SlideShare une entreprise Scribd logo
1  sur  50
Workbook
1/29/2018
1. PURPOSE............................................................................................................................... 3
2. SCOPE..................................................................................................................................... 3
3. DEFINITIONS.......................................................................................................................... 3
4. UPDATES................................................................................................................................ 5
5. CONTROL CATEGORY: SANS CRITICAL CONTROLS ..................................................... 5
Critical Control 1: Inventory of Authorized and Unauthorized Devices ...................................................5
Critical Control 2: Inventory of Authorized and Unauthorized Software .................................................6
Critical Control 4: Continuous Vulnerability Assessment and Remediation ........................................10
Critical Control 5: Controlled Use of Administrative Privileges ................................................................11
Critical Control 6: Maintenance, Monitoring, and Analysis of Audit Logs ............................................13
Critical Control 7: Email and Web Browser Protections .............................................................................14
Critical Control 8: Malware Defenses ...............................................................................................................16
Critical Control 9: Limitation and Control of Network Ports.......................................................................17
Critical Control 10: Data Recovery Capability ...............................................................................................18
Critical Control 11: Secure Configurations for Network Devices.............................................................19
Critical Control 12: Boundary Defense.............................................................................................................21
Critical Control 13: Data Protection ...................................................................................................................23
Critical Control 14: Controlled Access Based on the Need to Know .....................................................24
Critical Control 15: Wireless Access Control .................................................................................................26
Critical Control 16: Account Monitoring and Control ...................................................................................28
Critical Control 17: Security Skills Assessment and Appropriate Training to Fill Gaps ..................29
Critical Control 18: Application Software Security........................................................................................31
Critical Control 19: Incident Response and Management .........................................................................32
Critical Control 20: Penetration Tests and Red Team Exercises............................................................33
6. CONTROL CATEGORY: ISO CONTROLS......................................................................... 34
ISO Control: Define Scope ...................................................................................................................................35
ISO Control: Setup the Information Security Team and Approach ........................................................35
ISO Control: Communicate Information Security Policy ............................................................................37
ISO Control: Identify Resources, Ownership and Standard Operating Procedures for IT
Processes...................................................................................................................................................................38
ISO Control: Monitoring and review of third party services .......................................................................40
ISO Control: Complete Summary of Controls................................................................................................41
ISO Control: Define and Generate Records (evidence).............................................................................41
ISO Control: Physical and Environmental Security .....................................................................................42
ISO Control: Measure Effectiveness of Controls ..........................................................................................43
ISO Control: Update Annual Planning..............................................................................................................44
ISO Control: Compliance ......................................................................................................................................44
7. CONTROL CATEGORY: NIST CONTROLS....................................................................... 46
NIST Control: Business Environment ...............................................................................................................46
NIST Control: Governance ...................................................................................................................................47
NIST Control: Risk Management Strategy......................................................................................................47
NIST Control: Maintenance..................................................................................................................................48
APPENDIX A: RACI MATRIX...................................................................................................... 50
1. PURPOSE
CySAFE was created through a collaborative effort, driven by five Michigan counties and the
State of Michigan to develop a free IT security assessment tool to help small and mid-sized
organizations assess, understand and prioritize their basic IT security needs.
CySAFE was created from three well-known IT security frameworks: 20 Critical Controls,
ISO 27001 and NIST. The goal was to combine the 400+ controls from all three frameworks
into one condensed list, removing any redundant controls and assess the controls against
the organization's current IT security capabilities. Next, the master list of 35 controls areas
were evaluated over three key factors – cost to implement, time to implement and risk – and
were assigned a number based on each key factor.
This document is provided as a supplementary guide to the CySAFE Security Assessment
tool.
Users can use it to:
a. Implement actual controls in their organization
b. Establish a RACI Matrix for those controls
c. Document the future initiatives planned to improve the security
2. SCOPE
The document aggregates the control statements, lists expected controls for the 35 controls
included in the CySAFE assessment tool.
Note: The controls and RACI roles provided in Blue under the actual controls are for
reference only. The users should document the actual controls and RACI in their
organization.
3. DEFINITIONS
IT Asset/Asset: an asset is any data, device, or other component of the environment that
supports information-related activities. Assets generally include hardware (e.g. servers and
switches), software (e.g. mission- critical applications and support systems), service (IT
processes) and confidential information. Assets should be protected from illicit access, use,
disclosure, alteration, destruction, and/or theft, resulting in loss to the organization.
IT Security Controls/Controls: IT Security controls are technical or administrative
safeguards or counter measures to avoid, counteract or minimize loss or unavailability of IT
asset. IT Security control is the main way to manage risk. IT Asset owner can choose to:
a. Accept the risk,
b. Implement controls to manage risk, or
c. Transfer risk to a third party.
Expected/Recommended Controls: are guidelines for possible controls expected to be in
place to meet the objectives of the specific control category. The guidelines are based on
best practices observed in the industry, recommendations from popular Information Security
Frameworks like ISO 27001, National Institute of Standards and Technology (NIST), and
standards, regulations.
Note: As the name suggests the expected/recommended controls are not mandatory. An
organization using this document can have actual controls that can be different from the
recommended controls and meet the control objectives to mitigate the associated risks.
RACI Matrix: Responsibility, Accountability, Consult, and Inform. This model is used to
identify roles and responsibilities for the Information Security Controls in the current
environment. For additional information on RACI Matrix refer Appendix A.
RACI Roles: The RACI roles provided in Blue under the actual controls in this document, are
in the context of the IT Organization the CySAFE assessment tool, and should be used for
reference only.
The Organization using this document may have different sets of actual controls and different
RACI chart for those controls. The document including the RACI roles definition should be
modified accordingly.
Asset Owner: identifies an individual or entity that has approved management responsibility
for controlling the production, development, maintenance, use and security of the assets.
Note: In context of this document, an Asset owner is a team’s/manager within the IT
organization that supports the IT Asset (Application, Server, etc.) on behalf of the Business
Units that use the application to support their Business Process.
IT Admin or System Administrator: is a team/individual responsible to support the
infrastructure elements in a typical IT environment. Some examples of the Infrastructure
elements are Workstations (PC, Laptops, Tablets), Servers, Network components, etc.
IT teams: IT Teams includes all organizational divisions in an IT Department and will vary
among the organizations using this document.
4. UPDATES
Since the document aggregates the control statements, for the controls included in the
CySAFE assessment tool, any change to the CySAFE assessment tool will result in updates
to the document.
For any organization using this workbook document in tandem with their CySAFE
assessment tool, it is recommended to update the document to reflect:
a. the changes to the periodic CySAFE assessments,
b. changes within their organization in terms of controls, and/or
c. changes to RACI chart for the actual/future controls.
5. CONTROL CATEGORY:SANS CRITICAL CONTROLS
Critical Control 1: Inventory of Authorized and Unauthorized Devices
Control Statement: Actively manage (inventory, track, and correct) all hardware devices on
the network so that only authorized devices are given access, and unauthorized and
unmanaged devices are found and prevented from gaining access.
To achieve and maintain appropriate protection of organizational assets. All assets are
accounted for and have a nominated owner. Owners are identified for all assets and the
responsibility for the maintenance of appropriate controls is assigned.
Expected controls:
a. Deploy an automated asset inventory discovery tool and use it to build a preliminary
inventory of systems connected to an organization’s public and private network(s).
Both active tools that scan through IPv4 or IPv6 network address ranges and passive
tools that identify hosts based on analyzing their traffic should be employed.
b. If the organization is dynamically assigning addresses using DHCP, then deploy
dynamic host configuration protocol (DHCP) server logging, and use this information
to improve the asset inventory and help detect unknown systems.
c. Ensure that all equipment acquisitions automatically update the inventory system as
new, approved devices are connected to the network.
d. Maintain an asset inventory of all systems connected to the network and the network
devices themselves, recording at least the network addresses, machine name(s),
purpose of each system, an asset owner responsible for each device, and the
department associated with each device. The inventory should include every system
that has an Internet protocol (IP) address on the network, including but not limited to
desktops, laptops, servers, network equipment (routers, switches, firewalls, etc.),
printers, storage area networks, Voice Over-IP telephones, multi-homed addresses,
virtual addresses, etc. The asset inventory created must also include data on whether
the device is a portable and/or personal device. Devices such as mobile phones,
tablets, laptops, and other portable electronic devices that store or process data must
be identified, regardless of whether they are attached to the organization’s network.
e. Deploy network level authentication via 802.1x to limit and control which devices can
be connected to the network. The 802.1x must be tied into the inventory data to
determine authorized versus unauthorized systems.
f. Use client certificates to validate and authenticate systems prior to connecting to the
private network.
Actual Controls:
Control Responsible Accountable Consulted Informed
HelpDesk
Software/ Change
Management
software with asset
tracking capability
HelpDesk team/
Change
Management
Software owner
Asset Owner
(Application
Owners, Server
Owners, IT
Admins)
IT Management,
Asset Owner
(Application/Server
Owner), Infosec
team
IT Management
Excel
Spreadsheets
Asset Owner
(Application
Owners, Server
Owners, IT
Admins)
Asset Owner
(Application
Owners, Server
Owners, IT
Admins)
IT Management,
InfoSec team,
CISO
None
Future Controls:
Control Responsible Accountable Consulted Informed
Critical Control 2: Inventory of Authorized and Unauthorized Software
Control Statement: Actively manage (inventory, track, and correct) all software on the network
so that only authorized software is installed and can execute, and that unauthorized and
unmanaged software is found and prevented from installation or execution.
To achieve and maintain appropriate protection of organizational assets.
All assets should be accounted for and have a nominated owner.
Owners should be identified for all assets and the responsibility for the maintenance of
appropriate controls should be assigned.
Expected controls:
a. Devise a list of authorized software and version that is required in the enterprise for each
type of system, including servers, workstations, and laptops of various kinds and uses.
This list should be monitored by file integrity checking tools to validate that the
authorized software has not been modified.
b. Deploy application whitelisting technology that allows systems to run software only if it is
included on the whitelist and prevents execution of all other software on the system. The
whitelist may be very extensive (as is available from commercial whitelist vendors), so
that users are not inconvenienced when using common software. Or, for some special-
purpose systems (which require only a small number of programs to achieve their
needed business functionality), the whitelist may be quite narrow.
c. Deploy software inventory tools throughout the organization covering each of the
operating system types in use, including servers, workstations, and laptops. The
software inventory system should track the version of the underlying operating system
as well as the applications installed on it. The software inventory systems must be tied
into the hardware asset inventory so all devices and associated software are tracked
from a single location.
d. Virtual machines and/or air-gapped systems should be used to isolate and run
applications that are required for business operations but based on higher risk should
not be installed within a networked environment.
e. Expected Controls: County should have software inventory management process
implemented for PCs, Servers, Network and Mobile devices
Actual Controls:
Control Responsible Accountable Consulted Informed
HelpDesk team/
Change
Management
Software owner
Asset Owner
(Application
Owners, Server
Owners, IT
Admins)
IT Management,
Asset Owner
(Application/Server
Owner), Infosec
team
IT Management HelpDesk team/
Change
Management
Software owner
Excel
Spreadsheets
Asset Owner
(Application
Owners, Server
Owners, IT
Admins)
Asset Owner
(Application
Owners, Server
Owners, IT
Admins)
IT Management,
InfoSec team,
CISO
None
Future Controls:
Control Responsible Accountable Consulted Informed
Critical Control 3: Secure Configurations for Hardware and Software.
Control Statement: Establish, implement, and actively manage (track, report on, correct) the
security configuration of laptops, servers, and workstations using a rigorous configuration
management and change control process in order to prevent attackers from exploiting
vulnerable services and settings.
Expected controls:
a. Establish standard secure configurations of your operating systems and software
applications. Standardized images should represent hardened versions of the underlying
operating system and the applications installed on the system. These images should be
validated and refreshed on a regular basis to update their security configuration
considering recent vulnerabilities and attack vectors.
b. Follow strict configuration management, building a secure image that is used to build all
new systems that are deployed in the enterprise. Any existing system that becomes
compromised should be re-imaged with the secure build. Regular updates or exceptions
to this image should be integrated into the organization’s change management
processes. Images should be created for workstations, servers, and other system types
used by the organization.
c. Store the master images on securely configured servers, validated with integrity
checking tools capable of continuous inspection, and change management to ensure
that only authorized changes to the images are possible. Alternatively, these master
images can be stored in offline machines, air-gapped from the production network, with
images copied via secure media to move them between the image storage servers and
the production network.
d. Perform all remote administration of servers, workstation, network devices, and similar
equipment over secure channels. Protocols such as telnet, VNC, RDP, or others that do
not actively support strong encryption should only be used if they are performed over a
secondary encryption channel, such as SSL, TLS or IPSEC.
e. Use file integrity checking tools to ensure that critical system files (including sensitive
system and application executables, libraries, and configurations) have not been altered.
The reporting system should: have the ability to account for routine and expected
changes; highlight and alert on unusual or unexpected alterations; show the history of
configuration changes over time and identify who made the change (including the
original logged-in account in the event of a user ID switch, such as with the su or sudo
command). These integrity checks should identify suspicious system alterations such as:
owner and permissions changes to files or directories; the use of alternate data streams
which could be used to hide malicious activities; and the introduction of extra files into
key system areas (which could indicate malicious payloads left by attackers or additional
files inappropriately added during batch distribution processes).
f. Implement and test an automated configuration monitoring system that verifies all
remotely testable secure configuration elements, and alerts when unauthorized changes
occur. This includes detecting new listening ports, new administrative users, changes to
group and local policy objects (where applicable), and new services running on a
system. Whenever possible use tools compliant with the Security Content Automation
Protocol (SCAP) in order to streamline reporting and integration.
g. Deploy system configuration management tools, such as Active Directory Group Policy
Objects for Microsoft Windows systems or Puppet for UNIX systems that will
automatically enforce and redeploy configuration settings to systems at regularly
scheduled intervals. They should be capable of triggering redeployment of configuration
settings on a scheduled, manual, or event-driven basis.
Total number of relevant configuration discrepancies between sample systems and current
standard OS build.
Actual Controls:
Control Responsible Accountable Consulted Informed
Standard hardened
Configurations
(Gold Images)
IT Admin (Server
Admin)
IT Admin
(Server Admin)
InfoSec, CISO, Asset
Owner (Application/Server
Owner)
IT
Management
Process
Documents,
Checklists
IT Admin (Server
Admin)
IT Admin
(Server Admin)
IT Management, InfoSec
team
None
Guidelines
Documents for
Secure
Configurations for
Hardware and
Software on Mobile
Devices, Laptops,
Workstations, and
Servers
InfoSec team InfoSec team IT Management, Asset
Owner (Application/Server
Owner)
Future Controls:
Control Responsible Accountable Consulted Informed
Critical Control 4: Continuous Vulnerability Assessment and Remediation
Control Statement: Continuously acquire, assess, and act on new information to identify
vulnerabilities, remediate, and minimize the window of opportunity for attackers.
Expected Controls:
a. Run automated vulnerability scanning tools against all systems on the network on a
weekly or more frequent basis and deliver prioritized lists of the most critical
vulnerabilities to each responsible system administrator along with risk scores that
compare the effectiveness of system administrators and departments in reducing risk.
b. Use a Security Content Automation Protocol (SCAP) validated vulnerability scanner that
looks for both code-based vulnerabilities (such as those described by Common
Vulnerabilities and Exposures entries) and configuration-based vulnerabilities (as
enumerated by the Common Configuration Enumeration Project).
c. Correlate event logs with information from vulnerability scans to fulfill two goals. First,
personnel should verify that the activity of the regular vulnerability scanning tools is itself
logged. Second, personnel should be able to correlate attack detection events with prior
vulnerability scanning results to determine whether the given exploit was used against a
target known to be vulnerable.
d. Perform vulnerability scanning in authenticated mode either with agents running locally
on each end system to analyze the security configuration or with remote scanners that
are given administrative rights on the system being tested. Use a dedicated account for
authenticated vulnerability scans, which should not be used for any other administrative
activities and should be tied to specific machines at specific IP addresses. Ensure that
only authorized employees have access to the vulnerability management user interface
and that roles are applied to each user.
e. Subscribe to vulnerability intelligence services to stay aware of emerging exposures, and
use the information gained from this subscription to update the organization’s
vulnerability scanning activities on at least a monthly basis. Alternatively, ensure that
the vulnerability scanning tools you use are regularly updated with all relevant important
security vulnerabilities.
f. Deploy automated patch management tools and software update tools for operating
system and software/applications on all systems for which such tools are available and
safe. Patches should be applied to all systems, even systems that are properly air
gapped.
g. Monitor logs associated with any scanning activity and associated administrator
accounts to ensure that this activity is limited to the timeframes of legitimate scans.
h. Compare the results from back-to-back vulnerability scans to verify that vulnerabilities
were addressed either by patching, implementing a compensating control, or
