preview

The Center For Internet Security ( CIS ) Critical Security Controls Analysis

Decent Essays

The Center for Internet Security (CIS) Critical Security Controls (CSC) will provide a starting point for security controls and procedures not in place. The first CSC covers consistently managing (inventorying, tracking, correcting) all hardware devices on the organizations network making sure that only authorized devices have access. Unauthorized devices must be found or detected and prevented from gaining access to the network. A malicious person could take advantage of a workstation which had not been on the network for an extended period of time due to the workstation missing crucial security updates. Devices do not need to be directly connected to the external network in order them to be compromised. Once internal access to the …show more content…

Once the device would be introduced to the network it would immediately be vulnerable to remotely executed critical vulnerabilities. Our device baseline images should be updated and validated on a regular basis to update their security configuration according to current best practices.
The forth CSC covers continuously scanning devices for vulnerabilities and actively remediating those vulnerabilities. This process needs to be automated as much as possible to reduce the strain on the device administrators. If our organization does do not scan for vulnerabilities and proactively address discovered flaws, we face a significant likelihood of having our computer systems compromised. Our Cyber Defense Division faces particular challenges in scaling remediation across an entire enterprise, and prioritizing actions with conflicting priorities, and sometimes-uncertain side effects. We as security must work hand in hand with the system administrators to help them understand the importance of applying security to their devices. One of the common issues on any network is the misuse of administrative privileges. System administrators will consistently log on devices using elevated privilege account to conduct routine tasks which do not require the rights and permissions granted using that specific account. The misuse of administrative privileges is a primary method for attackers to spread inside a target enterprise.

Get Access