, whether as reader, writer—or both!
-

What does MDM stand for in cybersecurity?
As they’ve become increasingly integral to daily living, mobile devices have slowly but surely transformed the modern-day workplace into a mobile-first landscape. In fact, a recent Clutch study found that more than six in ten employees use company-approved mobile devices—predominantly tablets and phones—to perform their work functions.
-

Are technical documentation services right for my business?
Companies of all sizes produce and process vast amounts of text. Throughout the day every individual involved with an organization is tasked with writing and reading things—whether it’s detailed audits, reports and guides, or correspondence within the company.
In short, writing is essential for every business.
Specifically, there are certain specialized kinds of writing that are vital to a business’s security and success. One key medium is technical documentation writing. Oftentimes larger businesses with robust resources entrust internal IT and other staff with these tasks.
-

What are the Six Basic CIS Critical Security Controls?
There is a shared sense of satisfaction we all get when unboxing the latest phone or gadget. The same sensation can be felt even on organizational levels for the latest systems upgrade, but we seldom think of the security issues following a purchase of “off the shelf” software and devices.
When an individual purchases a new network active device, application, or software, it is generally configured for ease of use and not security in mind (open ports, non-password protected, etc.).
These phenomena have led to an increase in cyberattacks over the last decade. Enter the Center for Internet Security (CIS) and their security configurations framework. The organization has been in operation since early 2000 and has banded together with the IT and Information Security community at large to devise a framework of best practices for cybersecurity worldwide.
The CIS has developed 20 control points that organizations should implement for the best cyberdefense. These controls are known as the Center for Internet Security Critical Security Controls (CIS CSC). The CIS critical security controls are broken down into three groups: basic, foundational, and organizational, with the latest revision in 2019 being version 7.1.
In this article we will explore the six basic controls in detail outlining what they are, why they are important, and the implementation groups.
Overview of the Basic Controls
The basic CIS critical security controls are coined by the organization as “cyber hygiene.” These are the basic measures all organizations should implement as a means of basic cyberdefense.
By just implementing the CIS top 5 security controls, an organization can mitigate the risk of cyberattacks by 84 percent. Implementing all 20 controls, an organization can mitigate attacks by 96 percent.
Whether a nascent business or a seasoned organization with high resources, the basic CIS security controls are a must for any cyber-conscious individual, organization, or government.
[su_button url=”https://www.rsisecurity.com/request-demo/” target=”blank” style=”flat” size=”11″]Assess your cybersecurity[/su_button]
Implementation Groups
The implementation groups are a recent addition to the CIS CSC framework. Over the years of operation CIS received feedback to the somewhat restricting requirements imposed on smaller organizations.
The CIS reviewed the controls and broke them down into sub-controls that could be partially implemented by organizations with varying cybersecurity resources. They are as follows:

Implementation Group 1: An organization with limited cybersecurity resources and expertise. May have low data sensitivity in general and expected technical expertise of staff is low.
-
- Family Run Business
- SMEs and Start-Ups
Implementation Group 2: An organization with moderate cybersecurity resources and expertise. May deal in sensitive data, technical expertise of staff is varied
-
- Established Organizations that may not be in IT sector (regional)
- Manufacturing Industry (Medium to Large Factories)
Implementation Group 3: A mature organization with large cybersecurity resources and expertise. Deals with highly sensitive data, and expected technical expertise of staff is very knowledgeable.
-
- Multi-nationals with large budgets and global reach
- Pseudo-government organizations with wide reach
The implementation groups will make more sense as we explore the six basic CIS security controls as each control has separate sub-controls that each implementation group should be able to implement.
The 6 Basic CIS Security Controls
This section of the blog will explore and expand the six basic CIS security controls, what they are, why they are important, and what is expected from each of the different implementation groups.
