SlideShare a Scribd company logo
CIS Framework Steps 1 - 5
Chris Goettl, Director of Product Management, Security
Michael, Ivanti Customer, Healthcare
CIS, US-CERT, ASD, and other authorities prioritize these five elements of
cyber hygiene to significantly reduce security threats.
Inventory and control of hardware assets
Inventory and control of software assets
Controlled use of administrative privileges
Continuous vulnerability management
Secure configuration for hardware and software
The first 5 controls
P a t c h O p e r a t i n g
S ys t e m s
85% of Windows
intrusion threats
1
Organizations can prevent
P a t c h
Ap p l i c a t i o n s
2 3
M i n i m i z e Ad m i n
P r i v i l e g e s
4
by implementing four key disciplines
Ap p l i c a t i o n
W h i t e l i s t i n g
As recommended by…
Protect Against 85% of Cyberattacks
Rise in vulnerabilities vs decrease in time to patch
2016 2017 20192018
• 16555 CVEs
• Average Time to Patch
34 days
• Only 7% of CVEs were
exploited
• 14714 CVEs• 6447 CVEs
• Average Time to Patch
100 to 120 days
• Expect continued in
crease in CVEs
• Target Time to Patch
14 days
Exploited Zero Day
Public Disclosure
Unknown Vulnerabilities
0-2 Weeks
Rising Risk
Day Zero
Update
Releases
2-4 Weeks
50% of exploits
have occurred
40-60 Days
90% of exploits
have occurred
120 Days
BlueKeep Timeline
14, May, 2019
CVE-2019-0708
Update Available
15, May, 2019
PoC research begins
Social Media Trackers
GitHub Trackers
20, May, 2019
BSOD achieved
28, May, 2019
Active Scanning of public systems
White Hats and Black Hats
6 security research teams confirmed they have
achieved exploit of BlueKeep
14 Days
Prioritizing Vulnerabilities to Resolve
• By Vendor Severity?
• By CVSS score?
• Just deploying OS updates?
Rated 6.3 and 7.7 by CVSSv3
Researchers slap SAP CRM with vuln
combo for massive damage
Zero Day in iTunes (8 CVEs) and iCloud (9
CVEs)last week! No CVE for the Zero Day. No
vendor rating for the updates.
Zero Day: Win32k Elevation of Privilege
Vulnerability CVE-2019-1132 rated Important,
CVSSv3 7.8
Bridge the gap between Security and IT Operations
Continuous Vulnerability Assessment and Remediation
How hard can a handoff be?
In reality, it has many complications.
Each vulnerability
assessment could
contain thousands, 10s
or 100s of thousands of
detected CVEs.
De-duplicating and
researching the list of
detected CVEs can take
5-8 hours or more with
each pass.
Rise in vulnerabilities vs decrease in time to patch
Exploited Zero Day
Public Disclosure
Unknown Vulnerabilities
0-2 Weeks
Rising Risk
Day Zero
Update
Releases
2-4 Weeks
50% of exploits
have occurred
40-60 Days
90% of exploits
have occurred
120 Days
Application Control
Privilege Management
#1 Patch Management to reduce Attack Surface
#2 Application Control to block malware and untrusted payloads
#3 Privilege Management to prevent lateral movement  pivot
Patch and secure the OSes
and 3rd-party apps that you
can.
Prevent all other apps from
running while practicing
the principles of least
privilege.
Add advanced anti-
malware and AV
capabilities, device
control, and global policy
for all devices.
Marry security capabilities
with IT ops and service
management via shared
data and workflows and
automation to complete a
secure lifecycle.
 Patch management
 Vulnerability management
 Discovery
 Application control
 Privilege management
 Discovery
 Device control
 Anti-malware
 Configuration
 Endpoint management
 Asset management
 Service management
 Identity Management
Ivanti Solutions Mapped to CIS Framework
CIS #3: Continuous
Vulnerability Management
CIS #5: Secure
configuration for hardware
and software
And beyond…
Unified IT
Discovery
CIS #2: Inventory  control of
software
CIS #4: Control admin
privileges
A s s e t
M a n a g e m e n t
E n d p o i n t
M a n a g e m e n t
I d e n t i t y
M a n a g e m e n t
S e r v i c e
M a n a g e m e n t
Extend your investment in
Microsoft System Center
Configuration Manager
with the most extensive
catalog of Third Party
updates on the market.
Best of breed Patch
Management, Application
Control, and Privilege
Management from a single
management console.
Combine best of breed
security capabilities with
industry leading systems
management capabilities
in a unified platform.
 Native Plug-In
 Scales with SCCM
 Extensive 3rd Party Catalog
 Edit updates without SCUP
 Patch Management
 Application control
 Privilege management
 Endpoint Management
 Patch, Application Control,
Device Control, Antivirus,
Auto-Isolation, and more.
Solutions to fit your needs
Patch for SCCM
Endpoint Security for
Endpoint Manager
Security Controls
Best of breed Application
Control and Privilege
Management to extend
Microsoft System Center
Configuration Manager.
 Application control
 Privilege management
 Scales with SCCM
Application Control
5 KEY TAKE AWAYS
• Build your security roadmap around a well developed security
framework like CIS framework.
• Ask Yourself: How accurate is your DiscoveryAsset
Management program?
• Evaluate your vulnerability assessment and prioritization.
What metrics are you using? Are they accurate enough?
• 50% of vulnerability exploits occur within 14-24 days of
release of an update. What is your Time to Patch?
• Continually review your security strategy. How can you layer
on additional security controls to strengthen your capabilities.
5 KEY TAKE AWAYS

