SlideShare a Scribd company logo
Tech TV
Series
COLLABORATE, INNOVATE,
VALIDATE CIS Top 20
#1
Inventory of Authorized and
Unauthorized Devices
Lisa Niles – CISSP, Chief Solution Architect
1
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
CIS Top 20 Critical Security Controls
“Monitor, detect, analyze, protect, report, and respond against known
vulnerabilities, known & unknown attacks, and exploitations”
and “continuously test and evaluate information
And the security controls and techniques to
ensure that they are effectively implemented.”
2
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
CIS Top 20 Critical Security Controls
• The control areas in the CIS CSC focus on various technical aspects of
information security
• Primary goal of supporting organizations in prioritizing their efforts in defending
against today’s most common and damaging attacks.
• Outside of the technical realm, a comprehensive security program should also
take into account:
• Numerous additional areas of security, including overall policy, organizational structure,
personnel issues (e.g., background checks, etc.), and physical security.
• To help maintain focus, the controls in this document do not deal with these
important, but non-technical, aspects of information security.
• Organizations should build a comprehensive approach in these other aspects of
security as well
3
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
4
CIS Top 20 Critical Security Controls
• What is an IT security framework?
• An information security framework is a series of documented processes that are used to
define policies and procedures around the implementation and ongoing management of
information security controls in an enterprise environment.
• These frameworks are basically a "blueprint" for building an information security
program to manage risk and reduce vulnerabilities. Information security teams can
utilize these frameworks to define and prioritize the tasks required to build security into
an organization.
• NISTCybersecurity Framework, NIST guidelines, and the ISO 27000 series or regulations such
as PCI DSS, HIPAA, NERC CIP, FISMA
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
CIS Top 20 Critical Security Controls
5
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
CIS Top 20 Critical Security Controls
Understanding the CIS Critical Security Controls
• In 2008, the Center for Internet Security’s Critical Security Controls (“CIS
Controls”) were created
• A collaboration between representatives from the U.S. government and
private sector security & research organizations.
• A set of practical defenses specifically targeted toward stopping cyber
attacks
• The CIS Controls were crafted to answer the frequent question:
• “Where should I start when I want to improve my cyber defenses?”
6
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
CIS Top 20 Critical Security Controls
• The CIS CSC Relationship to Other Federal Guidelines, Recommendations, and
Requirements
• Once companies have addressed the 20 Critical Controls, it is recommended that
NIST 800-53 guidelines be used to ensure that they have assessed and
implemented an appropriate set of management controls
• The CIS controls are meant to reinforce and prioritize some of the most important
elements of other frameworks, guidelines, standards, and requirements put forth
in other US Government documentation, such as NIST Special Publication 800-53:
Recommended Security Controls for Federal Information Systems, SCAP, FDCC,
FISMA, and Department of Homeland Security Software Assurance documents.
7
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
CIS Top 20 Critical Security Controls
Guiding principles used in devising these control areas and their associated sub
controls include:
• Defenses should focus on addressing the most common and damaging attacks
• Enterprise environments must ensure consistent controls across an enterprise
to effectively negate attacks.
• Defenses should be automated where possible, and periodically or continuously
measured using automated measurement techniques where feasible.
8
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
•Getting Started: Ask and Answer Key Questions
• What am I trying to protect?
• Where are my gaps?
• What are my priorities?
• Where can I automate?
• How can my vendor partners help?
9
CIS Top 20 Critical Security Controls
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
CIS Top 20 Critical Security Controls
• General Guidance for Implementing the Controls:
• Carefully plan.
• Organizational structure for program’s success.
• Establish a “Governance, Risk, and Compliance (GRC)” program.
• Assigning program managers
10
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
CIS Top 20 Critical Security Controls
• There are a few practical considerations an organization should make when
embarking on this journey. Specifically, an organization should:
• Make a formal, top-level decision to make the CIS Controls part of the organization’s standard
• Senior management - support and accountability.
• Assign a program manager
• Who will be responsible for the long-term maintaining cyber defenses.
• Start with a gap analysis
• Develop an implementation plan
• Document the long-term plan (3-5 years)
• Embed the definitions of CIS Controls into organization’s security policies
• Educate workforce on the organization’s security goals and enlist their help as a part of the
long-term defense of the organization’s data.
11
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
CIS Top 20 Critical Security Controls
• Successful implementation of the Controls will require many organizations to
shift their mindset on security and how they approach IT operations and
defense.
• No longer can employees be allowed to install software at random or travel
with sensitive data in their pockets.
• It has been established that the cultural acceptance of changes needed to
implement the technical controls is a necessary prerequisite for success.
• This is probably the most significant obstacle most organizations need to
overcome.
12
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
CIS Top 20 Critical Security Controls
• The Controls are not limited to blocking the initial compromise of systems
• Detecting already--‐compromised machines and preventing or disrupting
attackers’ follow--‐on actions.