1. Inventory and Control of Hardware Assets
What is it?: This CIS security control involves the active management and inventory of all hardware devices attached to your organization’s network. The hardware devices include but are not limited to:
- Laptops
- Mobile devices (phones)
- Office computers (desktops)
- Servers
This is so that only authorized devices are granted access to the network, and unauthorized devices are quickly discovered and booted or blocked from access.
Why is it important?: Would-be attackers are constantly looking for the next attack vector, and hardware assets could be one of them. New hardware that is installed on a network may not be patched with a security update till a later time, and attackers can take advantage of that fact. Often, hardware is connecting and disconnecting from the network, such as employees taking their laptops to work. Again attackers can take advantage. If this security control is not implemented, the organization can not tell who is who.
This control is especially important if the network is running test systems or demonstrations that are temporarily attached to the network. These should also be actively managed and isolated to limit the time attackers may have.
It may seem difficult for a large organization to implement such a control especially in such a fast-paced and changing environment. However, attackers have taken the time to inventory and manage these assets on a large scale waiting for an opportunity, so the organization should take the time and resources to do the same.
Implementation Groups:
Sub Group Security Function Control Title Group 1 2 3
1.1 Identify Utilize an active discovery tool ✔ ✔ 1.2 Identify Use a passive asset discovery tool ✔ 1.3 Identify Use DHCP Logging to Update Asset Inventory ✔ ✔ 1.4 Identify Maintain Detailed Asset Inventory ✔ ✔ ✔ 1.5 Identify Maintain Asset Inventory Information ✔ ✔ 1.6 Respond Address Unauthorized Assets ✔ ✔ ✔ 1.7 Protect Deploy Port Level Access Control ✔ ✔ 1.8 Protect Utilize Client Certificates to Authn. Hardware Assets ✔ Tools and Procedures:
The organization should employ active asset scanning tools that can sweep the network and identify any type of hardware that currently has access. In addition to inventory scanning tools, the organization should have passive tools that listen on networks and announce the connection of hardware devices. Any device that has an IP address virtual or otherwise should be added to the inventory. The following employee protocols should be monitored:
- Transmission Control Protocol (TCP)
- Synchronize Packets (SYN)
- Acknowledge Packets (ACK)
- Media Access Control, management protocol (MAC)

2. Inventory and Control of Software Assets
What is it?: Similar to the first CIS Security Control, this involves the active management and inventory of software assets connected to the organization’s network. This is so only authorized software is installed and executed on the network, and that all unauthorized software is blocked from installing and/or executing.
Why is it important?: Again much like the first control, attackers continuously look for new attack vectors and software is no different. There may be vulnerable software that has not been patched, and attackers could take advantage of any security flaw in the older versions. Attackers may also create media files, websites, document files, etc., where unsuspecting victims may fall prey. They may access these traps from unsecured web browsers or applications. When this happens, an attacker can create a backdoor and have long-term access to the system.
Oftentimes devices attached to organizational networks are running unneeded software that can create opportunities for attackers to exploit. All it takes is for one machine to be compromised with some kind of malware for the attacker to eventually have access to the entire network. The planned inventory of both software and hardware assets can also aid in the backup recovery in the event of a breach.
Implementation Groups:
Sub Group Security Function Control Title Group 1 2 3
2.1 Identify Maintain Inventory of Authorized Software ✔ ✔ ✔ 2.2 Identify Ensure Software Is Supported by Vendor ✔ ✔ ✔ 2.3 Identify Utilize Software Inventory Tools ✔ ✔ 2.4 Identify Track Software Inventory Information ✔ ✔ 2.5 Identify Integrate Software and Hardware Asset Inventories ✔ 2.6 Respond Address Unapproved Software ✔ ✔ ✔ 2.7 Protect Utilize Application Whitelisting ✔ 2.8 Protect Implement Application Whitelisting of Libraries ✔ 2.9 Protect Implement Application Whitelisting of Scripts ✔ 2.10 Protect Physically or Logically Segregate High Risk Applications ✔ Tools and Procedures
The organization should employ whitelisting tools along with company policies and an application executing tools that have antivirus built-in. It is also best to use popular operating systems that have strong service support, this way any vulnerabilities can be quickly patched.