documenting and accepting a reasonable business risk. Such acceptance of business
risks for existing vulnerabilities should be periodically reviewed to determine if newer
compensating controls or subsequent patches can address vulnerabilities that were
previously accepted, or if conditions have changed, increasing the risk.
i. Establish a process to risk-rate vulnerabilities based on the exploitability and potential
impact of the vulnerability, and segmented by appropriate groups of assets (example,
DMZ servers, internal network servers, desktops, laptops). Apply patches for the riskiest
vulnerabilities first. A phased rollout can be used to minimize the impact to the
organization. Establish expected patching timelines based on the risk rating level.
Actual Controls:
Control Responsible Accountable Consulted Informed
Subscriptions to
vulnerabilities database
like NIST's U.S. National
Vulnerability Database
InfoSec InfoSec CISO IT Management
MS-ISAC Cybersecurity
Advisories
InfoSec InfoSec CISO IT Management
SCAP-validated
vulnerability scanner e.g.
Tenable Security Center
InfoSec InfoSec CISO IT Management
Future Controls:
Control Responsible Accountable Consulted Informed
Critical Control 5: Controlled Use of Administrative Privileges
Control Statement: The processes and tools used to track/control/prevent/correct the use,
assignment, and configuration of administrative privileges on computers, networks, and
applications.
Expected Controls:
a. Minimize administrative privileges and only use administrative accounts when they are
required. Implement focused auditing on the use of administrative privileged functions
and monitor for anomalous behavior.
b. Use automated tools to inventory all administrative accounts and validate that each
person with administrative privileges on desktops, laptops, and servers is authorized by
a senior executive.
c. Before deploying any new devices in a networked environment, change all default
passwords for applications, operating systems, routers, firewalls, wireless access points,
and other systems to have values consistent with administration-level accounts.
d. Configure systems to issue a log entry and alert when an account is added to or
removed from a domain administrators’ group, or when a new local administrator
account is added on a system.
e. Configure systems to issue a log entry and alert on any unsuccessful login to an
administrative account.
f. Use multifactor authentication for all administrative access, including domain
administrative access. Multi-factor authentication can include a variety of techniques, to
include the use of smart cards, certificates, One Time Password (OTP) tokens,
biometrics, or other similar authentication methods.
g. Where multi-factor authentication is not supported, user accounts shall be required to
use long passwords on the system (longer than 14 characters).
h. Administrators should be required to access a system using a fully logged and non-
administrative account. Then, once logged on to the machine without administrative
privileges, the administrator should transition to administrative privileges using tools
such as Sudo on Linux/UNIX, RunAs on Windows, and other similar facilities for other
types of systems.
i. Administrators shall use a dedicated machine for all administrative tasks or tasks
requiring elevated access. This machine shall be isolated from the organization's primary
network and not be allowed Internet access. This machine shall not be used for reading
e-mail, composing documents, or surfing the Internet.
Actual Controls:
Control Responsible Accountable Consulted Informed
Admin Account
cleanup and
procedures to
organize Local
Admin rights
IT Admin (Server
Admin)
Asset Owner
(Application
Owners, Server
Owners, IT
Admins)
InfoSec, CISO
IT Management
Non-AD Accounts
for Admin
functions
IT Admin (Server
Admin)
Asset Owner
(Application
Owners, Server
Owners, IT
Admins)
InfoSec, CISO
IT Management
Admin Account
request process
IT Admin (Server
Admin)
Asset Owner
(Application
Owners, Server
Owners, IT
Admins)
InfoSec, CISO
IT Management
Future Controls:
Control Responsible Accountable Consulted Informed
Critical Control 6: Maintenance, Monitoring, and Analysis of Audit Logs
Control Statement: Collect, manage, and analyze audit logs of events that could help detect,
understand, or recover from an attack.
Expected Controls:
a. Include at least two synchronized time sources from which all servers and network
equipment retrieve time information on a regular basis so that timestamps in logs are
consistent.
b. Validate audit log settings for each hardware device and the software installed on it,
ensuring that logs include a date, timestamp, source addresses, destination addresses,
and various other useful elements of each packet and/or transaction. Systems should
record logs in a standardized format such as syslog entries or those outlined by the
Common Event Expression initiative. If systems cannot generate logs in a standardized
format, log normalization tools can be deployed to convert logs into such a format.
c. Ensure that all systems that store logs have adequate storage space for the logs
generated on a regular basis, so that log files will not fill up between log rotation
intervals. The logs must be archived and digitally signed on a periodic basis.
d. Have security personnel and/or system administrators run biweekly reports that identify
anomalies in logs. They should then actively review the anomalies, documenting their
findings.
e. Configure network boundary devices, including firewalls, network-based IPS, and
inbound and outbound proxies, to verbosely log all traffic (both allowed and blocked)
arriving at the device.
f. Deploy a SIEM (Security Information and Event Management) or log analytic tools for
log aggregation and consolidation from multiple machines and for log correlation and
analysis. Using the SIEM tool, system administrators and security personnel should
devise profiles of common events from given systems so that they can tune detection to
focus on unusual activity, avoid false positives, more rapidly identify anomalies, and
prevent overwhelming analysts with insignificant alerts.
Actual Controls:
Control Responsible Accountable Consulted Informed
Logs maintained
on individual
systems as
requested by the
system owners.
IT Admin (Server,
Network, End-
Point support)
Asset Owner
(Application
Owners, Server
Owners, IT
Admins)
InfoSec team,
CISO
IT Management
Future Controls:
Control Responsible Accountable Consulted Informed
Critical Control 7: Email and Web Browser Protections
Control Statement: Minimize the attack surface and the opportunities for attackers to manipulate
human behavior through their interaction with web browsers and email systems.
Expected Controls:
a. Ensure that only fully supported web browsers and email clients can execute in the
organization, ideally only using the latest version of the browsers provided by the vendor
to take advantage of the latest security functions and fixes.
b. Uninstall or disable any unnecessary or unauthorized browser or email client plugins or
add-on applications. Each plugin shall utilize application / URL whitelisting and only
allow the use of the application for pre-approved domains.
c. Limit the use of unnecessary scripting languages in all web browsers and email clients.
This includes the use of languages such as ActiveX and JavaScript on systems where it
is unnecessary to support such capabilities.
d. Log all URL requests from each of the organization's systems, whether onsite or a
mobile device, to identify potentially malicious activity and assist incident handlers with
identifying potentially compromised systems.
e. Deploy two separate browser configurations to each system. One configuration should
disable the use of all plugins, unnecessary scripting languages, and generally be
configured with limited functionality and be used for general web browsing. The other
configuration shall allow for more browser functionality but should only be used to
access specific websites that require the use of such functionality.
f. The organization shall maintain and enforce network based URL filters that limit a
system's ability to connect to websites not approved by the organization. The
organization shall subscribe to URL categorization services to ensure that they are up-
to-date with the most recent website category definitions available. Uncategorized sites
shall be blocked by default. This filtering shall be enforced for each of the organization's
systems, whether they are physically at an organization's facilities or not.
g. To lower the chance of spoofed e-mail messages, implement the Sender Policy
Framework (SPF) by deploying SPF records in DNS and enabling receiver-side
verification in mail servers.
h. Scan and block all e-mail attachments entering the organization's e-mail gateway if they
contain malicious code or file types that are unnecessary for the organization's business.
This scanning should be done before the e-mail is placed in the user's inbox. This
includes e-mail content filtering and web content filtering.
Actual Controls:
Control Responsible Accountable Consulted Informed
Policy regarding
supported web
browsers and
email clients.
InfoSec
Asset Owner
(Application
Owners, Server
Owners, IT
Admins)
CISO, Asset
Owner (Application
Owners, Server
Owners, IT
Admins), IT
Management
IT Management,
Organization
Process to scan
and block all e-
mail attachments
entering the
organization's e-
mail gateway.
IT Admin (Server
Admin/Email
Infrastructure
Management
team)
IT Admin (Server
Admin/Email
Infrastructure
Management
team)
InfoSec, CISO
IT Management,
Organization
Sender Policy
Framework (SPF)
To lower the
chance of spoofed
e-mail messages
IT Admin (Server
Admin/Email
Infrastructure
Management
team)
IT Admin (Server
Admin/Email
Infrastructure
Management
team)
InfoSec, CISO
IT Management,
Organization
Future Controls:
Control Responsible Accountable Consulted Informed
Critical Control 8: Malware Defenses
Control statement: Control the installation, spread, and execution of malicious code at multiple
points in the enterprise, while optimizing the use of automation to enable rapid updating of
defense, data gathering, and corrective action.
Expected Controls:
a. Employ automated tools to continuously monitor workstations, servers, and mobile
devices with anti-virus, anti-spyware, personal firewalls, and host-based IPS
functionality. All malware detection events should be sent to enterprise anti-malware
administration tools and event log servers.
b. Employ anti-malware software that offers a centralized infrastructure that compiles
information on file reputations or have administrators manually push updates to all
machines. After applying an update, automated systems should verify that each system
has received its signature update.
c. Limit use of external devices to those with an approved, documented business need.
Monitor for use and attempted use of external devices. Configure laptops, workstations,
and servers so that they will not auto-run content from removable media, like USB
tokens (i.e., “thumb drives”), USB hard drives, CDs/DVDs, FireWire devices, external
serial advanced technology attachment devices, and mounted network shares.
Configure systems so that they automatically conduct an anti-malware scan of
removable media when inserted.
d. Enable anti-exploitation features such as Data Execution Prevention (DEP), Address
Space Layout Randomization (ASLR), virtualization/containerization, etc. For increased
protection, deploy capabilities such as Enhanced Mitigation Experience Toolkit (EMET)
that can be configured to apply these protections to a broader set of applications and
executables.
e. Use network-based anti-malware tools to identify executables in all network traffic and
use techniques other than signature-based detection to identify and filter out malicious
content before it arrives at the endpoint.
f. Enable domain name system (DNS) query logging to detect hostname lookup for known
malicious command and control (C2) domains.
Actual Controls:
Control Responsible Accountable Consulted Informed
Antivirus, software
IT Admin
(teams
responsible for
maintenance of
end-point and
servers)
IT Admin (teams
responsible for
maintenance of
end-point and
servers)
Asset Owner
(Application
Owners, Server
Owners, IT
Admins), InfoSec,
CISO
IT Management
Anti-malware
software
IT Admin
(teams
responsible for
maintenance of
end-point and
servers)
IT Admin (teams
responsible for
maintenance of
end-point and
servers)
Asset Owner
(Application
Owners, Server
Owners, IT
Admins), InfoSec,
CISO
IT Management
Future Controls:
Control Responsible Accountable Consulted Informed
Critical Control 9: Limitation and Control of Network Ports
Control statement: Manage (track/control/correct) the ongoing operational use of ports,
protocols, and services on networked devices to minimize windows of vulnerability available to
attackers.
a. Ensure that only ports, protocols, and services with validated business needs are
running on each system.
b. Apply host-based firewalls or port filtering tools on end systems, with a default-deny rule
that drops all traffic except those services and ports that are explicitly allowed.
c. Perform automated port scans on a regular basis against all key servers and compared
to a known effective baseline. If a change that is not listed on the organization’s
approved baseline is discovered, an alert should be generated and reviewed.
d. Verify any server that is visible from the Internet or an untrusted network, and if it is not
required for business purposes, move it to an internal VLAN and give it a private
address.
e. Operate critical services on separate physical or logical host machines, such as DNS,
file, mail, web, and database servers.
f. Place application firewalls in front of any critical servers to verify and validate the traffic
going to the server. Any unauthorized services or traffic should be blocked and an alert
generated.
Actual Controls:
Control Responsible Accountable Consulted Informed
Common network
ports blocked as
part of Server set
up process
IT Admin (Server
Admin)
IT Admin (Server
Admin)
Asset Owners
(Server Owners),
InfoSec, CISO
IT Management
Periodic
Vulnerability Scan,
Vulnerability
review
InfoSec
IT Admin (Server
Admin)
Asset Owners
(Server Owners),
CISO
IT Management
Periodic Quality
Assurance Check
InfoSec
IT Admin (Server
Admin)
Asset Owners
(Server Owners),
CISO
IT Management
Future Controls:
Control Responsible Accountable Consulted Informed
Critical Control 10: Data Recovery Capability
Control statement: The processes and tools used to properly back up critical information with a
proven methodology for timely recovery of it.
Expected controls:
a. Ensure that each system is automatically backed up on at least a weekly basis, and
more often for systems storing sensitive information. To help ensure the ability to rapidly
restore a system from backup, the operating system, application software, and data on a
machine should each be included in the overall backup procedure. These three
components of a system do not have to be included in the same backup file or use the
same backup software. There should be multiple backups over time, so that in the event
of malware infection, restoration can be from a version that is believed to predate the
original infection. All backup policies should be compliant with any regulatory or official
requirements.
b. Test data on backup media on a regular basis by performing a data restoration process
to ensure that the backup is properly working.
c. Ensure that backups are properly protected via physical security or encryption when they
are stored, as well as when they are moved across the network. This includes remote
backups and cloud services.
d. Ensure that key systems have at least one backup destination that is not continuously
addressable through operating system calls. This will mitigate the risk of attacks like
CryptoLocker which seek to encrypt or damage data on all addressable data shares,
including backup destinations.
Actual Controls:
Control Responsible Accountable Consulted Informed
Daily, Weekly,
Monthly Backup
Process
IT Admin (Server
Admin)
IT Admin (Server
Admin)
Asset Owners
(Server Owners),
InfoSec, CISO
IT Management
Scheduled and
Adhoc DR tests
InfoSec
Asset Owners
(Server Owners),
Asset Owners
(Server Owners),
CISO
IT Management
Future Controls:
Control Responsible Accountable Consulted Informed
Critical Control 11: Secure Configurations for Network Devices
Control Statement: Establish, implement, and actively manage (track, report on, correct) the
security configuration of network infrastructure devices using a rigorous configuration
management and change control process to prevent attackers from exploiting vulnerable
services and settings.
Expected Controls:
a. Compare firewall, router, and switch configuration against standard secure
configurations defined for each type of network device in use in the organization. The
security configuration of such devices should be documented, reviewed, and approved
by an organization change control board. Any deviations from the standard configuration
or updates to the standard configuration should be documented and approved in a
change control system.
b. All new configuration rules beyond a baseline-hardened configuration that allow traffic to
flow through network security devices, such as firewalls and network-based IPS, should
be documented and recorded in a configuration management system, with a specific
business reason for each change, a specific individual’s name responsible for that
business need, and an expected duration of the need.
c. Use automated tools to verify standard device configurations and detect changes. All
alterations to such files should be logged and automatically reported to security
personnel.
d. Manage network devices using two-factor authentication and encrypted sessions.
e. Install the latest stable version of any security-related updates on all network devices.
f. Network engineers shall use a dedicated machine for all administrative tasks or tasks
requiring elevated access. This machine shall be isolated from the organization's primary
network and not be allowed Internet access. This machine shall not be used for reading
e-mail, composing documents, or surfing the Internet.
g. Manage the network infrastructure across network connections that are separated from
the business use of that network, relying on separate VLANs or, preferably, on entirely
different physical connectivity for management sessions for network devices.
Actual Controls:
Control Responsible Accountable Consulted Informed
Standard
hardened
Configurations for
Network
Equipment.
IT Admin (Network
Management team)
IT Admin
(Network
Management
team)
InfoSec, CISO
IT Teams, IT
Management
Process
Documents,
Checklists
IT Admin (Network
Management team)
IT Admin
(Network
Management
team)
IT
Management,
InfoSec team
None
Guidelines
Documents for
Secure
Configurations for
Hardware and
Software on
Mobile Devices,
Laptops,
Workstations, and
Servers
InfoSec team InfoSec team
IT Admin
(Network
Management
team), CISO
IT Management
Periodic
Vulnerability
Scan,
Vulnerability
review
InfoSec team
IT Admin
(Network
Management
team)
IT Admin
(Network
Management
team), IT
Management,
CISO
IT Management
Future Controls:
Control Responsible Accountable Consulted Informed
Critical Control 12: Boundary Defense
Control Statement: Detect/prevent/correct the flow of information transferring networks of
different trust levels with a focus on security-damaging data.
Expected Controls:
a. Deny communications with (or limit data flow to) known malicious IP addresses (black
lists), or limit access only to trusted sites (whitelists). Tests can be periodically carried
out by sending packets from bogus source IP addresses (non-routable or otherwise
unused IP addresses) into the network to verify that they are not transmitted through
network perimeters. Lists of bogus addresses are publicly available on the Internet from
various sources, and indicate a series of IP addresses that should not be used for
legitimate traffic traversing the Internet.
b. On DMZ networks, configure monitoring systems (which may be built in to the IDS
sensors or deployed as a separate technology) to record at least packet header
information, and preferably full packet header and payloads of the traffic destined for or
passing through the network border. This traffic should be sent to a properly configured
Security Information Event Management (SIEM) or log analytics system so that events
can be correlated from all devices on the network.
c. Deploy network-based IDS sensors on Internet and extranet DMZ systems and networks
that look for unusual attack mechanisms and detect compromise of these systems.
These network-based IDS sensors may detect attacks using signatures, network
behavior analysis, or other mechanisms to analyze traffic.
d. Network-based IPS devices should be deployed to complement IDS by blocking known
bad signatures or the behavior of potential attacks. As attacks become automated,
methods such as IDS typically delay the amount of time it takes for someone to react to
an attack. A properly configured network-based IPS can provide automation to block
bad traffic. When evaluating network-based IPS products, include those using
techniques other than signature-based detection (such as virtual machine or sandbox-
based approaches) for consideration.
e. Design and implement network perimeters so that all outgoing network traffic to the
Internet must pass through at least one application layer filtering proxy server. The proxy
should support decrypting network traffic, logging individual TCP sessions, blocking
specific URLs, domain names, and IP addresses to implement a black list, and applying
whitelists of allowed sites that can be accessed through the proxy while blocking all
other sites. Organizations should force outbound traffic to the Internet through an
authenticated proxy server on the enterprise perimeter.
f. Require all remote login access (including VPN, dial-up, and other forms of access that
allow login to internal systems) to use two-factor authentication.
g. All enterprise devices remotely logging into the internal network should be managed by
the enterprise, with remote control of their configuration, installed software, and patch
levels. For third-party devices (e.g., subcontractors/vendors), publish minimum security
standards for access to the enterprise network and perform a security scan before
allowing access.
h. Periodically scan for back-channel connections to the Internet that bypass the DMZ,
including unauthorized VPN connections and dual-homed hosts connected to the
enterprise network and to other networks via wireless, dial-up modems, or other
mechanisms.
i. Deploy NetFlow collection and analysis to DMZ network flows to detect anomalous
activity.
j. To help identify covert channels exfiltrating data through a firewall, configure the built-in
firewall session tracking mechanisms included in many commercial firewalls to identify
TCP sessions that last an unusually long time for the given organization and firewall
device, alerting personnel about the source and destination addresses associated with
these long sessions.
Actual Controls:
Control Responsible Accountable Consulted Informed
Firewall,
Proxy,
DMZ
IT Admin (Network
Management
team)
IT Admin (Network
Management
team)
InfoSec, IT Teams,
CISO
IT Management
Intrusion
Prevention System
InfoSec IT Admin (Network
Management
team)
IT Teams, CISO IT Management
Guidelines
Documents for
Secure
Configurations of
Firewall,
IPS,
Proxy,
DMZ
InfoSec team InfoSec team
IT Admin (Network
Management
team), CISO
IT Management
Periodic
Vulnerability Scan,
Vulnerability
review
InfoSec team IT Admin (Network
Management
team)
IT Admin (Network
Management
team), IT
Management,
