Skip to content

What are the top 5 CIS controls?


What are CIS controls?

CIS controls, also known as Critical Security Controls, are a set of cybersecurity best practices and guidelines developed by the Center for Internet Security (CIS). These controls are designed to help security professionals enhance their organization's security posture and defend against common attacks. The CIS controls address various areas of cybersecurity, including hardware devices, administrative privileges, mobile devices, secure configuration, security updates, control of software assets, and more. By implementing the CIS controls, organizations can reduce their attack surface and minimize the opportunities for attackers to exploit vulnerabilities. The controls also emphasize the importance of ongoing monitoring and continuous improvement to stay ahead of evolving cyber threats. Overall, the CIS controls provide a comprehensive framework for organizations to enhance their security capabilities, address security weaknesses, and mitigate the risk of security breaches.

The 5 critical security controls

The Centre for Information Security (CIS) has identified the top 5 critical security controls that form a solid foundation for a robust security posture. These controls are based on significant research into the most common attacks and provide a comprehensive approach to mitigating security vulnerabilities.

Implementing these controls is crucial as they can eliminate a significant percentage of known security vulnerabilities. By focusing on these controls, security professionals can effectively manage the security risks associated with hardware devices, mobile devices, and software assets.

The first critical security control focuses on secure configurations for hardware and software assets, ensuring that they adhere to recommended security standards. The control process involves continuous vulnerability management, which helps to identify and remediate any security weaknesses or vulnerabilities in the system.

The second control deals with ongoing monitoring and analysis of audit logs to detect any potentially malicious activity. Additionally, it emphasizes the importance of timely security updates and patches to minimize the window of opportunity for attackers.

The third control emphasizes the need for proper management of administrative privileges on computers and network devices. By limiting these privileges to authorized individuals, the attack surface and potential for misuse is significantly reduced.

The fourth control highlights the importance of implementing and maintaining a robust incident response plan. This ensures that organizations have a defined and effective cyber defense strategy in place to respond to and mitigate security threats.

Lastly, the fifth control focuses on the need for secure configurations and continuous monitoring of mobile devices. Given the increasing use of mobile devices in the workplace, securing them is essential to protect against phishing attacks and other mobile-specific threats.

1. Inventory of authorized and unauthorized devices

Implementing an inventory of authorized and unauthorized devices is a fundamental step in maintaining a secure network environment. By having a comprehensive understanding of all devices connected to the network, organizations can effectively manage their security posture and minimize the risk of unauthorized access. This control involves continuously identifying and monitoring all hardware and software assets within the network, ensuring that they comply with recommended security configurations and standards. By keeping an accurate inventory, security professionals can easily detect any unauthorized devices and promptly address any potential security issues. Additionally, an inventory of authorized devices enables organizations to manage the security lifecycle of these devices, ensuring that they are regularly updated and patched to protect against emerging threats. Overall, maintaining an inventory of authorized and unauthorized devices is crucial for organizations to have visibility and control over their network, reducing the opportunities for attackers to exploit vulnerabilities.

Identifying assets

Identifying assets within an organization's network infrastructure is a crucial step to effectively manage security risks. By understanding the devices and resources present in the network, security professionals can implement appropriate controls to protect against common attacks and mitigate potential vulnerabilities.

There are two main approaches to asset discovery: active and passive. Active asset discovery involves actively scanning the network using tools that send out query requests to identify devices. This method is effective in identifying devices that are currently online and accessible. On the other hand, passive asset discovery involves monitoring network traffic and analyzing the information to identify devices without actually sending out queries. This approach provides a more comprehensive view of the network, including devices that may not be actively communicating.

Maintaining an accurate and updated inventory is essential for ensuring comprehensive coverage of network assets. It enables security professionals to identify both authorized and unauthorized devices within the network. Authorized devices are those that are approved and managed by the organization, while unauthorized devices are those that have been connected without proper authorization or oversight. Including both types of devices in the inventory allows for a thorough assessment of the organization's security posture and helps identify potential security risks.

Regularly updating the inventory is crucial as the network infrastructure is dynamic, with devices being added or removed frequently. This ensures that security professionals have an up-to-date understanding of their network's attack surface and can take appropriate actions to secure it. Additionally, an accurate inventory enables effective incident response planning and helps in identifying any potential security weaknesses or vulnerabilities.

Managing asset inventory

Managing asset inventory is a critical process in maintaining the security of an organization's network. It involves actively managing and regularly inventorying all hardware and software assets connected to the network. This ensures that security professionals have a comprehensive view of the organization's IT infrastructure and can effectively identify and manage potential vulnerabilities and risks.