There is a wide range of enterprise inventory tools that can scan for 100’s of commercially used applications. Useful tools include:
- Intrusion Detection Systems (IDS)
- Intrusion Prevention Systems (IPS)
- Antivirus
- Antimalware
- Antispyware
3. Continuous Vulnerability Management
What is it?: This CIS security control involves the continuous assessment of new information that may identify vulnerabilities in the network. It also requires that organizations remediate, delete, and make additions to that new information. This operation will minimize the opportunities attackers have over system vulnerabilities.
Why is it important?: Cyber defense has become a continuous activity, attackers are continuously looking for vulnerabilities in the system. This means that the defenders must now operate on a constant stream of information looking for weaknesses and patching where necessary, advising staff of potential threats, updating software, and posting threat bulletins for the wider community.
If defenders are not conducting gap analysis regularly, they increase their likelihood of an attacker successfully infiltrating their network.
Implementation Groups:
Sub Group Security Function Control Title Group 1 2 3
3.1 Detect Run Automated Vulnerability Scanning Tools ✔ ✔ 3.2 Detect Perform Authenticated Vulnerability Scanning ✔ ✔ 3.3 Protect Protect Dedicated Assessment Accounts ✔ ✔ 3.4 Protect Deploy Auto. Operating System Patch Management Tools ✔ ✔ ✔ 3.5 Protect Deploy Automated Software Patch Management Tools ✔ ✔ ✔ 3.6 Respond Compare Back-to-Back Vulnerability Scans ✔ ✔ 3.7 Respond Utilize a Risk-Rating Process ✔ ✔ Tools and Procedures
Some useful tools to aid in implementing this control is a Security Incident and Event Management (SIEM) software. Other vulnerability scanning tools are also recommended. Various free and paid tools assess the various security configurations of local machines and devices.
Any sort of tool or policy/procedure that can feed information to a central security hub can be infinitely useful in combating potential attacks. Knowledge and understanding of what is happening within the business information system is most of the battle.

4. Controlled Use of Administrative Privileges
What is it?: This CIS security control has the organization track the use of admin privileges across the network. The organization should correct, prevent, and control the use and distribution of admin privileges on the system, to mitigate the chance of cyberattack.
Why is it important?: Misuse of admin is extremely dangerous for any system. Usually, admin privileges involve super control over all aspects of a network. This means if an attacker can get access to a terminal or user with admin privileges they can quickly lock out all users and make changes to the system that the organization may not be aware of. With access to admin privileges, the attackers can then install keyloggers, sniffers, and remote access software to the computer or device and later gain control of the whole system.
Implementation Groups:
Sub Group Security Function Control Title Group 1 2 3
4.1 Detect Maintain Inventory of Administrative Accounts ✔ ✔ 4.2 Protect Change Default Passwords ✔ ✔ ✔ 4.3 Protect Ensure the Use of Dedicated Administrative Accounts ✔ ✔ ✔ 4.4 Protect Use Unique Passwords ✔ ✔ 4.5 Protect Use Multi-Factor Authentication for All Administrative Access ✔ ✔ 4.6 Protect Use Dedicated Workstations For All Administrative Tasks ✔ ✔ 4.7 Protect Limit Access to Scripting Tools ✔ 4.8 Detect Log and Alert on Changes to Administrative Group Membership ✔ ✔ 4.9 Detect Log and Alert on Unsuccessful Administrative Account Login ✔ ✔ Tools and Procedures:
Most modern operating systems have built-in applications that can pull up a list of users that have “superuser” privileges. Utilize such software to ensure that the users are meant to have admin privileges and that they are not using machines with admin privileges for day-to-day activities such as browsing or email reading.