CISO
IT Management
Future Controls:
Control Responsible Accountable Consulted Informed
Critical Control 13: Data Protection
Control Statement: The processes and tools used to prevent data exfiltration, mitigate the
effects of exfiltrated data, and ensure the privacy and integrity of sensitive information.
Expected Controls:
a. Perform an assessment of data to identify sensitive information that requires the
application of encryption and integrity controls.
b. Deploy approved hard drive encryption software to mobile devices and systems that hold
sensitive data.
c. Deploy an automated tool on network perimeters that monitors for sensitive information
(e.g., personally identifiable information), keywords, and other document characteristics
to discover unauthorized attempts to exfiltrate data across network boundaries and block
such transfers while alerting information security personnel.
d. Conduct periodic scans of server machines using automated tools to determine whether
sensitive data (e.g., personally identifiable information, health, credit card, or classified
information) is present on the system in clear text. These tools, which search for patterns
that indicate the presence of sensitive information, can help identify if a business or
technical process is leaving behind or otherwise leaking sensitive information.
e. If there is no business need for supporting such devices, configure systems so that they
will not write data to USB tokens or USB hard drives. If such devices are required,
enterprise software should be used that can configure systems to allow only specific
USB devices (based on serial number or other unique property) to be accessed, and that
can automatically encrypt all data placed on such devices. An inventory of all authorized
devices must be maintained.
f. Use network-based DLP solutions to monitor and control the flow of data within the
network. Any anomalies that exceed the normal traffic patterns should be noted and
appropriate action taken to address them.
g. Monitor all traffic leaving the organization and detect any unauthorized use of encryption.
Attackers often use an encrypted channel to bypass network security devices.
Therefore, it is essential that organizations can detect rogue connections, terminate the
connection, and remediate the infected system.
h. Block access to known file transfer and e-mail exfiltration websites.
i. Use host-based data loss prevention (DLP) to enforce ACLs even when data is copied
off a server. In most organizations, access to the data is controlled by ACLs that are
implemented on the server. Once the data have been copied to a desktop system, the
ACLs are no longer enforced and the users can send the data to whomever they want.
Actual Controls:
Control Responsible Accountable Consulted Informed
Data Classification
to identify sensitive
data
Asset Owner
(Application/Server
owners)
Asset Owner
(Application/Server
owners)
InfoSec, CISO, IT
Management
IT Management
Hard drive
encryption
software
IT Admin (End-
Point, Server
Admin
Asset Owner
(Application/Server
owners)
InfoSec, CISO,
Asset Owners
IT Management
Network-
based/Endpoint
based DLP
solutions
InfoSec
IT Admin (End-
Point, Network
Admin)
CISO, IT Teams IT Management
Guideline
Document for Data
Protection
InfoSec team InfoSec team
IT Admin (Network
Management
team), CISO
IT Management
Periodic
Vulnerability Scan,
Vulnerability
review of the
Sensitive
systems/processes
InfoSec team
IT Admin (Network
Admin),
Application owners
IT Admin (Network
Admin), IT
Management,
CISO
IT Management
Future Controls:
Control Responsible Accountable Consulted Informed
Critical Control 14: Controlled Access Based on the Need to Know
Control Statement: The processes and tools used to track/control/prevent/correct secure access
to critical assets (e.g., information, resources, systems) according to the formal determination of
which persons, computers, and applications have a need and right to access these critical
assets based on an approved classification.
Expected Controls:
a. Segment the network based on the label or classification level of the information stored
on the servers. Locate all sensitive information on separated VLANS with firewall filtering
to ensure that only authorized individuals are only able to communicate with systems
necessary to fulfill their specific responsibilities.
b. All communication of sensitive information over less-trusted networks should be
encrypted. Whenever information flows over a network with a lower trust level, the
information should be encrypted.
c. All network switches will enable Private Virtual Local Area Networks (VLANs) for
segmented workstation networks to limit the ability of devices on a network to directly
communicate with other devices on the subnet and limit an attacker’s ability to laterally
move to compromise neighboring systems.
d. All information stored on systems shall be protected with file system, network share,
claims, application, or database specific access control lists. These controls will enforce
the principal that only authorized individuals should have access to the information
based on their need to access the information as a part of their responsibilities.
e. Sensitive information stored on systems shall be encrypted at rest and require a
secondary authentication mechanism, not integrated into the operating system, to
access the information.
f. Enforce detailed audit logging for access to nonpublic data and special authentication for
sensitive data.
g. Archived data sets or systems not regularly accessed by the organization shall be
removed from the organization's network. These systems shall only be used as stand-
alone systems (disconnected from the network) by the business unit needing to
occasionally use the system or completely virtualized and powered off until needed.
Actual Controls:
Control Responsible Accountable Consulted Informed
Data Classification
to identify sensitive
data
Asset Owner
(Application
Owners, Server
Owners)
Asset Owner
(Application
Owners, Server
Owners)
InfoSec, CISO, IT
Management
IT Management
Sensitive
information
encrypted at rest
IT Admin (Server,
End Point Support
team)
Asset Owner
(Application
Owners, Server
Owners)
InfoSec, CISO, IT
Management
IT Management
Sensitive
information
encrypted in transit
IT Admin (Network
Management
team)
Asset Owner
(Application
Owners, Server
Owners)
InfoSec, CISO, IT
Management
IT Management
Separate VLANs
or, preferably, on
entirely different
physical
connectivity for
management
IT Admin (Network
Management
team)
IT Admin (Network
Management
team) InfoSec, IT Teams,
CISO
IT Management
sessions for
network devices.
Periodic
Vulnerability Scan,
Vulnerability
review of the
Sensitive
systems/processes
InfoSec team
IT Admin (Network
Management
team) Application
owners
IT Admin (Network
Management
team), IT
Management,
CISO
IT Management
Future Controls:
Control Responsible Accountable Consulted Informed
Critical Control 15: Wireless Access Control
Control statement: Track, control, prevent, and correct the security use of wireless local area
networks (LANS), access points, and wireless client systems.
Expected Controls:
a. Ensure that each wireless device connected to the network matches an authorized
configuration and security profile, with a documented owner of the connection and a
defined business need. Organizations should deny access to those wireless devices that
do not have such a configuration and profile.
b. Configure network vulnerability scanning tools to detect wireless access points
connected to the wired network. Identified devices should be reconciled against a list of
authorized wireless access points. Unauthorized (i.e., rogue) access points should be
deactivated.
c. Use wireless intrusion detection systems (WIDS) to identify rogue wireless devices and
detect attack attempts and successful compromises. In addition to WIDS, all wireless
traffic should be monitored by WIDS as traffic passes into the wired network.
d. Where a specific business need for wireless access has been identified, configure
wireless access on client machines to allow access only to authorized wireless networks.
For devices that do not have an essential wireless business purpose, disable wireless
access in the hardware configuration (basic input/output system or extensible firmware
interface).
e. Ensure that all wireless traffic leverages at least Advanced Encryption Standard (AES
256) encryption used with at least Wi-Fi Protected Access 2 (WPA2) protection.
f. Ensure that wireless networks use authentication protocols such as Extensible
Authentication Protocol-Transport Layer Security (EAP/TLS), which provide credential
protection and mutual authentication.
g. Disable peer-to-peer wireless network capabilities on wireless clients.
h. Disable wireless peripheral access of devices (such as Bluetooth), unless such access is
required for a documented business need.
i. Create separate virtual local area networks (VLANs) for BYOD systems or other
untrusted devices. Internet access from this VLAN should go through at least the same
border as corporate traffic. Enterprise access from this VLAN should be treated as
untrusted, filtered, and audited accordingly.
Actual Controls:
Control Responsible Accountable Consulted Informed
Segmented
network
IT Admin (Network
Management team)
IT Admin
(Network
Management
team)
InfoSec, IT
Teams, CISO
IT Management
Guest network
IT Admin (Network
Management team)
IT Admin
(Network
Management
team)
InfoSec, IT
Teams, CISO
IT Management
Split tunneling
disabled.
IT Admin (Network
Management team)
IT Admin
(Network
Management
team)
InfoSec, IT
Teams, CISO
IT Management
User Agreements
IT Management IT Admin
(Network
Management
team)
InfoSec, IT
Teams, CISO
IT Management
Network
vulnerability
scanning tools to
detect rogue
Wireless devices
on the network
InfoSec
IT Admin
(Network
Management
team)
IT Admin
(Network
Management
team), IT
Management,
CISO
IT Management
Future Controls:
Control Responsible Accountable Consulted Informed
Critical Control 16: Account Monitoring and Control
Control Statement: Actively manage the life cycle of system and application accounts – their
creation, use, dormancy, deletion – to minimize opportunities for attackers to leverage them.
Expected Controls:
a. Review all system accounts and disable any account that cannot be associated with a
business process and owner.
b. Ensure that all accounts have an expiration date that is monitored and enforced.
c. Establish and follow a process for revoking system access by disabling accounts
immediately upon termination of an employee or contractor. Disabling instead of deleting
accounts allows preservation of audit trails.
d. Regularly monitor the use of all accounts, automatically logging off users after a
standard period of inactivity.
e. Configure screen locks on systems to limit access to unattended workstations.
f. Monitor account usage to determine dormant accounts, notifying the user or user’s
manager. Disable such accounts if not needed, or document and monitor exceptions
(e.g., vendor maintenance accounts needed for system recovery or continuity
operations). Require that managers match active employees and contractors with each
account belonging to their managed staff. Security or system administrators should then
disable accounts that are not assigned to valid workforce members.
g. Use and configure account lockouts such that after a set number of failed login attempts
the account is locked for a standard period of time.
h. Monitor attempts to access deactivated accounts through audit logging.
i. Configure access for all accounts through a centralized point of authentication, for
example Active Directory or LDAP. Configure network and security devices for
centralized authentication as well.
j. Profile each user’s typical account usage by determining normal time-of-day access and
access duration. Reports should be generated that indicate users who have logged in
during unusual hours or have exceeded their normal login duration. This includes
flagging the use of the user’s credentials from a computer other than computers on
which the user generally works.
k. Require multi-factor authentication for all user accounts that have access to sensitive
data or systems. Multi-factor authentication can be achieved using smart cards,
certificates, One Time Password (OTP) tokens, or biometrics.
l. Where multi-factor authentication is not supported, user accounts shall be required to
use long passwords on the system (longer than 14 characters).
m. Ensure that all account usernames and authentication credentials are transmitted across
networks using encrypted channels.
n. Verify that all authentication files are encrypted or hashed and that these files cannot be
accessed without root or administrator privileges. Audit all access to password files in
the system.
Actual Controls:
Control Responsible Accountable Consulted Informed
Periodic Account
Review
InfoSec
Asset Owner
(Application
Owners, Server
Owners, IT
Admins)
Asset Owner
(Application
Owners, Server
Owners, IT
Admins)
IT Management
Review User
Lifecycle
Management
System
InfoSec
Asset Owner
(Application
Owners, Server
Owners, IT
Admins)
Asset Owner
(Application
Owners, Server
Owners, IT
Admins)
IT Management
Configure account
lockouts after
failed login
attempts.
IT Admin
(Server/Network/E
nd-Point Admin)
IT Admin
(Server/Network/E
nd-Point Admin)
InfoSec, Asset
Owner (Application
Owners, Server
Owners, IT
Admins), CISO
IT Management
Dual-Factor
accounts for high
privilege accounts.
IT Admin
(Server/Network/E
nd-Point Admin)
IT Admin
(Server/Network/E
nd-Point Admin)
InfoSec, Asset
Owner (Application
Owners, Server
Owners, IT
Admins), CISO
IT Management
Future Controls:
Control Responsible Accountable Consulted Informed
Critical Control 17: Security Skills Assessment and Appropriate Training to Fill Gaps
Control Statement: For all functional roles in the organization (prioritizing those mission-critical
to the business and its security), identify the specific knowledge, skills, and abilities needed to
support defense of the enterprise; develop and execute an integrated plan to assess, identify
gaps, and remediate through policy, organizational planning, training, and awareness programs.
Expected controls:
a. Perform gap analysis to see which skills employees need and which behaviors
employees are not adhering to, using this information to build a baseline training and
awareness roadmap for all employees.
b. Deliver training to fill the skills gap. If possible, use more senior staff to deliver the
training. A second option is to have outside teachers provide training onsite so the
examples used will be directly relevant. If you have small numbers of people to train, use
training conferences or online training to fill the gaps.
c. Implement a security awareness program that:
i. focuses only on the methods commonly used in intrusions that can be blocked
through individual action,
ii. is delivered in short online modules convenient for employees,
iii. is updated frequently (at least annually) to represent the latest attack techniques,
iv. is mandated for completion by all employees at least annually, and
v. is reliably monitored for employee completion.
d. Validate and improve awareness levels through periodic tests to see whether employees
will click on a link from suspicious e-mail or provide sensitive information on the
telephone without following appropriate procedures for authenticating a caller; targeted
training should be provided to those who fall victim to the exercise.
e. Use security skills assessments for each of the mission-critical roles to identify skills
gaps. Use hands-on, real-world examples to measure mastery. If you do not have such
assessments, use one of the available online competitions that simulate real-world
scenarios for each of the identified jobs to measure skills mastery.
Actual Controls:
Control Responsible Accountable Consulted Informed
Ad Hoc Security
training requests
by team members
Asset Owners Asset Owners InfoSec, CISO IT Management
InfoSec Team
Training
InfoSec team InfoSec team IT Management Organization
Future Control:
Control Responsible Accountable Consulted Informed
Critical Control 18: Application Software Security
Control Statement: Manage the security life cycle of all in-house developed and acquired
software to prevent, detect, and correct security weaknesses.
Expected Controls:
a. For all acquired application software, check that the version you are using is still
supported by the vendor. If not, update to the most current version and install all relevant
patches and vendor security recommendations.
b. Protect web applications by deploying web application firewalls (WAFs) that inspect all
traffic flowing to the web application for common web application attacks, including but
not limited to cross-site scripting, SQL injection, command injection, and directory
traversal attacks. For applications that are not web-based, specific application firewalls
should be deployed if such tools are available for the given application type. If the traffic
is encrypted, the device should either sit behind the encryption or can decrypt the traffic
prior to analysis. If neither option is appropriate, a host-based web application firewall
should be deployed.
c. For in-house developed software, ensure that explicit error checking is performed and
documented for all input, including for size, data type, and acceptable ranges or formats.
d. Test in-house-developed and third-party-procured web applications for common security
weaknesses using automated remote web application scanners prior to deployment,
whenever updates are made to the application, and on a regular recurring basis. Input
validation and output encoding routines of application software should be reviewed and
tested.
e. Do not display system error messages to end-users (output sanitization).
f. Maintain separate environments for production and nonproduction systems. Developers
should not typically have unmonitored access to production environments.
g. For applications that rely on a database, use standard hardening configuration
templates. All systems that are part of critical business processes should also be tested.
h. Ensure that all software development personnel receive training in writing secure code
for their specific development environment.
i. For in-house developed applications, ensure that development artifacts (sample data
and scripts; unused libraries, components, debug code; or tools) are not included in the
deployed software, or accessible in the production environment.
Actual Controls:
Control Responsible Accountable Consulted Informed
Web Application
Firewall
InfoSec
Asset Owner
(Application)
owner
Asset Owner
(Application
Owner), CISO IT
Management
IT Management
Security Scans Infosec
Asset Owner
(Application)
owner
IT Supervisors/
Managers
IT Management
Developer
Standards /Secure
Application
Development
Guidelines
Asset Owner
(Application)
owner/team
Asset Owner
(Application)
owner/team
IT Management,
CISO
IT Management
Future Controls
Control Responsible Accountable Consulted Informed
Critical Control 19: Incident Response and Management
Control Statement: Protect the organization’s information, as well as its reputation, by
developing and implementing an incident response infrastructure (e.g., plans, defined roles,
training, communications, management oversight) for quickly discovering an attack and then
effectively containing the damage, eradicating the attacker’s presence, and restoring the
integrity of the network and systems.
Expected Controls:
a. Ensure that there are written incident response procedures that include a definition of
personnel roles for handling incidents. The procedures should define the phases of
incident handling.
b. Assign job titles and duties for handling computer and network incidents to specific
individuals.
c. Define management personnel who will support the incident handling process by acting
in key decision-making roles.
d. Devise organization-wide standards for the time required for system administrators and
other personnel to report anomalous events to the incident handling team, the
mechanisms for such reporting, and the kind of information that should be included in
the incident notification. This reporting should also include notifying the appropriate
Community Emergency Response Team in accordance with all legal or regulatory
requirements for involving that organization in computer incidents.
e. Assemble and maintain information on third-party contact information to be used to
report a security incident (e.g., maintain an e-mail address of security@organization.com
or have a web page http://organization.com/security).
f. Publish information for all personnel, including employees and contractors, regarding
reporting computer anomalies and incidents to the incident handling team. Such
information should be included in routine employee awareness activities.
g. Conduct periodic incident scenario sessions for personnel associated with the incident
handling team to ensure that they understand current threats and risks, as well as their
responsibilities in supporting the incident handling team.
Actual Controls:
Control Responsible Accountable Consulted Informed
Incident Response
Plan, and Security
Incidents
Reporting
Template
Asset Owners
(Application, IT
Admins)
InfoSec (to
investigate,
resolve, review
incident
management)
IT teams, IT
Management,
IT Management,
and Other
Stakeholders in
the Organization.
Disaster Recovery
Plan
Asset Owners
(Application, IT
Admins)
IT Asset Owners
(Application,
System Admins)
InfoSec, CISO
IT Management,
and Other
Stakeholders in
the Organization.
Periodic testing InfoSec/ CISO
IT Asset Owners
(Application,
System Admins)
IT Asset Owners,
IT Management
IT Management
Future Controls:
Control Responsible Accountable Consulted Informed
Critical Control 20: Penetration Tests and Red Team Exercises
Control Statement: Test the overall strength of an organization’s defenses (the technology, the
processes, and the people) by simulating the objectives and actions of an attacker.
Expected Controls:
a. Conduct regular external and internal penetration tests to identify vulnerabilities and
attack vectors that can be used to exploit enterprise systems successfully. Penetration
testing should occur from outside the network perimeter (i.e., the Internet or wireless
frequencies around an organization) as well as from within its boundaries (i.e., on the
internal network) to simulate both outsider and insider attacks.
b. Any user or system accounts used to perform penetration testing should be controlled
and monitored to make sure they are only being used for legitimate purposes, and are
removed or restored to normal function after testing is over.
c. Perform periodic Red Team exercises to test organizational readiness to identify and
stop attacks or to respond quickly and effectively.
d. Include tests for the presence of unprotected system information and artifacts that would
be useful to attackers, including network diagrams, configuration files, older penetration
test reports, e-mails or documents containing passwords or other information critical to
system operation.
e. Plan clear goals of the penetration test itself with blended attacks in mind, identifying the
goal machine or target asset. Many APT-style attacks deploy multiple vectors—often
social engineering combined with web or network exploitation. Red Team manual or
automated testing that captures pivoted and multi-vector attacks offers a more realistic
assessment of security posture and risk to critical assets.
f. Use vulnerability scanning and penetration testing tools in concert. The results of
vulnerability scanning assessments should be used as a starting point to guide and
focus penetration-testing efforts.
g. Wherever possible, ensure that Red Teams results are documented using open,
