SlideShare a Scribd company logo
Extending the 20 Critical Security Controls to
Gap Assessments & Security Maturity Modeling


          ShmooCon Fire Talks
          Hyatt Regency Washington
          400 New Jersey Avenue, NW
          Washington, DC 20001
          February 16, 2013

          John M. Willis, pINFOSEC
          2020 Pennsylvania Ave NW #400
          Washington DC 20006
          John.Willis@pINFOSEC.com
          LinkedIn.com/in/johnmwillis
          (202) 670-7179
Extending the 20 Critical Security Controls to
Gap Assessment & Security Maturity Modeling

Purpose:

Using the 20 Critical Security Controls, create Base
Practice Statements against which security engineering
and operations processes may be assessed for capability
and maturity.

Provide model framework to base Gap Assessments upon.

Facilitate focus of Remediation Planning.

Poll for interest in creating the model.

Call for volunteers to create the model.



                                                          2
20 Critical Security Controls
Attack-focused controls created by a consortium of
government agencies, major corporations, and many
others. Formerly known as the Consensus Audit
Guidelines, a complete copy of the controls may be found
on SANS Institute web site. Currently, the Consortium for
Cybersecurity Action is the organization engaged in
various projects pertaining to the controls.

1. Inventory of Authorized and Unauthorized Devices
2. Inventory of Authorized and Unauthorized Software
3. Secure Configurations for Hardware and Software on
Mobile Devices, Laptops, Workstations, and Servers
4. Continuous Vulnerability Assessment and Remediation
5. Malware Defenses
6. Application Software Security
7. Wireless Device Control
8. Data Recovery Capability
                                                            3
20 Critical Controls (cont'd)
9. Security Skills Assessment and Appropriate
Training to Fill Gaps
10. Secure Configurations for Network Devices
such as Firewalls, Routers, and Switches
11. Limitation and Control of Network
Ports, Protocols, and Services
12. Controlled Use of Administrative Privileges
13. Boundary Defense
14. Maintenance, Monitoring, and Analysis of
Audit Logs
15. Controlled Access Based on the Need to Know
16. Account Monitoring and Control
17. Data Loss Prevention
18. Incident Response and Management
19. Secure Network Engineering
20. Penetration Tests and Red Team Exercises
                                                  4
Each control has a short title, and a
 sentence describing the control
For example:
http://www.sans.org/critical-security-controls/control.php?id=1

“Critical Control 1: Inventory of Authorized and
Unauthorized Devices

“The processes and tools used to
track/control/prevent/correct network access by
devices (computers, network
components, printers, anything with an IP
address) based on an asset inventory of which
devices are allowed to connect to the network.”

Implementation information follows…
                                                                  5
Proposed Decomposed Base Practice
      Version of Critical Control 1

BP.01.01 – Manage inventory of authorized devices
(computers, network
components, printers, anything with IP addresses)

BP.01.02 – Limit network access to authorized
devices

All text under the Critical Control section, including
details from the referenced NIST SP 800-53
sections, should be taken into consideration when
crafting the Base Practice language.

                                                         6
Process Capability Maturity Levels

0 – No – No Process Exists

1 – Exists – Process Exists

2 – Defined – Defined Process of some sort Exists

3 – Practiced – Vetted Process is now a routine Practice

4 – Reviewed – The Process is formally Reviewed on a
Specified Periodic Basis

5 – Continuous – The Process is reviewed periodically
and is subjected to Continuous Improvement



                                                           7
Example of Tailoring Assessment
Category            Description                         Maturity
                                                         Level
Asset Management    List servers by type/function and
                                                           2
                    location.
Device              How to know device is authorized
Authentication      before admitting to network?
                    Validate device certificate?           1
                    Otherwise, scan for unauthorized
                    devices every 12 hours?
Network Admission   Control every switch port via NAC
                    (user ports controlled, audited.
                                                           0
                    Non-user ports verified and
                    audited).
                    Utilize network scanning tools to
                    identify unauthorized wireless         1
                    devices.
                                                                   8
Another Approach
One approach is to assign maturity levels to the
categories (Implementation Levels) listed under
"How to Implement, Automate, and Measure the
Effectiveness of this Control”:

•   Quick Wins
•   Visibility/Attribution
•   Configuration/Hygiene
•   Advanced

The information in these categories is
informative & through-provoking, but does not
define an assessment framework.

                                                   9
Proposed Model

The proposed model focuses on process capability maturity
using Base Practices restated from the Critical Controls.