• Reducing the initial attack surface by hardening device configurations,
identifying compromised machines to address long--‐term threats inside an
organization’s network, disrupting attackers’ command--‐and--‐control of
implanted malicious code, and establishing an adaptive, continuous defense
13
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
• The five critical tenets of an effective cyber defense system as
reflected in the CIS Critical Security Controls are:
• Offense informs defense
• Prioritization
• Metrics
• Continuous diagnostics and mitigation
• Automation
14
CIS Top 20 Critical Security Controls
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
15
CIS Top 20 Critical Security Controls
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
•How to Get Started
•Step 1. Perform Initial GapAssessment.
•Step 2. Develop an Implementation Roadmap
•Step 3. Implement the First Phase of Controls
•Step 4. Integrate Controls into Operations
•Step 5. Report and Manage Progress against the
Implementation Roadmap
16
CIS Top 20 Critical Security Controls
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
• Control #1
• Inventory of Authorized and Unauthorized Devices
• Key Principle Control:
• Actively manage (inventory, track, and correct) all hardware
devices on the network so that only authorized devices are given
access, and unauthorized and unmanaged devices are found and
prevented from gaining access.
17
CIS Top 20 Critical Security Controls
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
• The purpose of this Control is to help organizations define a baseline of what
must be defended.
• Without an understanding of what devices and data are connected, they cannot
be defended.
18
CIS Top 20 Critical Security Controls
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
• Why is CIS Control 1 critical?
• Attackers are continuously scanning the address space of target
organizations, waiting for new and unprotected systems to be attached to
the network.
• Devices that are not visible from the Internet can be used by attackers who
have already gained internal access and are hunting for internal jump points
or victims.
• Looking for new or test systems
19
CIS Top 20 Critical Security Controls
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
20
Family Control Control Description Foundational Advanced
Critical Security Control #1: Inventory of Authorized and Unauthorized Devices
System 1.1 Deploy an automated asset inventory discovery tool and use it to build a preliminary inventory of systems
connected to an organization’s public and private network(s). Both active tools that scan through IPv4 or IPv6
network address ranges and passive tools that identify hosts based on analyzing their traffic should be
employed.
Y Use a mix of active
and passive tools,
and apply as part of
a continuous
monitoring
program.
System 1.2 If the organization is dynamically assigning addresses using DHCP, then deploy dynamic host configuration
protocol (DHCP) server logging, and use this information to improve the asset inventory and help detect
unknown systems.
Y
System 1.3 Ensure that all equipment acquisitions automatically update the inventory system as new, approved devices are
connected to the network.
Y
System 1.4 Maintain an asset inventory of all systems connected to the network and the network devices themselves,
recording at least the network addresses, machine name(s), purpose of each system, an asset owner responsible
for each device, and the department associated with each device.The inventory should include every system
that has an Internet protocol (IP) address on the network, including but not limited to desktops, laptops, servers,
network equipment (routers, switches, firewalls, etc.), printers, storage area networks,Voice Over-IP
telephones, multi-homed addresses, virtual addresses, etc. The asset inventory created must also include data
on whether the device is a portable and/or personal device. Devices such as mobile phones, tablets, laptops, and
other portable electronic devices that store or process data must be identified, regardless of whether they are
attached to the organization’s network.
Y
System 1.5 Deploy network level authentication via 802.1x to limit and control which devices can be connected to the
network. The 802.1x must be tied into the inventory data to determine authorized versus unauthorized
systems.
Y Authentication
mechanisms are
closely coupled to
management of
hardware inventory
System 1.6 Use client certificates to validate and authenticate systems prior to connecting to the private network. Y
CIS Top 20 Critical Security Controls
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
• CSC 1 Procedures andTools
• The Control requires both technical and procedural actions;
• It is critical for all devices to have an accurate and up-to-date inventory control system in
place (excel, database, manual or commercial automatic tool) with device details/owners
• Securely pull device details (MAC) switch, routers, aps, DHCP, servers, span ports
• Scanning tools (Active/passive) every 12 hours, ICMP sweep, fingerprinting
• Standard device naming conventions can help so unrecognized device names stand out
• Maturity goes from manual, automated, monitored and measured
• Place new device on network monthly to test tools/procedures effectiveness
21
CIS Top 20 Critical Security Controls
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
CIS Top 20 Critical Security Controls
• CSC 1 Procedures andTools
• Ensure that network inventory monitoring tools keeping the asset inventory
up to date on a real-time basis
• Looking for deviations from the expected inventory of assets on the network,
and alerting security
• Secure the asset inventory database with asset information is encrypted.
• Limit access to these systems to authorized personnel only, and carefully log
all such access.
• For additional security, a secure copy of the asset inventory may be kept in an
off-line system.
22
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
CIS Top 20 Critical Security Controls
• CSC 1 Procedures andTools
• In addition to an inventory of hardware, organizations should develop an inventory
of data/information assets and maps critical information to the hardware assets
• A department and individual responsible for each data asset should be identified,
recorded, and tracked.
• To evaluate the effectiveness of automated asset inventory tools, periodically attach
several hardened computer systems not already included in asset inventories to the
network and measure the delay before each device connection is disabled or the
installers confronted.
