SlideShare a Scribd company logo
Critical Controls for Cyber DefenseMadhurVermaCISSP, MVP (Consumer Security)CEH, CIW Security Analyst, MCTS, MCSE, MCSA
Computer Attacker Activities and Associated DefensesSecurity defenses include identifying attacker presence and reducing “living space”Security defenses include controlling superuser privileges [admin and root]Security defenses include disrupting command and control of attacker-implanted softwareSecurity defenses include decreasing attack surface and hardening security
Critical Control 1Boundary DefenseAll outgoing traffic must pass through at least one proxy on a DMZ network
All remote login access required to use two-factor authentication
Health checking of all remotely logging devices
Periodically scan for back-channel connections to the Internet that bypass the DMZ
Identify covert channels exfiltrating data through a firewall with built-in firewall session tracking mechanisms Critical Control 2Secure Configurations for Network Devices such as Firewalls, Routers and SwitchesCompare firewall, router and switch configuration against standard secure configurations defined for each type of network device
Implement ingress and egress filtering
Management network should be seprated from production networkCritical Control 3Wireless Device ControlEnsure that each wireless device connected to the network matches an authorized configuration and security profile
Ensure all wireless traffic leverages at least AES encryption used with at least WPA2 protection
Ensure wireless networks use authentication protocols such as EAP/TLS or PEAP
Disable peer-to-peer wireless network capabilities on wireless clients
Disable wireless peripheral access of devices
Regularly scan for unauthorized or misconfigured wireless infrastructure devicesCritical Control 4Limitation and Control of Network Ports, Protocols and ServicesUse Host-based Firewalls or port filtering tools
Regularly review the ports, protocols and services needed
Operate critical services on separate physical host machines
Port scanning tools are used to determine which services are listeningCritical Control 5Malware DefensesMonitor workstations, servers and mobile devices for active, up-to-date anti-malware protection
All malware detection events should be sent to enterprise anti-malware administration tools and event log servers
Configure laptops, workstations and servers so that they will not auto-run content from removable media
Configure systems to conduct an automated anti-malware scan of removable media when it is insertedCritical Control 6Secure Configurations for Hardware and Software on Laptops, Workstations and ServersStandardized images should represent hardened versions of the underlying OS and the applications installed on the system
Utilize file integrity checking tools to ensure that critical systems files have not been alteredCritical Control 7Application Software SecurityProtect web applications by deploying web application firewalls that inspect all traffic flowing to the web application for common web application attacks
Check for in-house developed and third-party procured web and other application software for coding errors, malware insertion, including backdoors prior to deployment
Verify that security considerations are taken into account throughout phases of the application development life cycle of all applicationsCritical Control 8Controlled use of Administrative PrivilegesShould have a good password policy

More Related Content

PPTX
Automating for NERC CIP-007-5-R1
PPTX
"Backoff" Malware: How to Know If You're Infected
PPTX
Achieving Continuous Monitoring with Security Automation
PDF
NIST cybersecurity framework
PPTX
Continuous Monitoring: Getting Past Complexity & Reducing Risk
ODP
Securing control systems v0.4
PPTX
The CIS Critical Security Controls the International Standard for Defense
PDF
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #4
Automating for NERC CIP-007-5-R1
"Backoff" Malware: How to Know If You're Infected
Achieving Continuous Monitoring with Security Automation
NIST cybersecurity framework
Continuous Monitoring: Getting Past Complexity & Reducing Risk
Securing control systems v0.4
The CIS Critical Security Controls the International Standard for Defense
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #4

What's hot (20)