Based on all such Base Practices, a formal or informal Gap
Assessment can be created and saved as a baseline.

For example:
• BP.01.01 – Manage Device Inventory, Maturity Level 2
• BP.01.02 – Limit Network Access, Maturity Level 1

Remediation planning is then focused on getting the
organization to the point where the Base Practices are least
Practiced, etc.




                                                               10
Extension of Proposed Model
In addition to process capability, consider including
measures for Robustness Levels.
Focus on security architecture and engineering
rigor, to include the following (for example):
• Visibility/Attribution
• Configuration/Hygiene
• Automation
• Breadth & Depth of coverage
• Integrity
• Resilience
• Ability to provide/consume situational awareness
   data
• Common Criteria Evaluation Assurance Level-like
   criteria
• and/or whatever makes sense
                                                        11
Poll for Interest / Call for Action
Does this approach make sense? Would anyone
use it? Who wants to help create such a Model, in
conjunction with the Consortium for Cybersecurity
Action?

Three key components:

  1. Create the Base Practice Statements for each
  Critical Control

  2. Define Robustness Levels, and assessment
  method

  3. Create Tailoring Guidelines
                                                    12
Credits & Legal

• Thanks to Tony Sager, Consortium for Cybersecurity
Action for his input and encouragement to promote
this Proposed Model

• Copyrights, Registration and Service Marks, etc., if
any, are property of their respective owners

• The current version of the 20 Critical Controls may
be found at http://www.sans.org/critical-security-
controls/, and is licensed under the Creative
Commons License
(http://creativecommons.org/licenses/by-nd/3.0/)


                                                         13
Contact Information


John M. Willis
pINFOSEC.com
2020 Pennsylvania Ave NW #400
Washington DC 20006
John.Willis@pINFOSEC.com
LinkedIn.com/in/johnmwillis
(202) 670-7179


                                14

More Related Content

PDF
SANS 2013 Critical Security Controls Survey
PDF
20 Security Controls for the Cloud
PPTX
The CIS Critical Security Controls the International Standard for Defense
PDF
Ebook: Splunk SANS - CIS Top 20 Critical Security Controls
PDF
Cs cmaster
PPTX
Effective Cyber Defense Using CIS Critical Security Controls
PDF
20 Critical Controls for Effective Cyber Defense (A must read for security pr...
PPTX
Recent changes to the 20 critical controls
SANS 2013 Critical Security Controls Survey
20 Security Controls for the Cloud
The CIS Critical Security Controls the International Standard for Defense
Ebook: Splunk SANS - CIS Top 20 Critical Security Controls
Cs cmaster
Effective Cyber Defense Using CIS Critical Security Controls
20 Critical Controls for Effective Cyber Defense (A must read for security pr...
Recent changes to the 20 critical controls

What's hot (20)

PPTX
Utilizing the Critical Security Controls to Secure Healthcare Technology
PDF
The Critical Security Controls and the StealthWatch System
PDF
Cheatsheet for your cloud project
PPTX
Overview of the 20 critical controls
PDF
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
PPTX
Using an Open Source Threat Model for Prioritized Defense
PDF
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #4
PPTX
More practical insights on the 20 critical controls
PDF
Alien vault sans cyber threat intelligence
PDF
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
PPTX
Alienvault threat alerts in spiceworks
PPTX
Improve threat detection with hids and alien vault usm
PDF
Security operations center 5 security controls
PDF
DTS Solution - Building a SOC (Security Operations Center)
PDF
NASA OIG Report
PDF
Building a Cyber Security Operations Center for SCADA/ICS Environments
PPTX
Vulnerability Assesment
PPTX
Information Assurance Metrics: Practical Steps to Measurement
PDF
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
PPTX
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Utilizing the Critical Security Controls to Secure Healthcare Technology
The Critical Security Controls and the StealthWatch System
Cheatsheet for your cloud project
Overview of the 20 critical controls
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
Using an Open Source Threat Model for Prioritized Defense
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #4
More practical insights on the 20 critical controls
Alien vault sans cyber threat intelligence
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
Alienvault threat alerts in spiceworks
Improve threat detection with hids and alien vault usm
Security operations center 5 security controls
DTS Solution - Building a SOC (Security Operations Center)
NASA OIG Report
Building a Cyber Security Operations Center for SCADA/ICS Environments
Vulnerability Assesment
Information Assurance Metrics: Practical Steps to Measurement
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Ad

Similar to Extending the 20 critical security controls to gap assessments and security maturity modeling-john willis-pinfosec (20)