machine-readable standards (e.g., SCAP). Devise a scoring method for determining the
results of Red Team exercises so that results can be compared over time.
h. Create a test bed that mimics a production environment for specific penetration tests and
Red Team attacks against elements that are not typically tested in production, such as
attacks against supervisory control and data acquisition and other control systems.
Actual Controls:
Control Responsible Accountable Consulted Informed
Penetration Tests InfoSec
Asset (Application)
owner
CISO, IT
Management
IT Management
Future Controls:
Control Responsible Accountable Consulted Informed
6. CONTROL CATEGORY:ISO CONTROLS
ISO Control: Define Scope
Control Statement: The process of prioritizing the protection requirements for the organization,
based on business impact, should give organization a good measure of the critical IT processes
requiring to establish a good Information Security Program. Describing these processes will
define the scope for Program for the organization.
Scope of the Information Security Management (ISMS) program depends on the identifying the
security requirements. There are three main sources of security requirements.
a. One source is derived from assessing risks to the organization, considering the
organization’s overall business strategy and objectives. Through a risk assessment,
threats to assets are identified, vulnerability to and likelihood of occurrence is evaluated
and potential impact is estimated.
b. Another source is the legal, statutory, regulatory, and contractual requirements that an
organization, its trading partners, contractors, and service providers must satisfy, and
their socio-cultural environment.
c. A further source is the set of principles, objectives and business requirements for
information processing that an organization has developed to support its operations.
Actual Controls:
Control Responsible Accountable Consulted Informed
ISMS Scope
Document
CISO CISO IT Management
IT Organization,
Organization’s
Senior
Management
Future Controls:
Control Responsible Accountable Consulted Informed
ISO Control: Setup the Information Security Team and Approach
Control Statement: To establish a Security Organization necessary to ensure organization’s
involvement in identifying and implementing various security measures.
A dedicated security team of multiple experienced and certified individuals exists with
management commitment and led by chief information security officer.
Expected Controls:
A security organization consisting of the following:
a. Security Steering Committee headed by the Chief Information Security Officer (CISO)
and including representative technology departments.
b. Dedicated CISO heading security organization. Typical responsibilities for CISO will be:
i. To chair the Security Steering committee meetings.
ii. To serve as liaison to the Steering committee and IT Organization.
iii. To coordinate the ongoing development and maintenance of information security.
iv. To act as a single point of contact for the functional departments for reviewing
their business requirements from a security perspective.
v. To monitor compliance and periodically review violations. And
vi. Organizing Information security awareness campaign for personnel to enhance
the security culture and develop a broad understanding of the requirements of
Information Security Program in the Organization.
c. Dedicated Information Security team with following responsibilities:
i. Defining technical and non-technical information security standards, procedures
and guidelines;
ii. Supporting Information Asset Owners in the definition and implementation of
controls, processes and supporting tools to comply with the policy manual and
manage information security risks;
iii. Reviewing and monitoring compliance with relevant security policy statements
and contributing to Internal Audit and External Audit processes;
iv. Collecting, analyzing and commenting on information security metrics and
incidents;
v. Supporting Information Asset Owners in the investigation and remediation of
information security incidents or other policy violations;
vi. Liaising as necessary with related internal functions such as IT Operations, IT
teams, Customer Departments and external functions such as the Police when
appropriate;
d. Information Asset Owners identified. Information Asset Owners are managers held
accountable for the protection of Information Assets by their team. Information Asset
Owners may delegate information security tasks to managers or other individuals but
remain accountable for proper implementation of the tasks. Information Asset Owners
are responsible for:
i. Appropriate classification and protection of the information assets;
ii. Specifying and funding suitable protective controls;
iii. Authorizing access to information assets in accordance with the classification
and business needs;
iv. For new application system developments: Undertaking or commissioning
information security risk assessments to ensure that the information security
requirements are properly defined and documented during the early stages of
development;
v. Ensuring timely completion of regular system/data access reviews; and
vi. Monitoring compliance with protection requirements affecting their assets.
Actual Controls:
Control Responsible Accountable Consulted Informed
IT Security
Steering
IT Management CISO IT Management Organization
Dedicated IT
Security Team
IT Management CISO IT Management IT Organization
IT Asset Owners
identified
IT Management IT Management CISO IT Organization
Future Controls:
Control Responsible Accountable Consulted Informed
ISO Control: Communicate Information Security Policy
Control Statement: Information security policy is an aggregate of directives, rules, and practices
that prescribes how an organization manages, protects, and distributes information.
Information security policy is an essential component of information security governance—
without the policy, governance has no substance and rules to enforce. Information security
policy should be based on a combination of appropriate legislations (such as CJIS, HIPAA),
applicable standards (such as PCI DSS, ISO 27001 etc.), and organization’s business and
security requirements.
Organization’s information security policy should address the fundamentals of organization’s
information security governance structure, including:
a. Information security roles and responsibilities;
b. Statement of security controls baseline and rules for exceeding the baseline; and
c. Rules of behavior that Organization’s users are expected to follow and minimum
repercussions for noncompliance.
Actual Controls:
Control Responsible Accountable Consulted Informed
CySAFE
Framework
InfoSec CISO IT Management
IT Organization,
Organization’s
Senior
Management.
Written Information
Security Program
InfoSec CISO IT Management IT Organization
Future Controls:
Control Responsible Accountable Consulted Informed
ISO Control: Identify Resources, Ownership and Standard Operating Procedures for IT
Processes
Control Statement: All information and assets associated with information processing facilities
should be owned by a designated part of the organization. To ensure the correct and secure
operation of information processing facilities, the responsibilities and procedures for the
management and operation of all information processing facilities should be established. This
includes the development of appropriate operating procedures. Segregation of duties should be
implemented, where appropriate, to reduce the risk of negligent or deliberate system misuse.
Expected Controls:
a. Owners should be identified for the IT Processes, and the owner should be responsible
for:
i. Ensuring that information and assets associated for their IT Process are
appropriately classified;
ii. Defining and periodically reviewing access restrictions and classifications,
considering applicable access control policies;
b. Operating procedures should be documented, maintained, and made available to all
authorized users. Documented procedures should be prepared for system activities
associated with the IT Processes. Documented procedures should be maintained for
system activities associated with IT Process. Some examples are System start,
shutdown, backup, equipment maintenance, media handling etc.
c. Changes to IT Processes and associated systems should be controlled. The following
items should be considered:
i. Identification and recording of significant changes;
ii. Planning and testing of changes;
iii. Assessment of the potential impacts, including security impacts, of such
changes;
iv. Formal approval procedure for proposed changes;
v. Communication of change details to authorized stakeholders;
vi. Rollback procedures, including procedures and responsibilities for aborting and
recovering from unsuccessful changes and unforeseen events.
d. Segregation of duties: Duties and areas of responsibility should be segregated to reduce
opportunities for unauthorized or unintentional modification or misuse of the
organization’s assets. Care should be taken that no single person can access, modify or
use assets without authorization or detection. The initiation of an event should be
separated from its authorization. The possibility of collusion should be considered in
designing the controls.
e. Development, test, and operational facilities should be separated to reduce the risks of
unauthorized access or changes to the operational system.
Actual Controls:
Control Responsible Accountable Consulted Informed
IT Asset Owners
identified
IT Management IT Management CISO IT Organization
Operating
procedures
Document
Asset Owner
(Application
Owners, IT
Admins)
Asset Owner
(Application
Owners, IT
Admins)
InfoSec, CISO, IT
Management
IT Management
Development, test,
and operational
facilities are
separated to
reduce the risks of
Asset Owner
(Application
Owners, IT
Admins)
Asset Owner
(Application
Owners, IT
Admins)
InfoSec, CISO, IT
Management
IT Management
unauthorized
access or changes
to the operational
system.
Future Controls:
Control Responsible Accountable Consulted Informed
ISO Control: Monitoring and review of third party services
Control Statement: The services, reports and records provided by the third party should be
regularly monitored and reviewed, and audits should be carried out regularly.
Expected Controls:
a. Information security terms and conditions are included in the agreements (Contracts,
SOW) with the third-party service providers.
b. Information security terms and conditions in the agreements are being adhered to by the
service providers.
c. The organization maintains sufficient overall control and visibility into all security aspects
for sensitive or critical information or information processing facilities accessed,
processed or managed by the third-party service providers.
Actual Controls:
Control Responsible Accountable Consulted Informed
Information
security terms and
conditions are
included in the
vendor
agreements
Asset Owner
(Application
Owners, IT
Admins)
Asset Owner
(Application
Owners, IT
Admins)
CISO, IT
Management,
Legal Department
IT Management
Future Controls:
Control Responsible Accountable Consulted Informed
ISO Control: Complete Summary of Controls
Control Statement: IT Asset/Process owners should develop detailed list of all the controls that
have been selected for the IT Asset/Process they are responsible for. List of controls should be
backed up by risk assessment.
List of controls backed by risk assessment will provide strategic and tactical direction to the
Organization.
Expected Controls:
a. Inventory of IT Processes and assets in the organization.
b. Risk Assessment process for documenting risks, vulnerabilities, risk treatment plan, list
of controls implemented to mitigate the risk, and action plan for implementing additional
controls as needed.
c. List of recommended controls. This list can be developed by the Organization by
studying regulatory, business, contractual requirements. Organization can use ISO
27001, NIST 800-53, and other relevant control frameworks as a reference to determine
controls to be used for protecting organization’s information assets.
Actual Controls:
Control Responsible Accountable Consulted Informed
List of Security
Controls for the IT
Process/Asset
Asset Owner
(Application
Owners, IT
Admins)
Asset Owner
(Application
Owners, IT
Admins)
CISO, IT
Management,
Legal Department
IT Management
Future Controls:
Control Responsible Accountable Consulted Informed
ISO Control: Define and Generate Records (evidence)
Control Statement: Organization (IT Process Owner) has a list of records to provide evidence of
conformity to requirements and the effective operation of the ISMS and controls, including the
protection requirements been defined and maintained.
Expected Controls:
a. Record of evidence based on the Control Category: Strategy/Scope,
Planning/Design/Configuration, Operations, Monitoring/Metrics, and
Response/Recovery.
b. The Individual/team that is responsible/accountable for a control discussed in this
document must ensure maintaining appropriate record/evidence to demonstrate the
operational effectiveness of the control.
c. The records can be useful for internal/external audits, reference document for process
improvement, as a forensic evidence in investigating a breach.
Actual Controls:
Control Responsible Accountable Consulted Informed
Information
Strategy/Scope
IT Management IT Management CISO IT Organization
Operating
procedures
Document
Asset Owner
(Application
Owners, IT
Admins)
Asset Owner
(Application
Owners, IT
Admins)
InfoSec, CISO, IT
Management
IT Management
Future Controls:
Control Responsible Accountable Consulted Informed
ISO Control: Physical and Environmental Security
Control Statement: Critical or sensitive information-processing facilities physically protected
from unauthorized access, damage, interference, and environmental threats.
Expected Controls:
a. Physical entry controls, securing offices, rooms, and facilities. Physical protection and
guidelines for working in secure areas. Public access, delivery, and loading areas are
controlled.
b. Physical protection against damage from fire, flood, earthquake, explosion, civil unrest,
and other forms of natural or man-made disaster should be designed and applied.
Actual Controls:
Control Responsible Accountable Consulted Informed
Well defined
Security
Perimeters, Site
IT Management IT Management
CISO, Legal
Department
Organization
Perimeters are
physically sound,
Manned reception
area, Intruder
detection systems.
Only Authorized
personnel can
access the
facilities.
IT Management IT Management
CISO, Legal
Department
Organization
Future Controls:
Control Responsible Accountable Consulted Informed
ISO Control: Measure Effectiveness of Controls
Control Statement: Organization has implemented process to measure the effectiveness of
security controls.
Expected Controls:
a. Organization has adopted a framework like CySAFE to assess, understand and prioritize
their basic IT security needs.
b. Organization has procedures to Monitor, measure, analyze and evaluate the IT Security
controls.
Actual Controls:
Control Responsible Accountable Consulted Informed
Periodic
Management
Reports – e.g.
CySAFE Score
CISO CISO InfoSec, IT Teams IT Management
Metrics to evaluate
effectiveness of
security devices
InfoSec InfoSec IT Teams, CISO CISO
Security Metrics
Scope and
Processes
InfoSec InfoSec CISO IT Management
Future Controls:
Control Responsible Accountable Consulted Informed
ISO Control: Update Annual Planning
Control Statement: Organization must include IT Security in the Annual planning.
Expected Controls:
a. IT security is included in the capital planning and enterprise architecture processes.
b. Organization conducts annual IT security reviews of all programs and systems.
c. Organization uses the findings from IT Security review to improve the current IT Security
controls, and introduce new IT Security controls as needed.
d. IT management should require that all requests for technology solution expenditures
include technology risk identification and risk mitigation requirements as part of the cost
benefit analysis, project objectives, deliverables and funding request.
e. Organization has an information security strategy that is aligned with the Organization’s
risk management and corporate governance requirements should be developed and
implemented.
Actual Controls:
Control Responsible Accountable Consulted Informed
Master Plan Sizing InfoSec CISO
IT Management, IT
Teams
IT Management
Future Controls:
Control Responsible Accountable Consulted Informed
ISO Control: Compliance
Control Statement: Organization has defined, documented and kept up to date all relevant
statutory, regulatory, and contractual requirements and the organization’s approach to meet
these requirements for each information system and the organization. Organization has focus
on compliance with security policies and standards, and technical compliance.
Expected Controls:
a. Applicable legislations and compliance requirements are identified. The specific controls
and individual responsibilities to meet these requirements should be similarly defined
and documented.
b. Intellectual property rights (IPR), appropriate procedures are implemented to ensure
compliance with legislative, regulatory, and contractual requirements on the use of
material in respect of which there may be intellectual property rights and on the use of
proprietary software products.
c. Compliance with organization's security policies and standards - security procedures are
identified. Responsibilities are defined and documented.
d. Technical compliance checking - Information systems are regularly checked for
compliance with security implementation standards.
Actual Controls:
Control Responsible Accountable Consulted Informed
Identify
Compliance
requirements
(HIPAA, PCI,
CJIS)
IT Management IT Management
CISO, Legal
Department
Organization
Management
prioritizes
compliance
requirement
IT Management IT Management
CISO Organization
RACI for
compliance
programs
IT Management IT Management
CISO
Organization’s
Senior
Management
Annual review of
internal and
external
compliance
requirements.
CISO IT Management IT Organization
Organization’s
Senior
Management
Future Controls:
Control Responsible Accountable Consulted Informed
7. CONTROL CATEGORY:NIST CONTROLS
NIST Control: Business Environment
Control Statement: The organization’s mission, objectives, stakeholders, and activities are
understood and prioritized; this information is used to inform Information Security roles,
responsibilities, and risk management decisions.
Expected Controls:
a. Priorities for organizational mission, objectives, and activities are established and
communicated.
b. The IT function has identified and communicated its role in delivering the organization’s
overall business strategy and objectives.
c. The IT function has identified and communicated principles, objectives and business
requirements for information processing that an organization has developed to support
its operations.
d. The IT Function has established the dependencies and critical functions for delivery of
critical services to support its operations.
e. The IT Function has established the resilience requirements to support delivery of critical
services.
Actual Controls:
Control Responsible Accountable Consulted Informed
CIO, CISO
communication
with Business
Units
CISO/CIO CISO/CIO IT Management
Organization’s
Senior
Management
IT Organization
Mission statement
IT Management IT Management
IT Management,
CISO,
Organization’s
Senior
Management
Organization’s
Senior
Management
Future Controls:
Control Responsible Accountable Consulted Informed
NIST Control: Governance
Control Statement: The policies, procedures, and processes to manage and monitor the
organization’s regulatory, legal, risk, environmental, and operational requirements are
understood and inform the management of cybersecurity risk.
Expected Controls:
a. Organizational information security policy is established.
b. Information security roles & responsibilities are coordinated and aligned with internal
roles and external partners.
c. Legal and regulatory requirements regarding cybersecurity, including privacy and civil
liberties obligations, are understood and managed.
d. Governance and risk management processes address cybersecurity risks.
Actual Controls:
Control Responsible Accountable Consulted Informed
Information
Security Policy
CISO IT Management
IT Management,
Organization’s
Senior
Management
Organization
Future Controls:
Control Responsible Accountable Consulted Informed
NIST Control: Risk Management Strategy
Control Statement: The organization’s priorities, constraints, risk tolerances, and assumptions
are established and used to support operational risk decisions.
Expected Controls:
a. Asset vulnerabilities are identified and documented.
b. Threat and vulnerability information is received from information sharing forums and
sources.
c. Threats, both internal and external, are identified and documented.
d. Potential business impacts and likelihoods are identified.
e. Threats, vulnerabilities, likelihoods, and impacts are used to determine risk.
f. Risk responses are identified and prioritized.
Actual Controls:
Control Responsible Accountable Consulted Informed
Ongoing
communications to
the organization
about
cybersecurity risks
and rationale for
investment in
cybersecurity tools.
CISO IT Management
IT Management,
Organization’s
Senior
Management
Organization’s
Senior
Management
Information
Security Policy
CISO IT Management
IT Management,
Organization’s
Senior
Management
Organization
Data classification
to identify sensitive
data
Asset Owner
(Application,
Server Owner)
Asset Owner
(Application,
Server Owner)
InfoSec, CISO, IT
Management
IT Management
Risk Registers
Asset Owner
(Application,
Server Owner)
Asset Owner
(Application,
Server Owner)
InfoSec, CISO, IT
Management
IT Management
Future Controls:
Control Responsible Accountable Consulted Informed
NIST Control: Maintenance
Control Statement: Maintenance and repairs of the information system components is
performed consistent with policies and procedures.
Expected Controls:
a. Maintenance and repair of organizational assets is performed and logged in a timely
manner, with approved and controlled tools.
b. Remote maintenance of organizational assets is approved, logged, and performed in a
manner that prevents unauthorized access.
Actual Controls:
Control Responsible Accountable Consulted Informed
Operating
procedures are
documented,
maintained for the
Information System
Admins.
Asset Owner
(Application
Owners, IT
Admins)
Asset Owner
(Application
Owners, IT
Admins)
InfoSec, CISO, IT
Management
IT Management
Responsibilities the
management and
operation of all
information
processing
facilities are
established.
Asset Owner
(Application
Owners, IT
Admins)
Asset Owner
(Application
Owners, IT
Admins)
InfoSec, CISO, IT
Management
IT Management
Changes to
information
processing
facilities and
systems are
controlled.
Asset Owner
(Application
Owners, IT
Admins)
Asset Owner
(Application
Owners, IT
Admins)
InfoSec, CISO, IT
Management
IT Management
Development, test,
and operational
facilities are
separated to
reduce the risks of
unauthorized
access or changes
to the operational
system.
Asset Owner
(Application
Owners, IT
Admins)
Asset Owner
(Application
Owners, IT
Admins)
InfoSec, CISO, IT
Management
IT Management
Hardware/Software
upgrades/patches
are applied
to remove or
reduce security
weaknesses as
needed.
IT Admin (End-
Point, Server,
Network Admin)
Asset Owner
(Application
Owners, IT
Admins)
InfoSec, CISO, IT
Management
IT Management
Future Controls:
Control Responsible Accountable Consulted Informed
APPENDIX A: RACI MATRIX
https://www.networkpaladin.org/single-post/2019/01/30/What-is-RACI-and-Why-You-should-Care