PDF
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
PDF
20 Critical Controls for Effective Cyber Defense (A must read for security pr...
PDF
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
PPT
Lumension Security Solutions
PDF
Check point nerc cip compliance
PDF
Cheatsheet for your cloud project
PDF
Information Security Continuous Monitoring within a Risk Management Framework
PPTX
Developing a Continuous Monitoring Action Plan
PDF
SWITZ Business Security. Official presentation!
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
PDF
BSidesQuebec2013_fred
PPTX
Prioritized Approach Twenty Critical Controls 2008
PPT
NIST 800-37 Certification & Accreditation Process
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
PPT
NetGains Infrastructure Security
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
PDF
Ce hv6 module 65 patch management
PPTX
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
PPTX
System Security Plans 101
PDF
OSB240: What's New in Ivanti Application Control
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
20 Critical Controls for Effective Cyber Defense (A must read for security pr...
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
Lumension Security Solutions
Check point nerc cip compliance
Cheatsheet for your cloud project
Information Security Continuous Monitoring within a Risk Management Framework
Developing a Continuous Monitoring Action Plan
SWITZ Business Security. Official presentation!
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
BSidesQuebec2013_fred
Prioritized Approach Twenty Critical Controls 2008
NIST 800-37 Certification & Accreditation Process
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
NetGains Infrastructure Security
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
Ce hv6 module 65 patch management
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
System Security Plans 101
OSB240: What's New in Ivanti Application Control
 
Ad

Viewers also liked (17)

PPT
用生命守著的秘密 [1]
PPTX
Marmelada de amorodos
PPTX
draculas castle
PDF
Unistream Presentation
PPSX
Assignment Two Show
PDF
Cn Info Ing
PPTX
Trufas cenoria
PDF
INVESTIGAMOS BICHOS
PDF
Edison Research American Youth Study
 
PDF
Unistream Presentation
PDF
Nota Prensa2 Ing
PDF
A festa das abellas
PDF
Un cĂĄgado
PPT
Win 7 & Intel V Pro Tech
PPTX
Microsoft Platform Security Briefing
PPT
Radio Marketing Guide
 
PPT
ΑΡΧΑΙΑ ΣΠΑΡΤΗ μέσα από πηγές
用生命守著的秘密 [1]
Marmelada de amorodos
draculas castle
Unistream Presentation
Assignment Two Show
Cn Info Ing
Trufas cenoria
INVESTIGAMOS BICHOS
Edison Research American Youth Study
 
Unistream Presentation
Nota Prensa2 Ing
A festa das abellas
Un cĂĄgado
Win 7 & Intel V Pro Tech
Microsoft Platform Security Briefing
Radio Marketing Guide
 
ΑΡΧΑΙΑ ΣΠΑΡΤΗ μέσα από πηγές
Ad

Similar to Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02 (20)

PDF
5 howtomitigate
PDF
Security Framework from SANS
PDF
Vulnerability Assessment Checklist A Key Element in Cybersecurity
PDF
Enhance Your Business Security with a Comprehensive Audit Checklist 🔐
PPT
Identifying and Using Network Hand Tools
PDF
Demystifying PCI Software Security Framework: All You Need to Know for Your A...
PPTX
Cryptography_system analysis module.pptx
PDF
DevOps and CI/CD Security-Best-Practices
PDF
CIS_Controls_v7.1_Implementation_Groups.pdf
PPT
Secure Financial Intelligence System
PPTX
Provide Network System Administrationa.pptx
PDF
The 5 Layers of Security Testing by Alan Koch
PDF
The 5 Layers of Security Testing by Alan Koch
PDF
Security Considerations in Codeless Automation Testing.pdf
PDF
Securing Your Servers Top 5 Essential Practices.pdf
PDF
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
PDF
Comparison Review Forticlient x Kaspersky.pdf
PPTX
Introduction-to-Operating-System-Security.pptx
PDF
Cybersecurity Best Practices for Small Businesses
PDF
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
5 howtomitigate
Security Framework from SANS
Vulnerability Assessment Checklist A Key Element in Cybersecurity
Enhance Your Business Security with a Comprehensive Audit Checklist 🔐
Identifying and Using Network Hand Tools
Demystifying PCI Software Security Framework: All You Need to Know for Your A...
Cryptography_system analysis module.pptx
DevOps and CI/CD Security-Best-Practices
CIS_Controls_v7.1_Implementation_Groups.pdf
Secure Financial Intelligence System
Provide Network System Administrationa.pptx
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan Koch
Security Considerations in Codeless Automation Testing.pdf
Securing Your Servers Top 5 Essential Practices.pdf
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Comparison Review Forticlient x Kaspersky.pdf
Introduction-to-Operating-System-Security.pptx
Cybersecurity Best Practices for Small Businesses
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
 