• Advanced:The organization’s asset inventory should include removable media
devices, including USB sticks, external hard drives, and other related information
storage devices.
23
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
24
CIS Top 20 Critical Security Controls
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
CIS Top 20 Critical Security Controls
25
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
CIS Top 20 Critical Security Controls
26
CSC 1.1 Requirement: Inventory of Authorized and Unauthorized devices
CSC 1.1 Procedure: Asset Inventory
The organization:
1. Departments will document and clearly define what authorized and unauthorized
devices are in their respective areas.
1. Departments will update the Assets inventory reports and auditors of inventory devices.
1. Departments will spot check devices monthly to ensure that they are authorized
Metrics:
1. The IT department will maintain a list of de-authorized devices
1. The IT department spot check each department every 6-months
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
Sub-Control Description Control SecurityTechnology Controls
1
Inventory of Authorized and
Unauthorized Devices
Active Device Discovery
System
Tenable, Qualys, Infoblox NetMRI,
ForeScout
2
Inventory of Authorized and
Unauthorized Devices
Passive Device Discovery
System
Tenable, Qualys, Infoblox NetMRI,
ForeScout
3
Inventory of Authorized and
Unauthorized Devices
Log Management
System / SIEM Log Rhythm, Splunk
4
Inventory of Authorized and
Unauthorized Devices Asset Inventory System
Tenable, Qualys, Infoblox NetMRI,
ForeScout, Db, Excel
5
Inventory of Authorized and
Unauthorized Devices
Network Level
Authentication (NLA)
Tenable, Qualys, Infoblox NetMRI,
ForeScout, Juniper
6
Inventory of Authorized and
Unauthorized Devices
Public Key Infrastruture
(PKI) Microsoft 27
CIS Top 20 Critical Security Controls
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
CIS Top 20 Critical Security Controls
• Inventory of Authorized and Unauthorized Devices
1-1 - Deploy an automated asset inventory discovery tool
FreeTools
• Spiceworks - active scanning.
• AlienVault OSSIM - Inventorying
• OpenAudIT - All open source inventorying, and auditing platform
• OpenNSM - Open Network Management System
• Windows DHCP Server Audit EventTool -This tool can be used by Admins to
view all the events generated by DHCP Server directly
• Linux DHCP Server Config and Logging - CentOS DHCP Server
28
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
CIS Top 20 Critical Security Controls
• 1-5 - Deploy network level authentication via 802.1x to limit and control which
devices can be connected to the network.The 802.1x must be tied into the inventory
data to determine authorized versus unauthorized systems.
FreeTools
• Windows NPS Server Role - Just beware that NAP is deprecated inWindows 10 so
you will need a 2rd party NAP client.
• FreeRADIUS & 802.1x - How to setup 802.1x with FreeRADIUS.
• SANS guide to deploy 802.1x
• Group Policy forWireless 802.1x - Group Policy forWired 802.1x
• 802.1x standard on most switches
Enterprise tools
• Cisco ISE
29
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
CIS Top 20 Critical Security Controls
• 1-6 - Deploy network access control (NAC) to monitor authorized systems so
if attacks occur, the impact can be remediated by moving the untrusted
system to a virtual local area network that has minimal access.
FreeTools
• PacketFence - Flagship of open source Network Access Control (NAC).
• OpenNAC - Open source Network access control that provide secure access
for LAN/WAN.
CommercialTools
• Forescout - Offers health checks before authenticating supplicants to your
network. For wired and wireless networks.
• Microsoft SCCM - NAC with health checks is but one small piece of the SCCM 30
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
CIS Top 20 Critical Security Controls
31
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
CIS Top 20 Critical Security Controls
CIS Critical Security Controls
#
Customer solution? Budgeted 2018? Reviewed solutions?
SynerComm Solutions
1 Inventory of Authorized and
Unauthorized Devices
Tenable, Qualys, Infoblox,
Forescout
2 Inventory of Authorized and
Unauthorized Software
Tenable, Qualys, Infoblox,
Carbonblack
3 Secure Configuration of end-user
devices
Tenable, Rapid7
4 Continious Vulnerability & remediation Qualys, Tenable, Rapid7
5 Controlled Use of Administrative
priviledges
Centrify, CyberArk, BeyondTrust,
Okta
6 Maintenance, Monitoring and Analysis
of Audit Logs
SolarWinds, Log Rhythum
7 Email and Web Browser Protection Barracuda, Proofpoint, zScaler,
Fireeye (Web - Palo, Checkpoint,
Forcepoint)
8 Malware Defense Bitdefender, carbonblack, PaloAlto
TRAPS, Sophos, TrendMicro
9 Limitation & Control of network Ports,
protocols, and Service
PaloAlto, Juniper, Checkpoint,
Fortinet
10 Data Recovery Capability Barracuda
11 Secure Configuration of Network
Devices
SynerComm Config Assurance,
A&A, Firemon, RedSeal, Tenable,
Rapid7
12 Boundry Defense PaloAlto, Juniper, Checkpoint,
Fortinet
13 Data Protection Rapid7, tenable, Imperva, Infoblox,
PaloAlto
14 Controlled Access Based on Need to
Know
Centrify , OKTA
15 Wireless Access Control Aerohive with 802.1x & WIPS/FW
16 Account Monitoring and Control Centrify, Beyond Trust, OKTA,
17 Security Skills Assessment and
Appropriate Training
A&A training
18 Application Software Security Rapid7, Splunk
19 Incident Response and Management Rapid7, redseal, A&A
20 Penetration Tests and Red Team
Exercises A&A
32
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
CIS Top 20 Critical Security Controls
33
• Center for Internet Security (CIS): https://www.cisecurity.org/
• NIST Cyber Security Framework (CSF):
http://www.nist.gov/cyberframework/
• CIS Critical Security Controls (CSC):
https://www.cisecurity.org/critical-controls.cfm
• Auditscripts resources (provided by James Tarala, CSC Editor):
https://www.auditscripts.com/free-resources/critical-security-
controls/
• CSF planning spreadsheet: http://www.tenable.com/whitepapers/nist-
csf-implementation-planning-tool
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
• CISsecurity.org JOIN!!