More Related Content

PPTX
Navigating the Zero Trust Journey for Today's Everywhere Workplace
PPTX
Ivanti remote worker ds
PDF
Navigating Zero Trust Presentation Slides
PDF
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
PDF
2021 English Part One Anti-phishing Webinar Presentation Slides
PDF
The how and why of patch management by N-able
PDF
Identiverse Zero Trust Customer Briefing, Identiverse 2019
PPTX
A Non-Salesy Intro to the Ivanti Porfolio
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Ivanti remote worker ds
Navigating Zero Trust Presentation Slides
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
2021 English Part One Anti-phishing Webinar Presentation Slides
The how and why of patch management by N-able
Identiverse Zero Trust Customer Briefing, Identiverse 2019
A Non-Salesy Intro to the Ivanti Porfolio

What's hot (20)

PPTX
The Zero Trust Model of Information Security
PDF
Throughwave Day 2015 - ForeScout Automated Security Control
PPT
Top Tactics For Endpoint Security
PPTX
SC Magazine & ForeScout Survey Results
PPTX
A Primer on iOS Management and What's Changing
PPS
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
PPTX
Symantec and ForeScout Delivering a Unified Cyber Security Solution
PDF
Hardware Security on Vehicles
PDF
Network Access Control (NAC)
PPTX
LoginCat - Zero Trust Integrated Cybersecurity
PDF
Endpoint Security
PPTX
What is zero trust model (ztm)
PDF
Top 7 Security Measures for IoT Systems
PPTX
Frost & Sullivan Report
PDF
Practical Enterprise Security Architecture
PDF
Ivanti neurons - lunch and learn
PPT
NAC Solution Taarak
PDF
The Top 20 Cyberattacks on Industrial Control Systems
PDF
DSS ITSEC Conference 2012 - Forescout NAC #1
PPTX
Endpoint Security Evasion
The Zero Trust Model of Information Security
Throughwave Day 2015 - ForeScout Automated Security Control
Top Tactics For Endpoint Security
SC Magazine & ForeScout Survey Results
A Primer on iOS Management and What's Changing
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Hardware Security on Vehicles
Network Access Control (NAC)
LoginCat - Zero Trust Integrated Cybersecurity
Endpoint Security
What is zero trust model (ztm)
Top 7 Security Measures for IoT Systems
Frost & Sullivan Report
Practical Enterprise Security Architecture
Ivanti neurons - lunch and learn
NAC Solution Taarak
The Top 20 Cyberattacks on Industrial Control Systems
DSS ITSEC Conference 2012 - Forescout NAC #1
Endpoint Security Evasion
Ad

Similar to Protect Against 85% of Cyberattacks (20)