One important aspect of managing asset inventory is ensuring that all software assets are authorized and properly managed. Authorized software refers to software that has been approved and is known to be secure. It is essential to have an accurate inventory of authorized software to reduce the attack surface of the network. By blocking unauthorized software and only allowing approved software to be used, organizations can significantly reduce the risk of potential security breaches.

To effectively manage asset inventory, organizations can utilize various tools and technologies. Intrusion detection systems (IDS) play a crucial role in identifying and alerting security professionals about any unauthorized access or suspicious activities on the network. Antivirus software helps in detecting and blocking malware or any malicious software that might compromise the security of the network. Additionally, application executing tools can be used to monitor and control software installations, ensuring that only authorized software is deployed.

Device authentication

Device authentication is a critical aspect of CIS controls, as it plays a vital role in ensuring the security and integrity of a network. By implementing device authentication measures, organizations can actively manage and control the presence of authorized and unauthorized devices within their network infrastructure.

Device authentication helps prevent unauthorized access by verifying the identity of devices attempting to connect to the network. It ensures that only trusted devices that have been authorized are allowed access, thus reducing the risk of potential security breaches or attacks.

To effectively implement device authentication, organizations can follow key steps such as using strong passwords, implementing two-factor authentication (2FA), and employing network access controls. Strong passwords ensure that only authorized users can access devices, reducing the chances of unauthorized access. Two-factor authentication adds an additional layer of security by requiring users to provide a second form of identification, such as a fingerprint or a generated code, in addition to a password. Network access controls can help actively manage authorized and unauthorized devices by enforcing policies that allow or deny access based on predefined criteria.

By implementing device authentication measures and actively managing authorized and unauthorized devices, organizations can significantly enhance their network security and protect against potential threats and unauthorized access attempts. It is an essential component of a comprehensive security strategy and contributes to the overall cybersecurity posture of an organization.

Establishing secure configurations

Establishing secure configurations for hardware and software is a crucial aspect of maintaining a robust cybersecurity posture, and the CIS controls outline a comprehensive process to achieve this.

Secure configurations involve setting up and maintaining devices and software in a way that minimizes security vulnerabilities and reduces the potential for successful attacks. This process begins with an inventory of all hardware and software assets, ensuring that all components are identified and tracked.

Once the inventory is complete, organizations can establish baseline configurations that align with industry best practices and security standards. These configurations should be documented and regularly reviewed to ensure they remain up to date.

Tracking and managing security configurations involves continuous monitoring and assessment of devices and software to ensure they adhere to the established baseline. This includes verifying that security settings and patches are applied, removing unnecessary or vulnerable services, and disabling default or insecure settings.

Correcting security configurations is an ongoing process that addresses any identified deviations from the established baseline. It involves remediation actions such as applying patches, disabling insecure settings, and implementing strong security measures to address vulnerabilities.

By diligently tracking, managing, and correcting security configurations for all hardware and software operating on the network, organizations can significantly enhance their security posture and reduce the opportunities for attackers to exploit security weaknesses. Implementing the CIS controls provides organizations with a framework to establish and maintain secure configurations, ultimately reducing the risk of successful attacks.

Maintaining configuration settings

Maintaining configuration settings for hardware and software is an essential step in ensuring the security of an organization's systems and data. Once secure configurations have been established, it is crucial to actively manage and track the security configuration to prevent attackers from exploiting vulnerable services and settings.

One of the key aspects of maintaining configuration settings is implementing a rigorous configuration management and change control process. This process involves carefully documenting and tracking all modifications made to the configuration settings, ensuring that any changes are properly authorized and tested before being implemented.

Encryption is another important component of maintaining configuration settings. Encrypting laptops and other portable devices helps protect sensitive data in case of theft or loss.

Regularly applying security updates is also critical for maintaining configuration settings. These updates address known vulnerabilities and weaknesses, ensuring that systems remain protected against new threats.

Anti-virus software plays a crucial role in maintaining configuration settings by detecting and preventing malware infections. This software should be regularly updated to provide the latest protection against emerging threats.

By actively managing and maintaining configuration settings, organizations can reduce the risk of security breaches and ensure the integrity and confidentiality of their systems and data.

Implementing database security settings

Implementing database security settings is crucial for the secure configuration of enterprise assets and software. Configuration is a key element in securing databases, as it determines the behavior and access controls of the database system.