Contenu connexe

Similaire à Cy safe 2.0_workbook

IIA NL IAF.combining functions
IIA NL IAF.combining functionsIIA NL IAF.combining functions
IIA NL IAF.combining functions
Michel Kee
 
Protectingspecialaccessprograminformationwithininformationsystemsfouo 1207161...
Protectingspecialaccessprograminformationwithininformationsystemsfouo 1207161...Protectingspecialaccessprograminformationwithininformationsystemsfouo 1207161...
Protectingspecialaccessprograminformationwithininformationsystemsfouo 1207161...
dr. Roberto Polastro
 
SOX Section 404 A Guide for Management
SOX Section 404  A Guide for ManagementSOX Section 404  A Guide for Management
SOX Section 404 A Guide for Management
Mahmoud Elbagoury
 
chemsec_cfats_riskbased_performance_standards
chemsec_cfats_riskbased_performance_standardschemsec_cfats_riskbased_performance_standards
chemsec_cfats_riskbased_performance_standards
Mike Pobjoy
 
Information security
Information securityInformation security
Information security
Hai Nguyen
 
Cyber+Capability+Toolkit+-+Cyber+Incident+Response+-+Cyber+Incident+Response+...
Cyber+Capability+Toolkit+-+Cyber+Incident+Response+-+Cyber+Incident+Response+...Cyber+Capability+Toolkit+-+Cyber+Incident+Response+-+Cyber+Incident+Response+...
Cyber+Capability+Toolkit+-+Cyber+Incident+Response+-+Cyber+Incident+Response+...
MaoTseTungBritoSilva1
 
Complex queries in_business_objects
Complex queries in_business_objectsComplex queries in_business_objects
Complex queries in_business_objects
cmcmm
 
U.S. Government Protection Profile Web Server For Basic ...
U.S. Government Protection Profile Web Server For Basic ...U.S. Government Protection Profile Web Server For Basic ...
U.S. Government Protection Profile Web Server For Basic ...
webhostingguy
 
Oracle Web Conferencing - Release 2.0.4
Oracle Web Conferencing - Release 2.0.4Oracle Web Conferencing - Release 2.0.4
Oracle Web Conferencing - Release 2.0.4
Mehul Sanghavi
 
AppSec Quick Start Guide 011215-2 (1)
AppSec Quick Start Guide 011215-2 (1)AppSec Quick Start Guide 011215-2 (1)
AppSec Quick Start Guide 011215-2 (1)
Bilha Diaz
 

Similaire à Cy safe 2.0_workbook (20)

IIA NL IAF.combining functions
IIA NL IAF.combining functionsIIA NL IAF.combining functions
IIA NL IAF.combining functions
 
Protectingspecialaccessprograminformationwithininformationsystemsfouo 1207161...
Protectingspecialaccessprograminformationwithininformationsystemsfouo 1207161...Protectingspecialaccessprograminformationwithininformationsystemsfouo 1207161...
Protectingspecialaccessprograminformationwithininformationsystemsfouo 1207161...
 