34
CIS Top 20 Critical Security Controls
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
CIS Top 20 Critical Security Controls
35
TECHTVSERIES
COLLABORATE,INNOVATE,VALIDATE
Thank you for Attending.
Hope you can join us for the Complete CIS Top 20 CSC
36
CIS Top 20 Critical Security Controls

More Related Content

PDF
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
PDF
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #4
PDF
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
PDF
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
PPTX
Effective Cyber Defense Using CIS Critical Security Controls
PPTX
Top 20 Security Controls for a More Secure Infrastructure
PPTX
The CIS Critical Security Controls the International Standard for Defense
PPTX
Overview of the 20 critical controls
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #4
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
Effective Cyber Defense Using CIS Critical Security Controls
Top 20 Security Controls for a More Secure Infrastructure
The CIS Critical Security Controls the International Standard for Defense
Overview of the 20 critical controls

What's hot (20)

PDF
Cs cmaster
PDF
Ebook: Splunk SANS - CIS Top 20 Critical Security Controls
PPTX
Recent changes to the 20 critical controls
PPTX
Information Assurance Metrics: Practical Steps to Measurement
PPTX
More practical insights on the 20 critical controls
PPTX
Using an Open Source Threat Model for Prioritized Defense
PPTX
Prioritizing an audit program using the 20 critical controls
PPTX
Solving the CIO’s Cybersecurity Dilemma
PPTX
Utilizing the Critical Security Controls to Secure Healthcare Technology
PPTX
Practical steps for assessing tablet & mobile device security
PDF
20 Security Controls for the Cloud
PDF
Security operations center 5 security controls
PPTX
Federal Cybersecurity: The latest challenges, initiatives and best practices
PDF
Skill Set Needed to work successfully in a SOC
PDF
DTS Solution - Building a SOC (Security Operations Center)
PDF
Cyber essentials-overview-sep-2021-211019100139
PPTX
Simplify PCI DSS Compliance with AlienVault USM
PDF
Accelerating OT - A Case Study
PPTX
"Backoff" Malware: How to Know If You're Infected
Cs cmaster
Ebook: Splunk SANS - CIS Top 20 Critical Security Controls
Recent changes to the 20 critical controls
Information Assurance Metrics: Practical Steps to Measurement
More practical insights on the 20 critical controls
Using an Open Source Threat Model for Prioritized Defense
Prioritizing an audit program using the 20 critical controls
Solving the CIO’s Cybersecurity Dilemma
Utilizing the Critical Security Controls to Secure Healthcare Technology
Practical steps for assessing tablet & mobile device security
20 Security Controls for the Cloud
Security operations center 5 security controls
Federal Cybersecurity: The latest challenges, initiatives and best practices
Skill Set Needed to work successfully in a SOC
DTS Solution - Building a SOC (Security Operations Center)
Cyber essentials-overview-sep-2021-211019100139
Simplify PCI DSS Compliance with AlienVault USM
Accelerating OT - A Case Study
"Backoff" Malware: How to Know If You're Infected
Ad

Similar to SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1 (20)

PDF
(Ebook) CIS Critical Security Controls by Center for Internet Security
PPTX
Leveraging Federal Procurement to Improve Cyber Security
PDF
Cag3 1
PDF
CIS20 CSCs+mapping to NIST+ISO.pdf
PPTX
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02
PPTX
Critical Controls Of Cyber Defense
PPTX
Cybersecurity: Challenges, Initiatives, and Best Practices
PDF
20 Critical Controls for Effective Cyber Defense (A must read for security pr...
PPTX
Extending the 20 critical security controls to gap assessments and security m...
PDF
CIS_Controls_v7.1_Implementation_Groups.pdf
PDF
C I S C r i t i c a l C o n t r o l s
DOCX
Cy safe 2.0_workbook
PDF
Management CyperSecurity Risk - Management CyperSecurity Risk
PPTX
Cyber Security: Threats and Needed Actions
PPTX
Add-Structure-and-Credibility-to-Your-Security-Portfolio-with-CIS-Controls-v8...