Configuring database security settings helps prevent attackers from exploiting vulnerable services and settings, thereby minimizing security risks. By implementing proper access controls, database administrators can ensure that only authorized users have access to sensitive information, reducing the risk of data breaches.

Secure configuration also involves implementing strong passwords and enforcing password policies, which helps protect against unauthorized access. Additionally, enabling encryption for data at rest and in transit enhances the security of sensitive information, guarding against unauthorized interception or theft.

Regularly reviewing and updating database security settings is essential to mitigate emerging threats. Database security patches should be promptly applied to address known vulnerabilities and weaknesses. Continuous monitoring and auditing of database activities can help detect any suspicious behavior or potential security breaches.

3. Continuous vulnerability management

Continuous vulnerability management is a crucial aspect of any organization's overall security posture. In today's rapidly evolving threat landscape, organizations must remain vigilant in identifying and addressing vulnerabilities in their systems and networks. This involves regularly scanning and assessing the security of their assets, including hardware devices, network devices, and software applications. By continuously monitoring and managing vulnerabilities, organizations can reduce their attack surface and minimize the window of opportunity for attackers. This proactive approach helps to identify and remediate potential weaknesses before they can be exploited, thereby significantly enhancing their security defenses. With continuous vulnerability management, organizations can stay one step ahead of cyber threats and ensure the ongoing protection of their critical assets.

Identifying vulnerabilities in the environment

Identifying vulnerabilities in the environment is a crucial step in maintaining a strong security posture and protecting against potential cyber threats. Continuous vulnerability management involves an ongoing process of identifying, assessing, and addressing vulnerabilities within an organization's systems and networks. Here are the steps to effectively identify vulnerabilities:

  1. Continuous Acquisition of Information: It is vital to constantly acquire new information regarding the latest security threats, attack vectors, and vulnerabilities. Staying up-to-date with security news, advisories, and alerts from trusted sources allows security professionals to remain aware of emerging threats.
  2. Vulnerability Scanning: Utilizing vulnerability scanning tools enables security professionals to proactively scan systems and networks for any known vulnerabilities. These tools identify potential weaknesses and provide a comprehensive assessment of the security posture.
  3. Risk-Rating Process: Implementing a risk-rating process allows security professionals to prioritize vulnerabilities based on their severity and potential impact on the organization. This helps in allocating resources more effectively and addressing the most critical vulnerabilities first.
  4. Minimizing Window of Opportunity: By continuously acquiring and assessing new information, organizations can minimize the window of opportunity for attackers. This reduces the time hackers have to exploit vulnerabilities before they are identified and addressed.
  5. Ongoing Vulnerability Management: Identifying vulnerabilities is not a one-time task but an ongoing process. Regular vulnerability assessments, combined with prompt remediation efforts, help maintain a strong security posture and prevent potential attacks.

Scanning networks for potential vulnerabilities

Scanning networks for potential vulnerabilities is a crucial step in maintaining a strong security posture. Regularly conducting vulnerability scans on your environment using automated tools is an effective way to identify weaknesses and potential entry points for attackers.

These scans should encompass various aspects, including identifying missing patches and assessing the security of network devices. Missing patches can leave your system vulnerable to known exploits, and by regularly scanning for them, you can ensure that necessary updates are applied promptly.

Additionally, assessing the security of network devices is essential as they can serve as potential attack vectors. By analyzing their configurations and settings, security professionals can identify any vulnerabilities or misconfigurations that could be exploited by malicious actors.

To further strengthen network security, it is recommended to implement network segmentation and application layer filtering. Network segmentation helps divide the network into smaller, more manageable segments, reducing the potential impact of a breach. Application layer filtering adds an additional layer of protection by controlling the flow of traffic and monitoring for any suspicious activities.

By regularly scanning for vulnerabilities, addressing missing patches, securing network devices, and implementing network segmentation and application layer filtering, organizations can enhance their security posture and reduce the risk of successful attacks.

Updating system patches and vulnerability mitigation

Updating system patches and vulnerability mitigation are critical components of continuous vulnerability management. By regularly applying system patches, organizations can address known vulnerabilities and reduce the risk of exploitation by malicious actors.

To update system patches, the first step is to establish a comprehensive inventory of hardware and software assets. This information helps identify the systems that require patching. Next, organizations should leverage automated patch management tools to streamline the update process. These tools can automatically scan systems for missing patches and deploy the necessary updates efficiently.