PDF
White Paper: Six-Step Competitive Device Evaluation
PDF
Dealing with Web Application Security, Regulation Style
PDF
Risk Oriented Testing of Web-Based Applications
PDF
Risk oriented testing of web-based applications
PDF
NSA and PT
PDF
Medical Device Cyber Testing to Meet FDA Requirements
 
PDF
PCI and Vulnerability Assessments - What’s Missing
PPSX
Web application testing
PDF
Principles of Information Security 5th Edition Whitman Solutions Manual
PDF
Key Policy Considerations When Implementing Next-Generation Firewalls
PDF
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
PPTX
C.3.1.E4 ICT404 Lecture Slides 5_A_cybersec.pptx
PPTX
Verifikasi dan Validasi keamanan informasi
PDF
Principles of Information Security 5th Edition Whitman Solutions Manual
PDF
PCI and Vulnerability Assessments - What’s Missing?
PDF
Security Testing Approach for Web Application Testing.pdf
PDF
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
PPTX
Web application vulnerability assessment
PDF
I Series User Management
PDF
SuprTEK Continuous Monitoring
White Paper: Six-Step Competitive Device Evaluation
Dealing with Web Application Security, Regulation Style
Risk Oriented Testing of Web-Based Applications
Risk oriented testing of web-based applications
NSA and PT
Medical Device Cyber Testing to Meet FDA Requirements
 
PCI and Vulnerability Assessments - What’s Missing
Web application testing
Principles of Information Security 5th Edition Whitman Solutions Manual
Key Policy Considerations When Implementing Next-Generation Firewalls
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
C.3.1.E4 ICT404 Lecture Slides 5_A_cybersec.pptx
Verifikasi dan Validasi keamanan informasi
Principles of Information Security 5th Edition Whitman Solutions Manual
PCI and Vulnerability Assessments - What’s Missing?
Security Testing Approach for Web Application Testing.pdf
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Web application vulnerability assessment
I Series User Management
SuprTEK Continuous Monitoring
Ad

Recently uploaded (20)

PPTX
Big Data Technologies - Introduction.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Cloud computing and distributed systems.
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Electronic commerce courselecture one. Pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Machine learning based COVID-19 study performance prediction
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Advanced IT Governance
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Unlocking AI with Model Context Protocol (MCP)
Big Data Technologies - Introduction.pptx
NewMind AI Monthly Chronicles - July 2025
Mobile App Security Testing_ A Comprehensive Guide.pdf
Network Security Unit 5.pdf for BCA BBA.
The AUB Centre for AI in Media Proposal.docx
Cloud computing and distributed systems.
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
Dropbox Q2 2025 Financial Results & Investor Presentation
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Electronic commerce courselecture one. Pdf
Review of recent advances in non-invasive hemoglobin estimation
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Machine learning based COVID-19 study performance prediction
Diabetes mellitus diagnosis method based random forest with bat algorithm
“AI and Expert System Decision Support & Business Intelligence Systems”
Advanced IT Governance
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Modernizing your data center with Dell and AMD
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Unlocking AI with Model Context Protocol (MCP)

Extending the 20 critical security controls to gap assessments and security maturity modeling-john willis-pinfosec