PPTX
How to Perform Continuous Vulnerability Management
PPTX
Patch Management Best Practices 2019
PDF
Software Vulnerabilities Risk Remediation
PPSX
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
PPTX
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
PPTX
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
PPTX
Agentless Patch Management for the Data Center
PDF
The CISO Problems Risk Compliance Management in a Software Development 030420...
PPTX
Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2
PPTX
Дмитро Терещенко, "How to secure your application with Secure SDLC"
PPTX
Application Hackers Have A Handbook. Why Shouldn't You?
PDF
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
PDF
OSB50: Operational Security: State of the Union
PPT
六合彩香港-六合彩
PPTX
One login enemy at the gates
PPTX
Vulnerability Management Nirvana - Seattle Agora - 18Mar16
PDF
PCI and Vulnerability Assessments - What’s Missing
DOCX
Globally.docx
PPTX
Bsides SP 2022 - EPSS - Final.pptx
PPTX
Enterprise Class Vulnerability Management Like A Boss
How to Perform Continuous Vulnerability Management
Patch Management Best Practices 2019
Software Vulnerabilities Risk Remediation
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Agentless Patch Management for the Data Center
The CISO Problems Risk Compliance Management in a Software Development 030420...
Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2
Дмитро Терещенко, "How to secure your application with Secure SDLC"
Application Hackers Have A Handbook. Why Shouldn't You?
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
OSB50: Operational Security: State of the Union
六合彩香港-六合彩
One login enemy at the gates
Vulnerability Management Nirvana - Seattle Agora - 18Mar16
PCI and Vulnerability Assessments - What’s Missing
Globally.docx
Bsides SP 2022 - EPSS - Final.pptx
Enterprise Class Vulnerability Management Like A Boss
Ad

More from Ivanti (20)

PDF
August Patch Tuesday
PDF
Français Patch Tuesday - Juillet
PDF
July Patch Tuesday
PDF
Français Patch Tuesday - Juin
PDF
June Patch Tuesday
PDF
Français Patch Tuesday - Mai
PDF
May Patch Tuesday
PDF
Français Patch Tuesday - Avril
PDF
April Patch Tuesday
PDF
Français Patch Tuesday - Mars
PDF
March Patch Tuesday
PDF
Français Patch Tuesday - Février
PDF
February Patch Tuesday
PDF
Patch Tuesday de Diciembre
PDF
Français Patch Tuesday - Décembre
PDF
Patch Tuesday Italia Dicembre
PDF
December Patch Tuesday
PDF
Patch Tuesday de Noviembre
PDF
Français Patch Tuesday - Novembre
PDF
Patch Tuesday Italia Novembre
August Patch Tuesday
Français Patch Tuesday - Juillet
July Patch Tuesday
Français Patch Tuesday - Juin
June Patch Tuesday
Français Patch Tuesday - Mai
May Patch Tuesday
Français Patch Tuesday - Avril
April Patch Tuesday
Français Patch Tuesday - Mars
March Patch Tuesday
Français Patch Tuesday - Février
February Patch Tuesday
Patch Tuesday de Diciembre
Français Patch Tuesday - Décembre
Patch Tuesday Italia Dicembre
December Patch Tuesday
Patch Tuesday de Noviembre
Français Patch Tuesday - Novembre
Patch Tuesday Italia Novembre

Recently uploaded (20)

PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
artificial intelligence overview of it and more
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPT
tcp ip networks nd ip layering assotred slides
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PPTX
international classification of diseases ICD-10 review PPT.pptx
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PPTX
Introduction to Information and Communication Technology
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
DOCX
Unit-3 cyber security network security of internet system
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
Unit-1 introduction to cyber security discuss about how to secure a system
artificial intelligence overview of it and more
Decoding a Decade: 10 Years of Applied CTI Discipline
PptxGenJS_Demo_Chart_20250317130215833.pptx
tcp ip networks nd ip layering assotred slides
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
international classification of diseases ICD-10 review PPT.pptx
QR Codes Qr codecodecodecodecocodedecodecode
Slides PDF The World Game (s) Eco Economic Epochs.pdf
The New Creative Director: How AI Tools for Social Media Content Creation Are...
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Slides PPTX World Game (s) Eco Economic Epochs.pptx
An introduction to the IFRS (ISSB) Stndards.pdf
Job_Card_System_Styled_lorem_ipsum_.pptx
522797556-Unit-2-Temperature-measurement-1-1.pptx
Introuction about WHO-FIC in ICD-10.pptx
Introduction to Information and Communication Technology
Module 1 - Cyber Law and Ethics 101.pptx
Unit-3 cyber security network security of internet system
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰