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Big Data Technologies - Introduction.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Modernizing your data center with Dell and AMD
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Advanced methodologies resolving dimensionality complications for autism neur...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Unlocking AI with Model Context Protocol (MCP)
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Encapsulation_ Review paper, used for researhc scholars
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Understanding_Digital_Forensics_Presentation.pptx
NewMind AI Weekly Chronicles - August'25 Week I
The Rise and Fall of 3GPP – Time for a Sabbatical?
 
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
20250228 LYD VKU AI Blended-Learning.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Review of recent advances in non-invasive hemoglobin estimation
Big Data Technologies - Introduction.pptx
Approach and Philosophy of On baking technology
Modernizing your data center with Dell and AMD
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Building Integrated photovoltaic BIPV_UPV.pdf

Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02

  • 1. Critical Controls for Cyber DefenseMadhurVermaCISSP, MVP (Consumer Security)CEH, CIW Security Analyst, MCTS, MCSE, MCSA
  • 2. Computer Attacker Activities and Associated DefensesSecurity defenses include identifying attacker presence and reducing “living space”Security defenses include controlling superuser privileges [admin and root]Security defenses include disrupting command and control of attacker-implanted softwareSecurity defenses include decreasing attack surface and hardening security
  • 3. Critical Control 1Boundary DefenseAll outgoing traffic must pass through at least one proxy on a DMZ network
  • 4. All remote login access required to use two-factor authentication
  • 5. Health checking of all remotely logging devices
  • 6. Periodically scan for back-channel connections to the Internet that bypass the DMZ
  • 7. Identify covert channels exfiltrating data through a firewall with built-in firewall session tracking mechanisms Critical Control 2Secure Configurations for Network Devices such as Firewalls, Routers and SwitchesCompare firewall, router and switch configuration against standard secure configurations defined for each type of network device
  • 8. Implement ingress and egress filtering
  • 9. Management network should be seprated from production networkCritical Control 3Wireless Device ControlEnsure that each wireless device connected to the network matches an authorized configuration and security profile
  • 10. Ensure all wireless traffic leverages at least AES encryption used with at least WPA2 protection
  • 11. Ensure wireless networks use authentication protocols such as EAP/TLS or PEAP
  • 12. Disable peer-to-peer wireless network capabilities on wireless clients
  • 13. Disable wireless peripheral access of devices
  • 14. Regularly scan for unauthorized or misconfigured wireless infrastructure devicesCritical Control 4Limitation and Control of Network Ports, Protocols and ServicesUse Host-based Firewalls or port filtering tools
  • 15. Regularly review the ports, protocols and services needed
  • 16. Operate critical services on separate physical host machines
  • 17. Port scanning tools are used to determine which services are listeningCritical Control 5Malware DefensesMonitor workstations, servers and mobile devices for active, up-to-date anti-malware protection
  • 18. All malware detection events should be sent to enterprise anti-malware administration tools and event log servers
  • 19. Configure laptops, workstations and servers so that they will not auto-run content from removable media
  • 20. Configure systems to conduct an automated anti-malware scan of removable media when it is insertedCritical Control 6Secure Configurations for Hardware and Software on Laptops, Workstations and ServersStandardized images should represent hardened versions of the underlying OS and the applications installed on the system
  • 21. Utilize file integrity checking tools to ensure that critical systems files have not been alteredCritical Control 7Application Software SecurityProtect web applications by deploying web application firewalls that inspect all traffic flowing to the web application for common web application attacks
  • 22. Check for in-house developed and third-party procured web and other application software for coding errors, malware insertion, including backdoors prior to deployment