  • 1. Extending the 20 Critical Security Controls to Gap Assessments & Security Maturity Modeling ShmooCon Fire Talks Hyatt Regency Washington 400 New Jersey Avenue, NW Washington, DC 20001 February 16, 2013 John M. Willis, pINFOSEC 2020 Pennsylvania Ave NW #400 Washington DC 20006 John.Willis@pINFOSEC.com LinkedIn.com/in/johnmwillis (202) 670-7179
  • 2. Extending the 20 Critical Security Controls to Gap Assessment & Security Maturity Modeling Purpose: Using the 20 Critical Security Controls, create Base Practice Statements against which security engineering and operations processes may be assessed for capability and maturity. Provide model framework to base Gap Assessments upon. Facilitate focus of Remediation Planning. Poll for interest in creating the model. Call for volunteers to create the model. 2
  • 3. 20 Critical Security Controls Attack-focused controls created by a consortium of government agencies, major corporations, and many others. Formerly known as the Consensus Audit Guidelines, a complete copy of the controls may be found on SANS Institute web site. Currently, the Consortium for Cybersecurity Action is the organization engaged in various projects pertaining to the controls. 1. Inventory of Authorized and Unauthorized Devices 2. Inventory of Authorized and Unauthorized Software 3. Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers 4. Continuous Vulnerability Assessment and Remediation 5. Malware Defenses 6. Application Software Security 7. Wireless Device Control 8. Data Recovery Capability 3
  • 4. 20 Critical Controls (cont'd) 9. Security Skills Assessment and Appropriate Training to Fill Gaps 10. Secure Configurations for Network Devices such as Firewalls, Routers, and Switches 11. Limitation and Control of Network Ports, Protocols, and Services 12. Controlled Use of Administrative Privileges 13. Boundary Defense 14. Maintenance, Monitoring, and Analysis of Audit Logs 15. Controlled Access Based on the Need to Know 16. Account Monitoring and Control 17. Data Loss Prevention 18. Incident Response and Management 19. Secure Network Engineering 20. Penetration Tests and Red Team Exercises 4
  • 5. Each control has a short title, and a sentence describing the control For example: http://www.sans.org/critical-security-controls/control.php?id=1 “Critical Control 1: Inventory of Authorized and Unauthorized Devices “The processes and tools used to track/control/prevent/correct network access by devices (computers, network components, printers, anything with an IP address) based on an asset inventory of which devices are allowed to connect to the network.” Implementation information follows… 5
  • 6. Proposed Decomposed Base Practice Version of Critical Control 1 BP.01.01 – Manage inventory of authorized devices (computers, network components, printers, anything with IP addresses) BP.01.02 – Limit network access to authorized devices All text under the Critical Control section, including details from the referenced NIST SP 800-53 sections, should be taken into consideration when crafting the Base Practice language. 6
  • 7. Process Capability Maturity Levels 0 – No – No Process Exists 1 – Exists – Process Exists 2 – Defined – Defined Process of some sort Exists 3 – Practiced – Vetted Process is now a routine Practice 4 – Reviewed – The Process is formally Reviewed on a Specified Periodic Basis 5 – Continuous – The Process is reviewed periodically and is subjected to Continuous Improvement 7
  • 8. Example of Tailoring Assessment Category Description Maturity Level Asset Management List servers by type/function and 2 location. Device How to know device is authorized Authentication before admitting to network? Validate device certificate? 1 Otherwise, scan for unauthorized devices every 12 hours? Network Admission Control every switch port via NAC (user ports controlled, audited. 0 Non-user ports verified and audited). Utilize network scanning tools to identify unauthorized wireless 1 devices. 8
  • 9. Another Approach One approach is to assign maturity levels to the categories (Implementation Levels) listed under "How to Implement, Automate, and Measure the Effectiveness of this Control”: • Quick Wins • Visibility/Attribution • Configuration/Hygiene • Advanced The information in these categories is informative & through-provoking, but does not define an assessment framework. 9
  • 10. Proposed Model The proposed model focuses on process capability maturity using Base Practices restated from the Critical Controls. Based on all such Base Practices, a formal or informal Gap Assessment can be created and saved as a baseline. For example: • BP.01.01 – Manage Device Inventory, Maturity Level 2 • BP.01.02 – Limit Network Access, Maturity Level 1 Remediation planning is then focused on getting the organization to the point where the Base Practices are least Practiced, etc. 10
  • 11. Extension of Proposed Model In addition to process capability, consider including measures for Robustness Levels. Focus on security architecture and engineering rigor, to include the following (for example): • Visibility/Attribution • Configuration/Hygiene • Automation • Breadth & Depth of coverage • Integrity • Resilience • Ability to provide/consume situational awareness data • Common Criteria Evaluation Assurance Level-like criteria • and/or whatever makes sense 11
  • 12. Poll for Interest / Call for Action Does this approach make sense? Would anyone use it? Who wants to help create such a Model, in conjunction with the Consortium for Cybersecurity Action? Three key components: 1. Create the Base Practice Statements for each Critical Control 2. Define Robustness Levels, and assessment method 3. Create Tailoring Guidelines 12
  • 13. Credits & Legal • Thanks to Tony Sager, Consortium for Cybersecurity Action for his input and encouragement to promote this Proposed Model • Copyrights, Registration and Service Marks, etc., if any, are property of their respective owners • The current version of the 20 Critical Controls may be found at http://www.sans.org/critical-security- controls/, and is licensed under the Creative Commons License (http://creativecommons.org/licenses/by-nd/3.0/) 13
  • 14. Contact Information John M. Willis pINFOSEC.com 2020 Pennsylvania Ave NW #400 Washington DC 20006 John.Willis@pINFOSEC.com LinkedIn.com/in/johnmwillis (202) 670-7179 14