Implemented scripts or manual checks that only authorized applications are running on admin accounts (i.e., no web browsing or email reading). On occasion, it may be required for administrators to run applications that should not be allowed, but be sure that this is only in the short term and that any long-term activities like this would be violating policy.
5. Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
What is it?: A bit of a mouthful, this CIS security control is arguably one of the most important of the 6 basic controls. This is primarily due to the nature of new devices that are purchased “off the shelf.” This type of hardware or software is often configured for ease of use and not security.
The organization must actively track, manage, and correct the security configurations of all hardware and software that is operating on the network.
Why is it important?: As mentioned above, most devices and software out of the box are configured with default settings. Most of the time default settings are not secure. They are designed for ease of use. This means that they could have open network ports, are non-password protected, may have pre-installed/unnecessary software, and outdated protocols among other things. This becomes prime “hunting grounds” for would-be attackers, who could exploit nonsecure devices and software to gain access to the network.
Implementation Groups:
Sub Group Security Function Control Title Group 1 2 3
5.1 Protect Establish Secure Configurations ✔ ✔ ✔ 5.2 Protect Maintain Secure Images ✔ ✔ 5.3 Protect Securely Store Master Images ✔ ✔ 5.4 Protect Deploy System Configuration Management Tools ✔ ✔ 5.5 Detect Implement Automated Configuration Monitoring Systems ✔ ✔ Tools and Procedures:
Developing a robust security configuration can be a challenging task, especially for larger organizations, and should not be undertaken by an individual. The complex task of developing the right policy and configuration settings takes a dedicated team, which is why it is best to adopt the public frameworks developed by either the CIS Benchmarks, or one which is also recommended by the CIS, such as the NIST National Checklist Program.
6. Maintenance, Monitoring, and Analysis of Audit Logs
What is it?: The final of the basic CIS security controls, point 6 requires that organizations maintain logs of all events on the network. The collection, analysis, and management of the audit logs can help the organization in case of a breach with the recovery of the system.
Why is it important?: Failing to keep adequate logs of any sort of event occurring on your organization’s network can allow attackers to remain undetected on a network. While remaining undetected attackers can deploy all sorts of malware, keyloggers, etc. In many cases logging is the only evidence showing that an attack even occurred, which can then be used by digital forensics.
Implementation Groups:
Sub Group Security Function Control Title Group 1 2 3
6.1 Detect Utilize Three Synchronized Time Sources ✔ ✔ 6.2 Detect Activate Audit Logging ✔ ✔ ✔ 6.3 Detect Enable Detailed Logging ✔ ✔ 6.4 Detect Ensure Adequate Storage for Logs ✔ ✔ 6.5 Detect Central Log Management ✔ ✔ 6.6 Detect Deploy SIEM or Log Analytic Tools ✔ ✔ 6.7 Detect Regularly Review Logs ✔ ✔ 6.8 Detect Regularly Tune SIEM ✔ Tools and Procedures:
Most operating systems and tools of the trade (firewalls, proxies, network services) have built-in logging capabilities. All logging capabilities should be activated where appropriate and continuous management and tracking of the logs should be implemented.
Closing Remarks
Implementing the six basic controls has been reported to decrease the chance of suffering a cyberattack by 84 percent. As mentioned at the beginning of the article these controls are known by the wider cybersecurity community as “cyber-hygiene.”
These controls should be second nature to any organization that takes its security seriously. Think of it like brushing your teeth in the morning! If you wish to learn more about CIS and get a deeper understanding of the sub-controls of each CIS security control, be sure to check out the CIS website.
We hope you have a better understanding of the basic controls and how your organization can implement them. If you have any concerns, questions, or want a check-up on your cybersecurity health, contact us today. RSI Security lives and breathes cybersecurity and is always happy to help. Book a free consultation here!
Speak with a Cybersecurity expert today – Schedule a Free Consultation
-