Protect Against 85% of Cyberattacks

  • 1. CIS Framework Steps 1 - 5 Chris Goettl, Director of Product Management, Security Michael, Ivanti Customer, Healthcare
  • 2. CIS, US-CERT, ASD, and other authorities prioritize these five elements of cyber hygiene to significantly reduce security threats. Inventory and control of hardware assets Inventory and control of software assets Controlled use of administrative privileges Continuous vulnerability management Secure configuration for hardware and software The first 5 controls
  • 3. P a t c h O p e r a t i n g S ys t e m s 85% of Windows intrusion threats 1 Organizations can prevent P a t c h Ap p l i c a t i o n s 2 3 M i n i m i z e Ad m i n P r i v i l e g e s 4 by implementing four key disciplines Ap p l i c a t i o n W h i t e l i s t i n g As recommended by…
  • 5. Rise in vulnerabilities vs decrease in time to patch 2016 2017 20192018 • 16555 CVEs • Average Time to Patch 34 days • Only 7% of CVEs were exploited • 14714 CVEs• 6447 CVEs • Average Time to Patch 100 to 120 days • Expect continued in crease in CVEs • Target Time to Patch 14 days Exploited Zero Day Public Disclosure Unknown Vulnerabilities 0-2 Weeks Rising Risk Day Zero Update Releases 2-4 Weeks 50% of exploits have occurred 40-60 Days 90% of exploits have occurred 120 Days
  • 6. BlueKeep Timeline 14, May, 2019 CVE-2019-0708 Update Available 15, May, 2019 PoC research begins Social Media Trackers GitHub Trackers 20, May, 2019 BSOD achieved 28, May, 2019 Active Scanning of public systems White Hats and Black Hats 6 security research teams confirmed they have achieved exploit of BlueKeep 14 Days
  • 7. Prioritizing Vulnerabilities to Resolve • By Vendor Severity? • By CVSS score? • Just deploying OS updates? Rated 6.3 and 7.7 by CVSSv3 Researchers slap SAP CRM with vuln combo for massive damage Zero Day in iTunes (8 CVEs) and iCloud (9 CVEs)last week! No CVE for the Zero Day. No vendor rating for the updates. Zero Day: Win32k Elevation of Privilege Vulnerability CVE-2019-1132 rated Important, CVSSv3 7.8
  • 8. Bridge the gap between Security and IT Operations
  • 9. Continuous Vulnerability Assessment and Remediation How hard can a handoff be? In reality, it has many complications. Each vulnerability assessment could contain thousands, 10s or 100s of thousands of detected CVEs. De-duplicating and researching the list of detected CVEs can take 5-8 hours or more with each pass.
  • 10. Rise in vulnerabilities vs decrease in time to patch Exploited Zero Day Public Disclosure Unknown Vulnerabilities 0-2 Weeks Rising Risk Day Zero Update Releases 2-4 Weeks 50% of exploits have occurred 40-60 Days 90% of exploits have occurred 120 Days Application Control Privilege Management #1 Patch Management to reduce Attack Surface #2 Application Control to block malware and untrusted payloads #3 Privilege Management to prevent lateral movement pivot
  • 11. Patch and secure the OSes and 3rd-party apps that you can. Prevent all other apps from running while practicing the principles of least privilege. Add advanced anti- malware and AV capabilities, device control, and global policy for all devices. Marry security capabilities with IT ops and service management via shared data and workflows and automation to complete a secure lifecycle.  Patch management  Vulnerability management  Discovery  Application control  Privilege management  Discovery  Device control  Anti-malware  Configuration  Endpoint management  Asset management  Service management  Identity Management Ivanti Solutions Mapped to CIS Framework CIS #3: Continuous Vulnerability Management CIS #5: Secure configuration for hardware and software And beyond… Unified IT Discovery CIS #2: Inventory control of software CIS #4: Control admin privileges
  • 12. A s s e t M a n a g e m e n t E n d p o i n t M a n a g e m e n t I d e n t i t y M a n a g e m e n t S e r v i c e M a n a g e m e n t
  • 13. Extend your investment in Microsoft System Center Configuration Manager with the most extensive catalog of Third Party updates on the market. Best of breed Patch Management, Application Control, and Privilege Management from a single management console. Combine best of breed security capabilities with industry leading systems management capabilities in a unified platform.  Native Plug-In  Scales with SCCM  Extensive 3rd Party Catalog  Edit updates without SCUP  Patch Management  Application control  Privilege management  Endpoint Management  Patch, Application Control, Device Control, Antivirus, Auto-Isolation, and more. Solutions to fit your needs Patch for SCCM Endpoint Security for Endpoint Manager Security Controls Best of breed Application Control and Privilege Management to extend Microsoft System Center Configuration Manager.  Application control  Privilege management  Scales with SCCM Application Control
  • 14. 5 KEY TAKE AWAYS
  • 15. • Build your security roadmap around a well developed security framework like CIS framework. • Ask Yourself: How accurate is your DiscoveryAsset Management program? • Evaluate your vulnerability assessment and prioritization. What metrics are you using? Are they accurate enough? • 50% of vulnerability exploits occur within 14-24 days of release of an update. What is your Time to Patch? • Continually review your security strategy. How can you layer on additional security controls to strengthen your capabilities. 5 KEY TAKE AWAYS