SOX Section 404 A Guide for Management
SOX Section 404  A Guide for ManagementSOX Section 404  A Guide for Management
SOX Section 404 A Guide for Management
 
chemsec_cfats_riskbased_performance_standards
chemsec_cfats_riskbased_performance_standardschemsec_cfats_riskbased_performance_standards
chemsec_cfats_riskbased_performance_standards
 
Satellite Imaging for Agriculture Market.pdf
Satellite Imaging for Agriculture Market.pdfSatellite Imaging for Agriculture Market.pdf
Satellite Imaging for Agriculture Market.pdf
 
Repsol 2014: Corporate Responsibility Report
Repsol 2014: Corporate Responsibility ReportRepsol 2014: Corporate Responsibility Report
Repsol 2014: Corporate Responsibility Report
 
ISO 14001 Implementation Guide for Environmental Management Systems (EMS)
ISO 14001 Implementation Guide for Environmental Management Systems (EMS)ISO 14001 Implementation Guide for Environmental Management Systems (EMS)
ISO 14001 Implementation Guide for Environmental Management Systems (EMS)
 
Vss wht paper sustainable sox c ompliance made easy
Vss wht paper sustainable sox c ompliance made easyVss wht paper sustainable sox c ompliance made easy
Vss wht paper sustainable sox c ompliance made easy
 
Information security
Information securityInformation security
Information security
 
Cyber+Capability+Toolkit+-+Cyber+Incident+Response+-+Cyber+Incident+Response+...
Cyber+Capability+Toolkit+-+Cyber+Incident+Response+-+Cyber+Incident+Response+...Cyber+Capability+Toolkit+-+Cyber+Incident+Response+-+Cyber+Incident+Response+...
Cyber+Capability+Toolkit+-+Cyber+Incident+Response+-+Cyber+Incident+Response+...
 
Inventory_user_guide.pdf
Inventory_user_guide.pdfInventory_user_guide.pdf
Inventory_user_guide.pdf
 
Role Based Access Control - Overview
Role Based Access Control - OverviewRole Based Access Control - Overview
Role Based Access Control - Overview
 
Complex queries in_business_objects
Complex queries in_business_objectsComplex queries in_business_objects
Complex queries in_business_objects
 
U.S. Government Protection Profile Web Server For Basic ...
U.S. Government Protection Profile Web Server For Basic ...U.S. Government Protection Profile Web Server For Basic ...
U.S. Government Protection Profile Web Server For Basic ...
 
White Paper Guide For Developing Security Plans
White Paper Guide For Developing Security PlansWhite Paper Guide For Developing Security Plans
White Paper Guide For Developing Security Plans
 
A Human Factors Perspective on Alarm System Research & Development 2000 to 2010
A Human Factors Perspective on Alarm System Research & Development 2000 to 2010A Human Factors Perspective on Alarm System Research & Development 2000 to 2010
A Human Factors Perspective on Alarm System Research & Development 2000 to 2010
 
Oracle Web Conferencing - Release 2.0.4
Oracle Web Conferencing - Release 2.0.4Oracle Web Conferencing - Release 2.0.4
Oracle Web Conferencing - Release 2.0.4
 
Wm4 0 userguideissue3
Wm4 0 userguideissue3Wm4 0 userguideissue3
Wm4 0 userguideissue3
 
AppSec Quick Start Guide 011215-2 (1)
AppSec Quick Start Guide 011215-2 (1)AppSec Quick Start Guide 011215-2 (1)
AppSec Quick Start Guide 011215-2 (1)
 
Shalam g+3 01
Shalam g+3 01Shalam g+3 01
Shalam g+3 01
 

Plus de Ernest Staats

Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
Ernest Staats
 

Plus de Ernest Staats (20)

Information security trends and steps for (OSAC) Middle East divsion
Information security trends and steps for (OSAC) Middle East divsion Information security trends and steps for (OSAC) Middle East divsion
Information security trends and steps for (OSAC) Middle East divsion
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issues
 
IT Staff NDA Template Employee Confidentiality Agreement
IT Staff NDA Template Employee Confidentiality AgreementIT Staff NDA Template Employee Confidentiality Agreement
IT Staff NDA Template Employee Confidentiality Agreement
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are Coming
 
Parenting and the media challenge
Parenting and the media challengeParenting and the media challenge
Parenting and the media challenge
 
How to use technology in ministry & parenting
How to use technology in ministry & parentingHow to use technology in ministry & parenting
How to use technology in ministry & parenting
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are coming
 
Idwg bimonthly security exchange cyber only section
Idwg bimonthly security exchange cyber only sectionIdwg bimonthly security exchange cyber only section
Idwg bimonthly security exchange cyber only section
 
Data Detox Kit Optimized
Data Detox Kit Optimized Data Detox Kit Optimized
Data Detox Kit Optimized
 
GDPR Benefits and a Technical Overview
GDPR  Benefits and a Technical OverviewGDPR  Benefits and a Technical Overview
GDPR Benefits and a Technical Overview
 
Compter Forensics Intro for Students
Compter Forensics Intro for Students Compter Forensics Intro for Students
Compter Forensics Intro for Students
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
 
Securely Erase your Device
Securely Erase your DeviceSecurely Erase your Device
Securely Erase your Device
 
Border crossing mobile social media life-saving security tips
Border crossing mobile social media life-saving security tipsBorder crossing mobile social media life-saving security tips
Border crossing mobile social media life-saving security tips
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

