A study of CIS Controls found that 85% of cyber incidents can be prevented by implementing at least the basic cyber controls.
The controls were created by the Center for Internet Security (CIS) — who created 20 controls known as the critical security controls (CSC). The CIS Controls provide a strong framework for defending against cyber attacks. These six basic controls form the essential foundation of a secure network.
- Inventory and Control of Hardware Assets
Active management of all authorized hardware devices with network access prevents unauthorized devices from gaining access. Meeting this control requires accurate inventory records, updated tracking of hardware devices, and the correction of any problems that arise.
- Inventory and Control of Software Assets
Attackers consistently scan networks for vulnerabilities, and software is not exempt from this. It is essential to inventory (track, analyze, correct, and delete) all software that is installed on the network to ensure that unauthorized software is not installed or executed.
- Continuous Vulnerability Management
It is critical to identify cybersecurity vulnerabilities to address them promptly. Additionally, most financial firms are required to show proactive measures that minimize their exposure to risk and attacks — both for their shareholders and regulatory compliance as these known vulnerabilities are commonly used by attackers to gain access to the network.
- Closely Track and Manage Administrative Privileges
Incorrect use or abuse of admin privileges can allow unauthorized access to sensitive data. Attackers that obtain admin privileges through social engineering can lock any user out of the network, install malware, spyware, or keyloggers. You should regularly review who has administrative privileges and how they are using them.
- Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
The integration of new hardware and software requires a review of the controls to ensure the implementation meets all compliance requirements and cybersecurity best practices. Tracking, reporting, and correction of the security configurations for hardware and software on moveable devices, workstations, and servers needs to occur on a routine basis.
- Maintain & Monitor Audit Logs
Undetected attacks can remain on the network long enough to deploy malware, viruses, and scripts and to obtain copies of data to sell on the Dark Web. Maintaining a detailed account of all events that occur on a network can help identify where a breach may have started and the extent to which a system has been compromised.
Every customer’s environment differs in the data that they need to protect, the controls and processes in place, and their risk tolerance. ACE IT Solutions can provide an assessment of the cyber controls in place at your organization and implement these controls effectively to reduce risk. Contact ACE IT Solutions at 646.558.5575 or email@example.com to schedule your assessment.