PDF
Lessons Learned from the NIST CSF
PDF
Map Critical Security Controls (CSC) v5.0 to NIST SP 800-53 Revision 4 (Summa...
PDF
The Critical Security Controls and the StealthWatch System
PDF
Cis controls v8_guide (1)
PPTX
ppt_cyber.pptx
(Ebook) CIS Critical Security Controls by Center for Internet Security
Leveraging Federal Procurement to Improve Cyber Security
Cag3 1
CIS20 CSCs+mapping to NIST+ISO.pdf
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02
Critical Controls Of Cyber Defense
Cybersecurity: Challenges, Initiatives, and Best Practices
20 Critical Controls for Effective Cyber Defense (A must read for security pr...
Extending the 20 critical security controls to gap assessments and security m...
CIS_Controls_v7.1_Implementation_Groups.pdf
C I S C r i t i c a l C o n t r o l s
Cy safe 2.0_workbook
Management CyperSecurity Risk - Management CyperSecurity Risk
Cyber Security: Threats and Needed Actions
Add-Structure-and-Credibility-to-Your-Security-Portfolio-with-CIS-Controls-v8...
Lessons Learned from the NIST CSF
Map Critical Security Controls (CSC) v5.0 to NIST SP 800-53 Revision 4 (Summa...
The Critical Security Controls and the StealthWatch System
Cis controls v8_guide (1)
ppt_cyber.pptx
Ad

Recently uploaded (20)

PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Cloud computing and distributed systems.
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Electronic commerce courselecture one. Pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Advanced IT Governance
PDF
Approach and Philosophy of On baking technology
PPTX
MYSQL Presentation for SQL database connectivity
PPT
Teaching material agriculture food technology
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Cloud computing and distributed systems.
The Rise and Fall of 3GPP – Time for a Sabbatical?
NewMind AI Monthly Chronicles - July 2025
20250228 LYD VKU AI Blended-Learning.pptx
Big Data Technologies - Introduction.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Review of recent advances in non-invasive hemoglobin estimation
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Spectral efficient network and resource selection model in 5G networks
Electronic commerce courselecture one. Pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Network Security Unit 5.pdf for BCA BBA.
Advanced IT Governance
Approach and Philosophy of On baking technology
MYSQL Presentation for SQL database connectivity
Teaching material agriculture food technology
Dropbox Q2 2025 Financial Results & Investor Presentation

SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1

  • 1. Tech TV Series COLLABORATE, INNOVATE, VALIDATE CIS Top 20 #1 Inventory of Authorized and Unauthorized Devices Lisa Niles – CISSP, Chief Solution Architect 1
  • 2. TECHTVSERIES COLLABORATE,INNOVATE,VALIDATE CIS Top 20 Critical Security Controls “Monitor, detect, analyze, protect, report, and respond against known vulnerabilities, known & unknown attacks, and exploitations” and “continuously test and evaluate information And the security controls and techniques to ensure that they are effectively implemented.” 2
  • 3. TECHTVSERIES COLLABORATE,INNOVATE,VALIDATE CIS Top 20 Critical Security Controls • The control areas in the CIS CSC focus on various technical aspects of information security • Primary goal of supporting organizations in prioritizing their efforts in defending against today’s most common and damaging attacks. • Outside of the technical realm, a comprehensive security program should also take into account: • Numerous additional areas of security, including overall policy, organizational structure, personnel issues (e.g., background checks, etc.), and physical security. • To help maintain focus, the controls in this document do not deal with these important, but non-technical, aspects of information security. • Organizations should build a comprehensive approach in these other aspects of security as well 3
  • 4. TECHTVSERIES COLLABORATE,INNOVATE,VALIDATE 4 CIS Top 20 Critical Security Controls • What is an IT security framework? • An information security framework is a series of documented processes that are used to define policies and procedures around the implementation and ongoing management of information security controls in an enterprise environment. • These frameworks are basically a "blueprint" for building an information security program to manage risk and reduce vulnerabilities. Information security teams can utilize these frameworks to define and prioritize the tasks required to build security into an organization. • NISTCybersecurity Framework, NIST guidelines, and the ISO 27000 series or regulations such as PCI DSS, HIPAA, NERC CIP, FISMA
  • 6. TECHTVSERIES COLLABORATE,INNOVATE,VALIDATE CIS Top 20 Critical Security Controls Understanding the CIS Critical Security Controls • In 2008, the Center for Internet Security’s Critical Security Controls (“CIS Controls”) were created • A collaboration between representatives from the U.S. government and private sector security & research organizations. • A set of practical defenses specifically targeted toward stopping cyber attacks • The CIS Controls were crafted to answer the frequent question: • “Where should I start when I want to improve my cyber defenses?” 6