Cy safe 2.0_workbook

  • 2. 1. PURPOSE............................................................................................................................... 3 2. SCOPE..................................................................................................................................... 3 3. DEFINITIONS.......................................................................................................................... 3 4. UPDATES................................................................................................................................ 5 5. CONTROL CATEGORY: SANS CRITICAL CONTROLS ..................................................... 5 Critical Control 1: Inventory of Authorized and Unauthorized Devices ...................................................5 Critical Control 2: Inventory of Authorized and Unauthorized Software .................................................6 Critical Control 4: Continuous Vulnerability Assessment and Remediation ........................................10 Critical Control 5: Controlled Use of Administrative Privileges ................................................................11 Critical Control 6: Maintenance, Monitoring, and Analysis of Audit Logs ............................................13 Critical Control 7: Email and Web Browser Protections .............................................................................14 Critical Control 8: Malware Defenses ...............................................................................................................16 Critical Control 9: Limitation and Control of Network Ports.......................................................................17 Critical Control 10: Data Recovery Capability ...............................................................................................18 Critical Control 11: Secure Configurations for Network Devices.............................................................19 Critical Control 12: Boundary Defense.............................................................................................................21 Critical Control 13: Data Protection ...................................................................................................................23 Critical Control 14: Controlled Access Based on the Need to Know .....................................................24 Critical Control 15: Wireless Access Control .................................................................................................26 Critical Control 16: Account Monitoring and Control ...................................................................................28 Critical Control 17: Security Skills Assessment and Appropriate Training to Fill Gaps ..................29 Critical Control 18: Application Software Security........................................................................................31 Critical Control 19: Incident Response and Management .........................................................................32 Critical Control 20: Penetration Tests and Red Team Exercises............................................................33 6. CONTROL CATEGORY: ISO CONTROLS......................................................................... 34 ISO Control: Define Scope ...................................................................................................................................35 ISO Control: Setup the Information Security Team and Approach ........................................................35 ISO Control: Communicate Information Security Policy ............................................................................37 ISO Control: Identify Resources, Ownership and Standard Operating Procedures for IT Processes...................................................................................................................................................................38 ISO Control: Monitoring and review of third party services .......................................................................40 ISO Control: Complete Summary of Controls................................................................................................41 ISO Control: Define and Generate Records (evidence).............................................................................41 ISO Control: Physical and Environmental Security .....................................................................................42 ISO Control: Measure Effectiveness of Controls ..........................................................................................43 ISO Control: Update Annual Planning..............................................................................................................44 ISO Control: Compliance ......................................................................................................................................44 7. CONTROL CATEGORY: NIST CONTROLS....................................................................... 46 NIST Control: Business Environment ...............................................................................................................46 NIST Control: Governance ...................................................................................................................................47 NIST Control: Risk Management Strategy......................................................................................................47 NIST Control: Maintenance..................................................................................................................................48 APPENDIX A: RACI MATRIX...................................................................................................... 50
  • 3. 1. PURPOSE CySAFE was created through a collaborative effort, driven by five Michigan counties and the State of Michigan to develop a free IT security assessment tool to help small and mid-sized organizations assess, understand and prioritize their basic IT security needs. CySAFE was created from three well-known IT security frameworks: 20 Critical Controls, ISO 27001 and NIST. The goal was to combine the 400+ controls from all three frameworks into one condensed list, removing any redundant controls and assess the controls against the organization's current IT security capabilities. Next, the master list of 35 controls areas were evaluated over three key factors – cost to implement, time to implement and risk – and were assigned a number based on each key factor. This document is provided as a supplementary guide to the CySAFE Security Assessment tool. Users can use it to: a. Implement actual controls in their organization b. Establish a RACI Matrix for those controls c. Document the future initiatives planned to improve the security 2. SCOPE The document aggregates the control statements, lists expected controls for the 35 controls included in the CySAFE assessment tool. Note: The controls and RACI roles provided in Blue under the actual controls are for reference only. The users should document the actual controls and RACI in their organization. 3. DEFINITIONS IT Asset/Asset: an asset is any data, device, or other component of the environment that supports information-related activities. Assets generally include hardware (e.g. servers and switches), software (e.g. mission- critical applications and support systems), service (IT processes) and confidential information. Assets should be protected from illicit access, use, disclosure, alteration, destruction, and/or theft, resulting in loss to the organization. IT Security Controls/Controls: IT Security controls are technical or administrative safeguards or counter measures to avoid, counteract or minimize loss or unavailability of IT asset. IT Security control is the main way to manage risk. IT Asset owner can choose to: a. Accept the risk,
  • 4. b. Implement controls to manage risk, or c. Transfer risk to a third party. Expected/Recommended Controls: are guidelines for possible controls expected to be in place to meet the objectives of the specific control category. The guidelines are based on best practices observed in the industry, recommendations from popular Information Security Frameworks like ISO 27001, National Institute of Standards and Technology (NIST), and standards, regulations. Note: As the name suggests the expected/recommended controls are not mandatory. An organization using this document can have actual controls that can be different from the recommended controls and meet the control objectives to mitigate the associated risks. RACI Matrix: Responsibility, Accountability, Consult, and Inform. This model is used to identify roles and responsibilities for the Information Security Controls in the current environment. For additional information on RACI Matrix refer Appendix A. RACI Roles: The RACI roles provided in Blue under the actual controls in this document, are in the context of the IT Organization the CySAFE assessment tool, and should be used for reference only. The Organization using this document may have different sets of actual controls and different RACI chart for those controls. The document including the RACI roles definition should be modified accordingly. Asset Owner: identifies an individual or entity that has approved management responsibility for controlling the production, development, maintenance, use and security of the assets. Note: In context of this document, an Asset owner is a team’s/manager within the IT organization that supports the IT Asset (Application, Server, etc.) on behalf of the Business Units that use the application to support their Business Process. IT Admin or System Administrator: is a team/individual responsible to support the infrastructure elements in a typical IT environment. Some examples of the Infrastructure elements are Workstations (PC, Laptops, Tablets), Servers, Network components, etc. IT teams: IT Teams includes all organizational divisions in an IT Department and will vary among the organizations using this document.
  • 5. 4. UPDATES Since the document aggregates the control statements, for the controls included in the CySAFE assessment tool, any change to the CySAFE assessment tool will result in updates to the document. For any organization using this workbook document in tandem with their CySAFE assessment tool, it is recommended to update the document to reflect: a. the changes to the periodic CySAFE assessments, b. changes within their organization in terms of controls, and/or c. changes to RACI chart for the actual/future controls. 5. CONTROL CATEGORY:SANS CRITICAL CONTROLS Critical Control 1: Inventory of Authorized and Unauthorized Devices Control Statement: Actively manage (inventory, track, and correct) all hardware devices on the network so that only authorized devices are given access, and unauthorized and unmanaged devices are found and prevented from gaining access. To achieve and maintain appropriate protection of organizational assets. All assets are accounted for and have a nominated owner. Owners are identified for all assets and the responsibility for the maintenance of appropriate controls is assigned. Expected controls: a. Deploy an automated asset inventory discovery tool and use it to build a preliminary inventory of systems connected to an organization’s public and private network(s). Both active tools that scan through IPv4 or IPv6 network address ranges and passive tools that identify hosts based on analyzing their traffic should be employed. b. If the organization is dynamically assigning addresses using DHCP, then deploy dynamic host configuration protocol (DHCP) server logging, and use this information to improve the asset inventory and help detect unknown systems. c. Ensure that all equipment acquisitions automatically update the inventory system as new, approved devices are connected to the network. d. Maintain an asset inventory of all systems connected to the network and the network devices themselves, recording at least the network addresses, machine name(s), purpose of each system, an asset owner responsible for each device, and the department associated with each device. The inventory should include every system that has an Internet protocol (IP) address on the network, including but not limited to desktops, laptops, servers, network equipment (routers, switches, firewalls, etc.), printers, storage area networks, Voice Over-IP telephones, multi-homed addresses,
  • 6. virtual addresses, etc. The asset inventory created must also include data on whether the device is a portable and/or personal device. Devices such as mobile phones, tablets, laptops, and other portable electronic devices that store or process data must be identified, regardless of whether they are attached to the organization’s network. e. Deploy network level authentication via 802.1x to limit and control which devices can be connected to the network. The 802.1x must be tied into the inventory data to determine authorized versus unauthorized systems. f. Use client certificates to validate and authenticate systems prior to connecting to the private network. Actual Controls: Control Responsible Accountable Consulted Informed HelpDesk Software/ Change Management software with asset tracking capability HelpDesk team/ Change Management Software owner Asset Owner (Application Owners, Server Owners, IT Admins) IT Management, Asset Owner (Application/Server Owner), Infosec team IT Management Excel Spreadsheets Asset Owner (Application Owners, Server Owners, IT Admins) Asset Owner (Application Owners, Server Owners, IT Admins) IT Management, InfoSec team, CISO None Future Controls: Control Responsible Accountable Consulted Informed Critical Control 2: Inventory of Authorized and Unauthorized Software Control Statement: Actively manage (inventory, track, and correct) all software on the network so that only authorized software is installed and can execute, and that unauthorized and unmanaged software is found and prevented from installation or execution. To achieve and maintain appropriate protection of organizational assets. All assets should be accounted for and have a nominated owner. Owners should be identified for all assets and the responsibility for the maintenance of appropriate controls should be assigned.
  • 7. Expected controls: a. Devise a list of authorized software and version that is required in the enterprise for each type of system, including servers, workstations, and laptops of various kinds and uses. This list should be monitored by file integrity checking tools to validate that the authorized software has not been modified. b. Deploy application whitelisting technology that allows systems to run software only if it is included on the whitelist and prevents execution of all other software on the system. The whitelist may be very extensive (as is available from commercial whitelist vendors), so that users are not inconvenienced when using common software. Or, for some special- purpose systems (which require only a small number of programs to achieve their needed business functionality), the whitelist may be quite narrow. c. Deploy software inventory tools throughout the organization covering each of the operating system types in use, including servers, workstations, and laptops. The software inventory system should track the version of the underlying operating system as well as the applications installed on it. The software inventory systems must be tied into the hardware asset inventory so all devices and associated software are tracked from a single location. d. Virtual machines and/or air-gapped systems should be used to isolate and run applications that are required for business operations but based on higher risk should not be installed within a networked environment. e. Expected Controls: County should have software inventory management process implemented for PCs, Servers, Network and Mobile devices Actual Controls: Control Responsible Accountable Consulted Informed HelpDesk team/ Change Management Software owner Asset Owner (Application Owners, Server Owners, IT Admins) IT Management, Asset Owner (Application/Server Owner), Infosec team IT Management HelpDesk team/ Change Management Software owner Excel Spreadsheets Asset Owner (Application Owners, Server Owners, IT Admins) Asset Owner (Application Owners, Server Owners, IT Admins) IT Management, InfoSec team, CISO None Future Controls:
  • 8. Control Responsible Accountable Consulted Informed Critical Control 3: Secure Configurations for Hardware and Software. Control Statement: Establish, implement, and actively manage (track, report on, correct) the security configuration of laptops, servers, and workstations using a rigorous configuration management and change control process in order to prevent attackers from exploiting vulnerable services and settings. Expected controls: a. Establish standard secure configurations of your operating systems and software applications. Standardized images should represent hardened versions of the underlying operating system and the applications installed on the system. These images should be validated and refreshed on a regular basis to update their security configuration considering recent vulnerabilities and attack vectors. b. Follow strict configuration management, building a secure image that is used to build all new systems that are deployed in the enterprise. Any existing system that becomes compromised should be re-imaged with the secure build. Regular updates or exceptions to this image should be integrated into the organization’s change management processes. Images should be created for workstations, servers, and other system types used by the organization. c. Store the master images on securely configured servers, validated with integrity checking tools capable of continuous inspection, and change management to ensure that only authorized changes to the images are possible. Alternatively, these master images can be stored in offline machines, air-gapped from the production network, with images copied via secure media to move them between the image storage servers and the production network. d. Perform all remote administration of servers, workstation, network devices, and similar equipment over secure channels. Protocols such as telnet, VNC, RDP, or others that do not actively support strong encryption should only be used if they are performed over a secondary encryption channel, such as SSL, TLS or IPSEC. e. Use file integrity checking tools to ensure that critical system files (including sensitive system and application executables, libraries, and configurations) have not been altered. The reporting system should: have the ability to account for routine and expected changes; highlight and alert on unusual or unexpected alterations; show the history of configuration changes over time and identify who made the change (including the
  • 9. original logged-in account in the event of a user ID switch, such as with the su or sudo command). These integrity checks should identify suspicious system alterations such as: owner and permissions changes to files or directories; the use of alternate data streams which could be used to hide malicious activities; and the introduction of extra files into key system areas (which could indicate malicious payloads left by attackers or additional files inappropriately added during batch distribution processes). f. Implement and test an automated configuration monitoring system that verifies all remotely testable secure configuration elements, and alerts when unauthorized changes occur. This includes detecting new listening ports, new administrative users, changes to group and local policy objects (where applicable), and new services running on a system. Whenever possible use tools compliant with the Security Content Automation Protocol (SCAP) in order to streamline reporting and integration. g. Deploy system configuration management tools, such as Active Directory Group Policy Objects for Microsoft Windows systems or Puppet for UNIX systems that will automatically enforce and redeploy configuration settings to systems at regularly scheduled intervals. They should be capable of triggering redeployment of configuration settings on a scheduled, manual, or event-driven basis. Total number of relevant configuration discrepancies between sample systems and current standard OS build. Actual Controls: Control Responsible Accountable Consulted Informed Standard hardened Configurations (Gold Images) IT Admin (Server Admin) IT Admin (Server Admin) InfoSec, CISO, Asset Owner (Application/Server Owner) IT Management Process Documents, Checklists IT Admin (Server Admin) IT Admin (Server Admin) IT Management, InfoSec team None Guidelines Documents for Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers InfoSec team InfoSec team IT Management, Asset Owner (Application/Server Owner) Future Controls: Control Responsible Accountable Consulted Informed
  • 10. Critical Control 4: Continuous Vulnerability Assessment and Remediation Control Statement: Continuously acquire, assess, and act on new information to identify vulnerabilities, remediate, and minimize the window of opportunity for attackers. Expected Controls: a. Run automated vulnerability scanning tools against all systems on the network on a weekly or more frequent basis and deliver prioritized lists of the most critical vulnerabilities to each responsible system administrator along with risk scores that compare the effectiveness of system administrators and departments in reducing risk. b. Use a Security Content Automation Protocol (SCAP) validated vulnerability scanner that looks for both code-based vulnerabilities (such as those described by Common Vulnerabilities and Exposures entries) and configuration-based vulnerabilities (as enumerated by the Common Configuration Enumeration Project). c. Correlate event logs with information from vulnerability scans to fulfill two goals. First, personnel should verify that the activity of the regular vulnerability scanning tools is itself logged. Second, personnel should be able to correlate attack detection events with prior vulnerability scanning results to determine whether the given exploit was used against a target known to be vulnerable. d. Perform vulnerability scanning in authenticated mode either with agents running locally on each end system to analyze the security configuration or with remote scanners that are given administrative rights on the system being tested. Use a dedicated account for authenticated vulnerability scans, which should not be used for any other administrative activities and should be tied to specific machines at specific IP addresses. Ensure that only authorized employees have access to the vulnerability management user interface and that roles are applied to each user. e. Subscribe to vulnerability intelligence services to stay aware of emerging exposures, and use the information gained from this subscription to update the organization’s vulnerability scanning activities on at least a monthly basis. Alternatively, ensure that the vulnerability scanning tools you use are regularly updated with all relevant important security vulnerabilities. f. Deploy automated patch management tools and software update tools for operating system and software/applications on all systems for which such tools are available and safe. Patches should be applied to all systems, even systems that are properly air gapped.
  • 11. g. Monitor logs associated with any scanning activity and associated administrator accounts to ensure that this activity is limited to the timeframes of legitimate scans. h. Compare the results from back-to-back vulnerability scans to verify that vulnerabilities were addressed either by patching, implementing a compensating control, or documenting and accepting a reasonable business risk. Such acceptance of business risks for existing vulnerabilities should be periodically reviewed to determine if newer compensating controls or subsequent patches can address vulnerabilities that were previously accepted, or if conditions have changed, increasing the risk. i. Establish a process to risk-rate vulnerabilities based on the exploitability and potential impact of the vulnerability, and segmented by appropriate groups of assets (example, DMZ servers, internal network servers, desktops, laptops). Apply patches for the riskiest vulnerabilities first. A phased rollout can be used to minimize the impact to the organization. Establish expected patching timelines based on the risk rating level. Actual Controls: Control Responsible Accountable Consulted Informed Subscriptions to vulnerabilities database like NIST's U.S. National Vulnerability Database InfoSec InfoSec CISO IT Management MS-ISAC Cybersecurity Advisories InfoSec InfoSec CISO IT Management SCAP-validated vulnerability scanner e.g. Tenable Security Center InfoSec InfoSec CISO IT Management Future Controls: Control Responsible Accountable Consulted Informed Critical Control 5: Controlled Use of Administrative Privileges Control Statement: The processes and tools used to track/control/prevent/correct the use, assignment, and configuration of administrative privileges on computers, networks, and applications.
  • 12. Expected Controls: a. Minimize administrative privileges and only use administrative accounts when they are required. Implement focused auditing on the use of administrative privileged functions and monitor for anomalous behavior. b. Use automated tools to inventory all administrative accounts and validate that each person with administrative privileges on desktops, laptops, and servers is authorized by a senior executive. c. Before deploying any new devices in a networked environment, change all default passwords for applications, operating systems, routers, firewalls, wireless access points, and other systems to have values consistent with administration-level accounts. d. Configure systems to issue a log entry and alert when an account is added to or removed from a domain administrators’ group, or when a new local administrator account is added on a system. e. Configure systems to issue a log entry and alert on any unsuccessful login to an administrative account. f. Use multifactor authentication for all administrative access, including domain administrative access. Multi-factor authentication can include a variety of techniques, to include the use of smart cards, certificates, One Time Password (OTP) tokens, biometrics, or other similar authentication methods. g. Where multi-factor authentication is not supported, user accounts shall be required to use long passwords on the system (longer than 14 characters). h. Administrators should be required to access a system using a fully logged and non- administrative account. Then, once logged on to the machine without administrative privileges, the administrator should transition to administrative privileges using tools such as Sudo on Linux/UNIX, RunAs on Windows, and other similar facilities for other types of systems. i. Administrators shall use a dedicated machine for all administrative tasks or tasks requiring elevated access. This machine shall be isolated from the organization's primary network and not be allowed Internet access. This machine shall not be used for reading e-mail, composing documents, or surfing the Internet. Actual Controls: Control Responsible Accountable Consulted Informed Admin Account cleanup and procedures to organize Local Admin rights IT Admin (Server Admin) Asset Owner (Application Owners, Server Owners, IT Admins) InfoSec, CISO IT Management