Vulnerability mitigation involves addressing vulnerabilities that cannot be fixed through patching alone. This may include applying configuration changes, implementing additional security controls, or disabling vulnerable services. Automated vulnerability management tools can help identify and prioritize vulnerabilities based on risk-rating. By assigning a risk-rating to each vulnerability, organizations can determine their severity and prioritize mitigation efforts accordingly.

Regularly comparing back-to-back vulnerability scans is also crucial. This process allows organizations to track their progress in patching and vulnerability mitigation. By analyzing the differences between scans, they can identify any new vulnerabilities that may have emerged and take the necessary actions to address them.

Implementing application whitelisting

Implementing application whitelisting is a crucial step in controlling the use of software in an organization. It helps prevent unauthorized and potentially malicious software from running on devices, enhancing the overall security posture of the organization.

The process of implementing application whitelisting involves several steps.

First, organizations need to establish a whitelist of approved applications. This involves identifying and compiling a list of software that is authorized and necessary for employees to perform their duties. This list should exclude any unauthorized or unnecessary software that may pose a security risk.

Next, organizations should deploy application whitelisting software or tools that can enforce the whitelist. This software acts as a gatekeeper, allowing only approved applications to run on devices while blocking any software that is not on the whitelist.

Once the whitelist is in place, it is important to monitor and update it on an ongoing basis. Regularly reviewing the list and making necessary adjustments ensures that it remains accurate and up to date. Monitoring can involve analyzing logs, conducting periodic reviews, and managing user requests for new applications.

Updating the whitelist is crucial to accommodate changes in software usage within the organization. As new applications are introduced or removed, the whitelist should be adjusted accordingly to reflect the current software landscape.

Implementing application whitelisting provides several benefits. It significantly reduces the attack surface and mitigates the risk of unauthorized software execution. By controlling software use, organizations can effectively minimize the chance of malware infections, unauthorized access, and other security incidents caused by unauthorized software.

4. Controlled use of administrative privileges

The controlled use of administrative privileges is a crucial component of network security in any organization. By implementing measures to minimize the number of administrator users and accounts, organizations can significantly reduce the risk of unauthorized access and potential security breaches.

Firstly, it is important to limit the number of individuals with administrative privileges. Organizations should carefully assess who truly needs administrator access and ensure that only essential personnel have these elevated privileges. By reducing the number of administrator users, organizations can minimize the potential for misuse or compromise of these accounts.

Furthermore, organizations should implement strong security measures for accessing administrator accounts. One effective method is to enforce multifactor authentication, requiring multiple forms of identification such as a password and a unique code or biometric verification. This adds an extra layer of protection, making it more difficult for unauthorized individuals to gain access to administrator accounts.

Additionally, monitoring administrator account access is crucial for detecting any suspicious activity or unauthorized attempts. Organizations should implement systems or tools that can track and analyze administrator account login information. Any abnormal activity or attempts to access these accounts should be promptly investigated and addressed.

General thought leadership and news

6clicks receives ISO 42001 certification for its AI Management System

6clicks receives ISO 42001 certification for its AI Management System

Melbourne, Australia – 18 November 2024. 6clicks, pioneer of the first AI-powered GRC (Governance, Risk, and Compliance) software, is proud to...

Hailey’s newest updates: Risk & issue generation + compliance mapping

Hailey’s newest updates: Risk & issue generation + compliance mapping

At 6clicks, we’re continually evolving our AI capabilities to make the process of risk management and compliance faster, smarter, and more intuitive....

Understanding the NIST RMF: Breaking down the 7 key steps

Understanding the NIST RMF: Breaking down the 7 key steps

The NIST Risk Management Framework (NIST RMF) is a flexible framework that can be tailored to your specific organizational profile and regulatory...

Past, present, and future themes in cybersecurity: Are you keeping up?

Past, present, and future themes in cybersecurity: Are you keeping up?

In the ever-evolving landscape of cybersecurity, understanding where we've been, where we are, and where we're going is essential. By examining the...

Why 6clicks is outpacing legacy GRC platforms like Archer, ServiceNow and Diligent

Why 6clicks is outpacing legacy GRC platforms like Archer and more

For years, Archer, ServiceNow, and Diligent were the go-to names in GRC software. Archer’s rich functionality made it a leader, while ServiceNow’s IT...

ServiceNow GRC pricing: Is it worth it in 2025?

ServiceNow GRC pricing: Is it worth it in 2025?

Concerned about ServiceNow GRC’s pricing plans and total cost of ownership? You’re not alone. With a custom pricing structure, determining the...