  • 7. TECHTVSERIES COLLABORATE,INNOVATE,VALIDATE CIS Top 20 Critical Security Controls • The CIS CSC Relationship to Other Federal Guidelines, Recommendations, and Requirements • Once companies have addressed the 20 Critical Controls, it is recommended that NIST 800-53 guidelines be used to ensure that they have assessed and implemented an appropriate set of management controls • The CIS controls are meant to reinforce and prioritize some of the most important elements of other frameworks, guidelines, standards, and requirements put forth in other US Government documentation, such as NIST Special Publication 800-53: Recommended Security Controls for Federal Information Systems, SCAP, FDCC, FISMA, and Department of Homeland Security Software Assurance documents. 7
  • 8. TECHTVSERIES COLLABORATE,INNOVATE,VALIDATE CIS Top 20 Critical Security Controls Guiding principles used in devising these control areas and their associated sub controls include: • Defenses should focus on addressing the most common and damaging attacks • Enterprise environments must ensure consistent controls across an enterprise to effectively negate attacks. • Defenses should be automated where possible, and periodically or continuously measured using automated measurement techniques where feasible. 8
  • 9. TECHTVSERIES COLLABORATE,INNOVATE,VALIDATE •Getting Started: Ask and Answer Key Questions • What am I trying to protect? • Where are my gaps? • What are my priorities? • Where can I automate? • How can my vendor partners help? 9 CIS Top 20 Critical Security Controls
  • 10. TECHTVSERIES COLLABORATE,INNOVATE,VALIDATE CIS Top 20 Critical Security Controls • General Guidance for Implementing the Controls: • Carefully plan. • Organizational structure for program’s success. • Establish a “Governance, Risk, and Compliance (GRC)” program. • Assigning program managers 10
  • 11. TECHTVSERIES COLLABORATE,INNOVATE,VALIDATE CIS Top 20 Critical Security Controls • There are a few practical considerations an organization should make when embarking on this journey. Specifically, an organization should: • Make a formal, top-level decision to make the CIS Controls part of the organization’s standard • Senior management - support and accountability. • Assign a program manager • Who will be responsible for the long-term maintaining cyber defenses. • Start with a gap analysis • Develop an implementation plan • Document the long-term plan (3-5 years) • Embed the definitions of CIS Controls into organization’s security policies • Educate workforce on the organization’s security goals and enlist their help as a part of the long-term defense of the organization’s data. 11
  • 12. TECHTVSERIES COLLABORATE,INNOVATE,VALIDATE CIS Top 20 Critical Security Controls • Successful implementation of the Controls will require many organizations to shift their mindset on security and how they approach IT operations and defense. • No longer can employees be allowed to install software at random or travel with sensitive data in their pockets. • It has been established that the cultural acceptance of changes needed to implement the technical controls is a necessary prerequisite for success. • This is probably the most significant obstacle most organizations need to overcome. 12
  • 13. TECHTVSERIES COLLABORATE,INNOVATE,VALIDATE CIS Top 20 Critical Security Controls • The Controls are not limited to blocking the initial compromise of systems • Detecting already--‐compromised machines and preventing or disrupting attackers’ follow--‐on actions. • Reducing the initial attack surface by hardening device configurations, identifying compromised machines to address long--‐term threats inside an organization’s network, disrupting attackers’ command--‐and--‐control of implanted malicious code, and establishing an adaptive, continuous defense 13
  • 14. TECHTVSERIES COLLABORATE,INNOVATE,VALIDATE • The five critical tenets of an effective cyber defense system as reflected in the CIS Critical Security Controls are: • Offense informs defense • Prioritization • Metrics • Continuous diagnostics and mitigation • Automation 14 CIS Top 20 Critical Security Controls
  • 16. TECHTVSERIES COLLABORATE,INNOVATE,VALIDATE •How to Get Started •Step 1. Perform Initial GapAssessment. •Step 2. Develop an Implementation Roadmap •Step 3. Implement the First Phase of Controls •Step 4. Integrate Controls into Operations •Step 5. Report and Manage Progress against the Implementation Roadmap 16 CIS Top 20 Critical Security Controls
  • 17. TECHTVSERIES COLLABORATE,INNOVATE,VALIDATE • Control #1 • Inventory of Authorized and Unauthorized Devices • Key Principle Control: • Actively manage (inventory, track, and correct) all hardware devices on the network so that only authorized devices are given access, and unauthorized and unmanaged devices are found and prevented from gaining access. 17 CIS Top 20 Critical Security Controls
  • 18. TECHTVSERIES COLLABORATE,INNOVATE,VALIDATE • The purpose of this Control is to help organizations define a baseline of what must be defended. • Without an understanding of what devices and data are connected, they cannot be defended. 18 CIS Top 20 Critical Security Controls