  • 23. Verify that security considerations are taken into account throughout phases of the application development life cycle of all applicationsCritical Control 8Controlled use of Administrative PrivilegesShould have a good password policy
  • 24. Change all default passwords before deploying
  • 25. Ensure that administrator accounts are used only for system administration activities and not for reading e-mail, composing documents or surfing the Internet
  • 26. Configure systems to issue a log entry and alert when an account is added to or removed from domain administrators group
  • 27. User awarenessCritical Control 9Controlled Access Based on Need-to-KnowEstablish a multi-level data identification or separation scheme
  • 28. Ensure that file shares have defined controls
  • 29. Enforce detailed audit logging for access to non-public data and special authentication for sensitive data Critical Control 10Account Monitoring and ControlEstablish a good account management policy
  • 30. Review all system accounts and disable any account that cannot be associated with a business process and business owner
  • 31. Monitor account usage to determine dormant accounts
  • 32. Monitor attempts to access deactivated accounts through audit loggingCritical Control 11Inventory of Authorized and Unauthorized SoftwareDevise a list of authorised software that is required
  • 34. Deploy software white-listing technology that allows systems to run only approved applications and prevents execution of all other softwareCritical Control 12Inventory of Authorized and Unauthorized DevicesDevise a list of authorised devices
  • 35. Deploy asset/network management toolsCritical Control 13Maintenance, Monitoring and Analysis of Security Audit LogsLogs should be recorded in standardized format such as syslog or those outline by Common Event Expression (CEE) initiative
  • 36. Network boundary should be configured to log verbosely all traffic arriving at the device
  • 37. Ensure logs are written to write-only devices or to dedicated logging servers
  • 38. Deploy SEIM system tool for log aggregation and consolidation Critical Control 14Data Loss PreventionDeploy hard drive encryption software to laptop machines that hold sensitive data
  • 39. Control the use of removable devices
  • 40. Data stored on removable drives should be encrypted
  • 41. Deploy an automated tool on network perimeter that monitors certain Personally Identifiable Information, keywords and other document characteristics to determine attempts to exfiltrate data Critical Control 15Continuous Vulnerability Assessment and RemediationRun automated vulnerability scanning tools against all systems
  • 42. Compare the results from back-to-back vulnerability scans to verify that vulnerabilities were addressed
  • 43. Measure the delay in patching new vulnerabilities
  • 44. Deploy automated patch management tools and software update toolsCritical Control 16Secure Network EngineeringSegment the enterprise network
  • 45. Follow best security practices for deploying servers, network devices and Internet services
  • 46. Network should support rapid response and shunning of detected attacksCritical Control 17Penetration Tests and Red Team ExercisesConduct regular penetration test to identify attack vectors
  • 47. Perform periodic red team exercises to test the readiness of organizations to identify and stop attacks or to respond quickly and effectively
  • 48. Ensure that systemic problems discovered in penetration tests and red team exercises are fully mitigatedCritical Control 18Incident Response CapabilityShould have written incident response procedures
  • 49. Should assign job titles and duties for handling incidents to specific individuals
  • 50. Should notify CERT-In in accordance
  • 51. Publish information to all personnel about information of incidents for awareness
  • 52. Conduct periodic incident response drills for scenario to ensure that personnel understand current threats, risks and their responsibilities Critical Control 19Data Recovery CapabilityShould have good backup policy
  • 53. Ensure that backups are encrypted
  • 54. Backup media should be stored in physically secure areasCritical Control 20Security Skills Assessment and Appropriate Training to Fill Gaps Develop security awareness trainings
  • 55. Devise periodic security awareness assessment quizzes
  • 56. Conduct periodic exercises to verify that employees and contractors are fulfilling their information security dutiesResourceshttp://www.sans.org