Editor's Notes

  • #3: Much of what you do in cyber security is an 80/20 effort. You can get 80 percent of what you need by implementing 20 percent of the framework. As you try to nail down the remaining 20 percent of risk and exposure, you begin spending a lot more time, effort, and money. The CIS framework is built much the same way. The top 5 controls—25 percent of the framework—deliver layers of defense that, when implemented effectively, can mitigate about 85 percent of cyber threats. 1. Inventory and Control of Hardware Assets Actively manage (inventory, track, and correct) all hardware devices on the network so that only authorized devices are given access, and unauthorized and unmanaged devices are found and prevented from gaining access. 2. Inventory and Control of Software Assets As above, but for software: Actively manage (inventory, track, and correct) all software on the network so that only authorized software is installed and can execute, and that unauthorized and unmanaged software is found and prevented from installation or execution. 3. Continuous Vulnerability Management Continuously acquire, assess, and take action on new information in order to identify vulnerabilities, remediate, and minimize the window of opportunity for attackers. 4. Controlled Use of Administrative Privileges The misuse of administrative privileges is a primary method for attackers to spread inside a target enterprise. Provide processes and tools to track/control/prevent/correct the use, assignment, and configuration of administrative privileges on computers, networks, and applications. 5. Secure Configuration for Hardware and Software Establish, implement, and actively manage (track, report on, correct) the security configuration of laptops, servers, and workstations using a rigorous configuration management and change control process in order to prevent attackers from exploiting vulnerable services and settings. (As delivered by manufacturers and resellers, the default configurations for operating systems and applications are normally geared to ease-of-deployment and ease-of-use—not security. )
  • #4: *Australia Signals Directorate (equivalent to US NSA)
  • #14: We talked about asset management a moment ago. Let’s take a look at how we’re bringing together Security with some of our other solutions now. Endpoint management plus security: Patch management and vulnerability management often overlap with typical operational activities. Integrate patch management with your endpoint management solution to make it easy for one team to manage both activities. If a security incident occurs, do you have the right tools in place to respond? Can you isolate an infected system? Re-provision a system that was ransomed or couldn’t be cleaned? Apply configuration changes to resolve security vulnerabilities? Service management plus security: There is a process for every task in every IT operation. Patching is no exception. You need to track everything from the change to the entire monthly maintenance incident, and even security incidents other sources report that drive the need for a software update. How are you managing updates each month? You are tracking changes in your CMDB but how are you executing the updates? Security incidents often start as a normal incident and escalate to a security issue once identified as such. Resolving these incidents often leads to a configuration change, a patch for a software vulnerability, or a change in policy for privileges or application/device control capabilities. When you identify a security incident, do you have the means to respond to and remediate it directly? Finally, since you have no real defense without up-to-the-minute insight into your environment, our products also come with standard with Ivanti Xtraction. Xtraction takes advanced reporting to a whole new level, turning it into a checkbox with the ability to bring together data collected by our solutions and many more from across the organization and easily customize dashboards and reports. Get the right data into the hands of executives, directors, and line-of-business (LOB) and application owners. Pre-built connectors for nearly every tool you use (service desks, monitoring and ITAM toolsets, phone systems, etc.) mean no coding, business intelligence gurus, or spreadsheets—and no data silos. And Xtraction can be customized to connect to even more, so everyone can view their data enterprise-wide in context—cutting through the mass of information to the critical insights that matter—to make smarter, faster decisions with ease.