  • 19. TECHTVSERIES COLLABORATE,INNOVATE,VALIDATE • Why is CIS Control 1 critical? • Attackers are continuously scanning the address space of target organizations, waiting for new and unprotected systems to be attached to the network. • Devices that are not visible from the Internet can be used by attackers who have already gained internal access and are hunting for internal jump points or victims. • Looking for new or test systems 19 CIS Top 20 Critical Security Controls
  • 20. TECHTVSERIES COLLABORATE,INNOVATE,VALIDATE 20 Family Control Control Description Foundational Advanced Critical Security Control #1: Inventory of Authorized and Unauthorized Devices System 1.1 Deploy an automated asset inventory discovery tool and use it to build a preliminary inventory of systems connected to an organization’s public and private network(s). Both active tools that scan through IPv4 or IPv6 network address ranges and passive tools that identify hosts based on analyzing their traffic should be employed. Y Use a mix of active and passive tools, and apply as part of a continuous monitoring program. System 1.2 If the organization is dynamically assigning addresses using DHCP, then deploy dynamic host configuration protocol (DHCP) server logging, and use this information to improve the asset inventory and help detect unknown systems. Y System 1.3 Ensure that all equipment acquisitions automatically update the inventory system as new, approved devices are connected to the network. Y System 1.4 Maintain an asset inventory of all systems connected to the network and the network devices themselves, recording at least the network addresses, machine name(s), purpose of each system, an asset owner responsible for each device, and the department associated with each device.The inventory should include every system that has an Internet protocol (IP) address on the network, including but not limited to desktops, laptops, servers, network equipment (routers, switches, firewalls, etc.), printers, storage area networks,Voice Over-IP telephones, multi-homed addresses, virtual addresses, etc. The asset inventory created must also include data on whether the device is a portable and/or personal device. Devices such as mobile phones, tablets, laptops, and other portable electronic devices that store or process data must be identified, regardless of whether they are attached to the organization’s network. Y System 1.5 Deploy network level authentication via 802.1x to limit and control which devices can be connected to the network. The 802.1x must be tied into the inventory data to determine authorized versus unauthorized systems. Y Authentication mechanisms are closely coupled to management of hardware inventory System 1.6 Use client certificates to validate and authenticate systems prior to connecting to the private network. Y CIS Top 20 Critical Security Controls
  • 21. TECHTVSERIES COLLABORATE,INNOVATE,VALIDATE • CSC 1 Procedures andTools • The Control requires both technical and procedural actions; • It is critical for all devices to have an accurate and up-to-date inventory control system in place (excel, database, manual or commercial automatic tool) with device details/owners • Securely pull device details (MAC) switch, routers, aps, DHCP, servers, span ports • Scanning tools (Active/passive) every 12 hours, ICMP sweep, fingerprinting • Standard device naming conventions can help so unrecognized device names stand out • Maturity goes from manual, automated, monitored and measured • Place new device on network monthly to test tools/procedures effectiveness 21 CIS Top 20 Critical Security Controls
  • 22. TECHTVSERIES COLLABORATE,INNOVATE,VALIDATE CIS Top 20 Critical Security Controls • CSC 1 Procedures andTools • Ensure that network inventory monitoring tools keeping the asset inventory up to date on a real-time basis • Looking for deviations from the expected inventory of assets on the network, and alerting security • Secure the asset inventory database with asset information is encrypted. • Limit access to these systems to authorized personnel only, and carefully log all such access. • For additional security, a secure copy of the asset inventory may be kept in an off-line system. 22
  • 23. TECHTVSERIES COLLABORATE,INNOVATE,VALIDATE CIS Top 20 Critical Security Controls • CSC 1 Procedures andTools • In addition to an inventory of hardware, organizations should develop an inventory of data/information assets and maps critical information to the hardware assets • A department and individual responsible for each data asset should be identified, recorded, and tracked. • To evaluate the effectiveness of automated asset inventory tools, periodically attach several hardened computer systems not already included in asset inventories to the network and measure the delay before each device connection is disabled or the installers confronted. • Advanced:The organization’s asset inventory should include removable media devices, including USB sticks, external hard drives, and other related information storage devices. 23
  • 26. TECHTVSERIES COLLABORATE,INNOVATE,VALIDATE CIS Top 20 Critical Security Controls 26 CSC 1.1 Requirement: Inventory of Authorized and Unauthorized devices CSC 1.1 Procedure: Asset Inventory The organization: 1. Departments will document and clearly define what authorized and unauthorized devices are in their respective areas. 1. Departments will update the Assets inventory reports and auditors of inventory devices. 1. Departments will spot check devices monthly to ensure that they are authorized Metrics: 1. The IT department will maintain a list of de-authorized devices 1. The IT department spot check each department every 6-months
  • 27. TECHTVSERIES COLLABORATE,INNOVATE,VALIDATE Sub-Control Description Control SecurityTechnology Controls 1 Inventory of Authorized and Unauthorized Devices Active Device Discovery System Tenable, Qualys, Infoblox NetMRI, ForeScout 2 Inventory of Authorized and Unauthorized Devices Passive Device Discovery System Tenable, Qualys, Infoblox NetMRI, ForeScout 3 Inventory of Authorized and Unauthorized Devices Log Management System / SIEM Log Rhythm, Splunk 4 Inventory of Authorized and Unauthorized Devices Asset Inventory System Tenable, Qualys, Infoblox NetMRI, ForeScout, Db, Excel 5 Inventory of Authorized and Unauthorized Devices Network Level Authentication (NLA) Tenable, Qualys, Infoblox NetMRI, ForeScout, Juniper 6 Inventory of Authorized and Unauthorized Devices Public Key Infrastruture (PKI) Microsoft 27 CIS Top 20 Critical Security Controls
  • 28. TECHTVSERIES COLLABORATE,INNOVATE,VALIDATE CIS Top 20 Critical Security Controls • Inventory of Authorized and Unauthorized Devices 1-1 - Deploy an automated asset inventory discovery tool FreeTools • Spiceworks - active scanning. • AlienVault OSSIM - Inventorying • OpenAudIT - All open source inventorying, and auditing platform • OpenNSM - Open Network Management System • Windows DHCP Server Audit EventTool -This tool can be used by Admins to view all the events generated by DHCP Server directly • Linux DHCP Server Config and Logging - CentOS DHCP Server 28
  • 29. TECHTVSERIES COLLABORATE,INNOVATE,VALIDATE CIS Top 20 Critical Security Controls • 1-5 - Deploy network level authentication via 802.1x to limit and control which devices can be connected to the network.The 802.1x must be tied into the inventory data to determine authorized versus unauthorized systems. FreeTools • Windows NPS Server Role - Just beware that NAP is deprecated inWindows 10 so you will need a 2rd party NAP client. • FreeRADIUS & 802.1x - How to setup 802.1x with FreeRADIUS. • SANS guide to deploy 802.1x • Group Policy forWireless 802.1x - Group Policy forWired 802.1x • 802.1x standard on most switches Enterprise tools • Cisco ISE 29
  • 30. TECHTVSERIES COLLABORATE,INNOVATE,VALIDATE CIS Top 20 Critical Security Controls • 1-6 - Deploy network access control (NAC) to monitor authorized systems so if attacks occur, the impact can be remediated by moving the untrusted system to a virtual local area network that has minimal access. FreeTools • PacketFence - Flagship of open source Network Access Control (NAC). • OpenNAC - Open source Network access control that provide secure access for LAN/WAN. CommercialTools • Forescout - Offers health checks before authenticating supplicants to your network. For wired and wireless networks. • Microsoft SCCM - NAC with health checks is but one small piece of the SCCM 30
  • 32. TECHTVSERIES COLLABORATE,INNOVATE,VALIDATE CIS Top 20 Critical Security Controls CIS Critical Security Controls # Customer solution? Budgeted 2018? Reviewed solutions? SynerComm Solutions 1 Inventory of Authorized and Unauthorized Devices Tenable, Qualys, Infoblox, Forescout 2 Inventory of Authorized and Unauthorized Software Tenable, Qualys, Infoblox, Carbonblack 3 Secure Configuration of end-user devices Tenable, Rapid7 4 Continious Vulnerability & remediation Qualys, Tenable, Rapid7 5 Controlled Use of Administrative priviledges Centrify, CyberArk, BeyondTrust, Okta 6 Maintenance, Monitoring and Analysis of Audit Logs SolarWinds, Log Rhythum 7 Email and Web Browser Protection Barracuda, Proofpoint, zScaler, Fireeye (Web - Palo, Checkpoint, Forcepoint) 8 Malware Defense Bitdefender, carbonblack, PaloAlto TRAPS, Sophos, TrendMicro 9 Limitation & Control of network Ports, protocols, and Service PaloAlto, Juniper, Checkpoint, Fortinet 10 Data Recovery Capability Barracuda 11 Secure Configuration of Network Devices SynerComm Config Assurance, A&A, Firemon, RedSeal, Tenable, Rapid7 12 Boundry Defense PaloAlto, Juniper, Checkpoint, Fortinet 13 Data Protection Rapid7, tenable, Imperva, Infoblox, PaloAlto 14 Controlled Access Based on Need to Know Centrify , OKTA 15 Wireless Access Control Aerohive with 802.1x & WIPS/FW 16 Account Monitoring and Control Centrify, Beyond Trust, OKTA, 17 Security Skills Assessment and Appropriate Training A&A training 18 Application Software Security Rapid7, Splunk 19 Incident Response and Management Rapid7, redseal, A&A 20 Penetration Tests and Red Team Exercises A&A 32
  • 33. TECHTVSERIES COLLABORATE,INNOVATE,VALIDATE CIS Top 20 Critical Security Controls 33 • Center for Internet Security (CIS): https://www.cisecurity.org/ • NIST Cyber Security Framework (CSF): http://www.nist.gov/cyberframework/ • CIS Critical Security Controls (CSC): https://www.cisecurity.org/critical-controls.cfm • Auditscripts resources (provided by James Tarala, CSC Editor): https://www.auditscripts.com/free-resources/critical-security- controls/ • CSF planning spreadsheet: http://www.tenable.com/whitepapers/nist- csf-implementation-planning-tool
  • 36. TECHTVSERIES COLLABORATE,INNOVATE,VALIDATE Thank you for Attending. Hope you can join us for the Complete CIS Top 20 CSC 36 CIS Top 20 Critical Security Controls