  • 13. Non-AD Accounts for Admin functions IT Admin (Server Admin) Asset Owner (Application Owners, Server Owners, IT Admins) InfoSec, CISO IT Management Admin Account request process IT Admin (Server Admin) Asset Owner (Application Owners, Server Owners, IT Admins) InfoSec, CISO IT Management Future Controls: Control Responsible Accountable Consulted Informed Critical Control 6: Maintenance, Monitoring, and Analysis of Audit Logs Control Statement: Collect, manage, and analyze audit logs of events that could help detect, understand, or recover from an attack. Expected Controls: a. Include at least two synchronized time sources from which all servers and network equipment retrieve time information on a regular basis so that timestamps in logs are consistent. b. Validate audit log settings for each hardware device and the software installed on it, ensuring that logs include a date, timestamp, source addresses, destination addresses, and various other useful elements of each packet and/or transaction. Systems should record logs in a standardized format such as syslog entries or those outlined by the Common Event Expression initiative. If systems cannot generate logs in a standardized format, log normalization tools can be deployed to convert logs into such a format. c. Ensure that all systems that store logs have adequate storage space for the logs generated on a regular basis, so that log files will not fill up between log rotation intervals. The logs must be archived and digitally signed on a periodic basis. d. Have security personnel and/or system administrators run biweekly reports that identify anomalies in logs. They should then actively review the anomalies, documenting their findings. e. Configure network boundary devices, including firewalls, network-based IPS, and inbound and outbound proxies, to verbosely log all traffic (both allowed and blocked) arriving at the device.
  • 14. f. Deploy a SIEM (Security Information and Event Management) or log analytic tools for log aggregation and consolidation from multiple machines and for log correlation and analysis. Using the SIEM tool, system administrators and security personnel should devise profiles of common events from given systems so that they can tune detection to focus on unusual activity, avoid false positives, more rapidly identify anomalies, and prevent overwhelming analysts with insignificant alerts. Actual Controls: Control Responsible Accountable Consulted Informed Logs maintained on individual systems as requested by the system owners. IT Admin (Server, Network, End- Point support) Asset Owner (Application Owners, Server Owners, IT Admins) InfoSec team, CISO IT Management Future Controls: Control Responsible Accountable Consulted Informed Critical Control 7: Email and Web Browser Protections Control Statement: Minimize the attack surface and the opportunities for attackers to manipulate human behavior through their interaction with web browsers and email systems. Expected Controls: a. Ensure that only fully supported web browsers and email clients can execute in the organization, ideally only using the latest version of the browsers provided by the vendor to take advantage of the latest security functions and fixes. b. Uninstall or disable any unnecessary or unauthorized browser or email client plugins or add-on applications. Each plugin shall utilize application / URL whitelisting and only allow the use of the application for pre-approved domains. c. Limit the use of unnecessary scripting languages in all web browsers and email clients. This includes the use of languages such as ActiveX and JavaScript on systems where it is unnecessary to support such capabilities. d. Log all URL requests from each of the organization's systems, whether onsite or a mobile device, to identify potentially malicious activity and assist incident handlers with identifying potentially compromised systems.
  • 15. e. Deploy two separate browser configurations to each system. One configuration should disable the use of all plugins, unnecessary scripting languages, and generally be configured with limited functionality and be used for general web browsing. The other configuration shall allow for more browser functionality but should only be used to access specific websites that require the use of such functionality. f. The organization shall maintain and enforce network based URL filters that limit a system's ability to connect to websites not approved by the organization. The organization shall subscribe to URL categorization services to ensure that they are up- to-date with the most recent website category definitions available. Uncategorized sites shall be blocked by default. This filtering shall be enforced for each of the organization's systems, whether they are physically at an organization's facilities or not. g. To lower the chance of spoofed e-mail messages, implement the Sender Policy Framework (SPF) by deploying SPF records in DNS and enabling receiver-side verification in mail servers. h. Scan and block all e-mail attachments entering the organization's e-mail gateway if they contain malicious code or file types that are unnecessary for the organization's business. This scanning should be done before the e-mail is placed in the user's inbox. This includes e-mail content filtering and web content filtering. Actual Controls: Control Responsible Accountable Consulted Informed Policy regarding supported web browsers and email clients. InfoSec Asset Owner (Application Owners, Server Owners, IT Admins) CISO, Asset Owner (Application Owners, Server Owners, IT Admins), IT Management IT Management, Organization Process to scan and block all e- mail attachments entering the organization's e- mail gateway. IT Admin (Server Admin/Email Infrastructure Management team) IT Admin (Server Admin/Email Infrastructure Management team) InfoSec, CISO IT Management, Organization Sender Policy Framework (SPF) To lower the chance of spoofed e-mail messages IT Admin (Server Admin/Email Infrastructure Management team) IT Admin (Server Admin/Email Infrastructure Management team) InfoSec, CISO IT Management, Organization Future Controls:
  • 16. Control Responsible Accountable Consulted Informed Critical Control 8: Malware Defenses Control statement: Control the installation, spread, and execution of malicious code at multiple points in the enterprise, while optimizing the use of automation to enable rapid updating of defense, data gathering, and corrective action. Expected Controls: a. Employ automated tools to continuously monitor workstations, servers, and mobile devices with anti-virus, anti-spyware, personal firewalls, and host-based IPS functionality. All malware detection events should be sent to enterprise anti-malware administration tools and event log servers. b. Employ anti-malware software that offers a centralized infrastructure that compiles information on file reputations or have administrators manually push updates to all machines. After applying an update, automated systems should verify that each system has received its signature update. c. Limit use of external devices to those with an approved, documented business need. Monitor for use and attempted use of external devices. Configure laptops, workstations, and servers so that they will not auto-run content from removable media, like USB tokens (i.e., “thumb drives”), USB hard drives, CDs/DVDs, FireWire devices, external serial advanced technology attachment devices, and mounted network shares. Configure systems so that they automatically conduct an anti-malware scan of removable media when inserted. d. Enable anti-exploitation features such as Data Execution Prevention (DEP), Address Space Layout Randomization (ASLR), virtualization/containerization, etc. For increased protection, deploy capabilities such as Enhanced Mitigation Experience Toolkit (EMET) that can be configured to apply these protections to a broader set of applications and executables. e. Use network-based anti-malware tools to identify executables in all network traffic and use techniques other than signature-based detection to identify and filter out malicious content before it arrives at the endpoint. f. Enable domain name system (DNS) query logging to detect hostname lookup for known malicious command and control (C2) domains. Actual Controls: Control Responsible Accountable Consulted Informed
  • 17. Antivirus, software IT Admin (teams responsible for maintenance of end-point and servers) IT Admin (teams responsible for maintenance of end-point and servers) Asset Owner (Application Owners, Server Owners, IT Admins), InfoSec, CISO IT Management Anti-malware software IT Admin (teams responsible for maintenance of end-point and servers) IT Admin (teams responsible for maintenance of end-point and servers) Asset Owner (Application Owners, Server Owners, IT Admins), InfoSec, CISO IT Management Future Controls: Control Responsible Accountable Consulted Informed Critical Control 9: Limitation and Control of Network Ports Control statement: Manage (track/control/correct) the ongoing operational use of ports, protocols, and services on networked devices to minimize windows of vulnerability available to attackers. a. Ensure that only ports, protocols, and services with validated business needs are running on each system. b. Apply host-based firewalls or port filtering tools on end systems, with a default-deny rule that drops all traffic except those services and ports that are explicitly allowed. c. Perform automated port scans on a regular basis against all key servers and compared to a known effective baseline. If a change that is not listed on the organization’s approved baseline is discovered, an alert should be generated and reviewed. d. Verify any server that is visible from the Internet or an untrusted network, and if it is not required for business purposes, move it to an internal VLAN and give it a private address. e. Operate critical services on separate physical or logical host machines, such as DNS, file, mail, web, and database servers. f. Place application firewalls in front of any critical servers to verify and validate the traffic going to the server. Any unauthorized services or traffic should be blocked and an alert generated.
  • 18. Actual Controls: Control Responsible Accountable Consulted Informed Common network ports blocked as part of Server set up process IT Admin (Server Admin) IT Admin (Server Admin) Asset Owners (Server Owners), InfoSec, CISO IT Management Periodic Vulnerability Scan, Vulnerability review InfoSec IT Admin (Server Admin) Asset Owners (Server Owners), CISO IT Management Periodic Quality Assurance Check InfoSec IT Admin (Server Admin) Asset Owners (Server Owners), CISO IT Management Future Controls: Control Responsible Accountable Consulted Informed Critical Control 10: Data Recovery Capability Control statement: The processes and tools used to properly back up critical information with a proven methodology for timely recovery of it. Expected controls: a. Ensure that each system is automatically backed up on at least a weekly basis, and more often for systems storing sensitive information. To help ensure the ability to rapidly restore a system from backup, the operating system, application software, and data on a machine should each be included in the overall backup procedure. These three components of a system do not have to be included in the same backup file or use the same backup software. There should be multiple backups over time, so that in the event of malware infection, restoration can be from a version that is believed to predate the original infection. All backup policies should be compliant with any regulatory or official requirements. b. Test data on backup media on a regular basis by performing a data restoration process to ensure that the backup is properly working. c. Ensure that backups are properly protected via physical security or encryption when they are stored, as well as when they are moved across the network. This includes remote backups and cloud services.
  • 19. d. Ensure that key systems have at least one backup destination that is not continuously addressable through operating system calls. This will mitigate the risk of attacks like CryptoLocker which seek to encrypt or damage data on all addressable data shares, including backup destinations. Actual Controls: Control Responsible Accountable Consulted Informed Daily, Weekly, Monthly Backup Process IT Admin (Server Admin) IT Admin (Server Admin) Asset Owners (Server Owners), InfoSec, CISO IT Management Scheduled and Adhoc DR tests InfoSec Asset Owners (Server Owners), Asset Owners (Server Owners), CISO IT Management Future Controls: Control Responsible Accountable Consulted Informed Critical Control 11: Secure Configurations for Network Devices Control Statement: Establish, implement, and actively manage (track, report on, correct) the security configuration of network infrastructure devices using a rigorous configuration management and change control process to prevent attackers from exploiting vulnerable services and settings. Expected Controls: a. Compare firewall, router, and switch configuration against standard secure configurations defined for each type of network device in use in the organization. The security configuration of such devices should be documented, reviewed, and approved by an organization change control board. Any deviations from the standard configuration or updates to the standard configuration should be documented and approved in a change control system. b. All new configuration rules beyond a baseline-hardened configuration that allow traffic to flow through network security devices, such as firewalls and network-based IPS, should be documented and recorded in a configuration management system, with a specific business reason for each change, a specific individual’s name responsible for that business need, and an expected duration of the need.
  • 20. c. Use automated tools to verify standard device configurations and detect changes. All alterations to such files should be logged and automatically reported to security personnel. d. Manage network devices using two-factor authentication and encrypted sessions. e. Install the latest stable version of any security-related updates on all network devices. f. Network engineers shall use a dedicated machine for all administrative tasks or tasks requiring elevated access. This machine shall be isolated from the organization's primary network and not be allowed Internet access. This machine shall not be used for reading e-mail, composing documents, or surfing the Internet. g. Manage the network infrastructure across network connections that are separated from the business use of that network, relying on separate VLANs or, preferably, on entirely different physical connectivity for management sessions for network devices. Actual Controls: Control Responsible Accountable Consulted Informed Standard hardened Configurations for Network Equipment. IT Admin (Network Management team) IT Admin (Network Management team) InfoSec, CISO IT Teams, IT Management Process Documents, Checklists IT Admin (Network Management team) IT Admin (Network Management team) IT Management, InfoSec team None Guidelines Documents for Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers InfoSec team InfoSec team IT Admin (Network Management team), CISO IT Management Periodic Vulnerability Scan, Vulnerability review InfoSec team IT Admin (Network Management team) IT Admin (Network Management team), IT Management, CISO IT Management Future Controls:
  • 21. Control Responsible Accountable Consulted Informed Critical Control 12: Boundary Defense Control Statement: Detect/prevent/correct the flow of information transferring networks of different trust levels with a focus on security-damaging data. Expected Controls: a. Deny communications with (or limit data flow to) known malicious IP addresses (black lists), or limit access only to trusted sites (whitelists). Tests can be periodically carried out by sending packets from bogus source IP addresses (non-routable or otherwise unused IP addresses) into the network to verify that they are not transmitted through network perimeters. Lists of bogus addresses are publicly available on the Internet from various sources, and indicate a series of IP addresses that should not be used for legitimate traffic traversing the Internet. b. On DMZ networks, configure monitoring systems (which may be built in to the IDS sensors or deployed as a separate technology) to record at least packet header information, and preferably full packet header and payloads of the traffic destined for or passing through the network border. This traffic should be sent to a properly configured Security Information Event Management (SIEM) or log analytics system so that events can be correlated from all devices on the network. c. Deploy network-based IDS sensors on Internet and extranet DMZ systems and networks that look for unusual attack mechanisms and detect compromise of these systems. These network-based IDS sensors may detect attacks using signatures, network behavior analysis, or other mechanisms to analyze traffic. d. Network-based IPS devices should be deployed to complement IDS by blocking known bad signatures or the behavior of potential attacks. As attacks become automated, methods such as IDS typically delay the amount of time it takes for someone to react to an attack. A properly configured network-based IPS can provide automation to block bad traffic. When evaluating network-based IPS products, include those using techniques other than signature-based detection (such as virtual machine or sandbox- based approaches) for consideration. e. Design and implement network perimeters so that all outgoing network traffic to the Internet must pass through at least one application layer filtering proxy server. The proxy should support decrypting network traffic, logging individual TCP sessions, blocking specific URLs, domain names, and IP addresses to implement a black list, and applying whitelists of allowed sites that can be accessed through the proxy while blocking all other sites. Organizations should force outbound traffic to the Internet through an authenticated proxy server on the enterprise perimeter. f. Require all remote login access (including VPN, dial-up, and other forms of access that allow login to internal systems) to use two-factor authentication.
  • 22. g. All enterprise devices remotely logging into the internal network should be managed by the enterprise, with remote control of their configuration, installed software, and patch levels. For third-party devices (e.g., subcontractors/vendors), publish minimum security standards for access to the enterprise network and perform a security scan before allowing access. h. Periodically scan for back-channel connections to the Internet that bypass the DMZ, including unauthorized VPN connections and dual-homed hosts connected to the enterprise network and to other networks via wireless, dial-up modems, or other mechanisms. i. Deploy NetFlow collection and analysis to DMZ network flows to detect anomalous activity. j. To help identify covert channels exfiltrating data through a firewall, configure the built-in firewall session tracking mechanisms included in many commercial firewalls to identify TCP sessions that last an unusually long time for the given organization and firewall device, alerting personnel about the source and destination addresses associated with these long sessions. Actual Controls: Control Responsible Accountable Consulted Informed Firewall, Proxy, DMZ IT Admin (Network Management team) IT Admin (Network Management team) InfoSec, IT Teams, CISO IT Management Intrusion Prevention System InfoSec IT Admin (Network Management team) IT Teams, CISO IT Management Guidelines Documents for Secure Configurations of Firewall, IPS, Proxy, DMZ InfoSec team InfoSec team IT Admin (Network Management team), CISO IT Management Periodic Vulnerability Scan, Vulnerability review InfoSec team IT Admin (Network Management team) IT Admin (Network Management team), IT Management, CISO IT Management
  • 23. Future Controls: Control Responsible Accountable Consulted Informed Critical Control 13: Data Protection Control Statement: The processes and tools used to prevent data exfiltration, mitigate the effects of exfiltrated data, and ensure the privacy and integrity of sensitive information. Expected Controls: a. Perform an assessment of data to identify sensitive information that requires the application of encryption and integrity controls. b. Deploy approved hard drive encryption software to mobile devices and systems that hold sensitive data. c. Deploy an automated tool on network perimeters that monitors for sensitive information (e.g., personally identifiable information), keywords, and other document characteristics to discover unauthorized attempts to exfiltrate data across network boundaries and block such transfers while alerting information security personnel. d. Conduct periodic scans of server machines using automated tools to determine whether sensitive data (e.g., personally identifiable information, health, credit card, or classified information) is present on the system in clear text. These tools, which search for patterns that indicate the presence of sensitive information, can help identify if a business or technical process is leaving behind or otherwise leaking sensitive information. e. If there is no business need for supporting such devices, configure systems so that they will not write data to USB tokens or USB hard drives. If such devices are required, enterprise software should be used that can configure systems to allow only specific USB devices (based on serial number or other unique property) to be accessed, and that can automatically encrypt all data placed on such devices. An inventory of all authorized devices must be maintained. f. Use network-based DLP solutions to monitor and control the flow of data within the network. Any anomalies that exceed the normal traffic patterns should be noted and appropriate action taken to address them. g. Monitor all traffic leaving the organization and detect any unauthorized use of encryption. Attackers often use an encrypted channel to bypass network security devices. Therefore, it is essential that organizations can detect rogue connections, terminate the connection, and remediate the infected system. h. Block access to known file transfer and e-mail exfiltration websites.
  • 24. i. Use host-based data loss prevention (DLP) to enforce ACLs even when data is copied off a server. In most organizations, access to the data is controlled by ACLs that are implemented on the server. Once the data have been copied to a desktop system, the ACLs are no longer enforced and the users can send the data to whomever they want. Actual Controls: Control Responsible Accountable Consulted Informed Data Classification to identify sensitive data Asset Owner (Application/Server owners) Asset Owner (Application/Server owners) InfoSec, CISO, IT Management IT Management Hard drive encryption software IT Admin (End- Point, Server Admin Asset Owner (Application/Server owners) InfoSec, CISO, Asset Owners IT Management Network- based/Endpoint based DLP solutions InfoSec IT Admin (End- Point, Network Admin) CISO, IT Teams IT Management Guideline Document for Data Protection InfoSec team InfoSec team IT Admin (Network Management team), CISO IT Management Periodic Vulnerability Scan, Vulnerability review of the Sensitive systems/processes InfoSec team IT Admin (Network Admin), Application owners IT Admin (Network Admin), IT Management, CISO IT Management Future Controls: Control Responsible Accountable Consulted Informed Critical Control 14: Controlled Access Based on the Need to Know Control Statement: The processes and tools used to track/control/prevent/correct secure access to critical assets (e.g., information, resources, systems) according to the formal determination of which persons, computers, and applications have a need and right to access these critical assets based on an approved classification. Expected Controls: a. Segment the network based on the label or classification level of the information stored on the servers. Locate all sensitive information on separated VLANS with firewall filtering to ensure that only authorized individuals are only able to communicate with systems necessary to fulfill their specific responsibilities.
  • 25. b. All communication of sensitive information over less-trusted networks should be encrypted. Whenever information flows over a network with a lower trust level, the information should be encrypted. c. All network switches will enable Private Virtual Local Area Networks (VLANs) for segmented workstation networks to limit the ability of devices on a network to directly communicate with other devices on the subnet and limit an attacker’s ability to laterally move to compromise neighboring systems. d. All information stored on systems shall be protected with file system, network share, claims, application, or database specific access control lists. These controls will enforce the principal that only authorized individuals should have access to the information based on their need to access the information as a part of their responsibilities. e. Sensitive information stored on systems shall be encrypted at rest and require a secondary authentication mechanism, not integrated into the operating system, to access the information. f. Enforce detailed audit logging for access to nonpublic data and special authentication for sensitive data. g. Archived data sets or systems not regularly accessed by the organization shall be removed from the organization's network. These systems shall only be used as stand- alone systems (disconnected from the network) by the business unit needing to occasionally use the system or completely virtualized and powered off until needed. Actual Controls: Control Responsible Accountable Consulted Informed Data Classification to identify sensitive data Asset Owner (Application Owners, Server Owners) Asset Owner (Application Owners, Server Owners) InfoSec, CISO, IT Management IT Management Sensitive information encrypted at rest IT Admin (Server, End Point Support team) Asset Owner (Application Owners, Server Owners) InfoSec, CISO, IT Management IT Management Sensitive information encrypted in transit IT Admin (Network Management team) Asset Owner (Application Owners, Server Owners) InfoSec, CISO, IT Management IT Management Separate VLANs or, preferably, on entirely different physical connectivity for management IT Admin (Network Management team) IT Admin (Network Management team) InfoSec, IT Teams, CISO IT Management
  • 26. sessions for network devices. Periodic Vulnerability Scan, Vulnerability review of the Sensitive systems/processes InfoSec team IT Admin (Network Management team) Application owners IT Admin (Network Management team), IT Management, CISO IT Management Future Controls: Control Responsible Accountable Consulted Informed Critical Control 15: Wireless Access Control Control statement: Track, control, prevent, and correct the security use of wireless local area networks (LANS), access points, and wireless client systems. Expected Controls: a. Ensure that each wireless device connected to the network matches an authorized configuration and security profile, with a documented owner of the connection and a defined business need. Organizations should deny access to those wireless devices that do not have such a configuration and profile. b. Configure network vulnerability scanning tools to detect wireless access points connected to the wired network. Identified devices should be reconciled against a list of authorized wireless access points. Unauthorized (i.e., rogue) access points should be deactivated. c. Use wireless intrusion detection systems (WIDS) to identify rogue wireless devices and detect attack attempts and successful compromises. In addition to WIDS, all wireless traffic should be monitored by WIDS as traffic passes into the wired network. d. Where a specific business need for wireless access has been identified, configure wireless access on client machines to allow access only to authorized wireless networks. For devices that do not have an essential wireless business purpose, disable wireless access in the hardware configuration (basic input/output system or extensible firmware interface). e. Ensure that all wireless traffic leverages at least Advanced Encryption Standard (AES 256) encryption used with at least Wi-Fi Protected Access 2 (WPA2) protection.
  • 27. f. Ensure that wireless networks use authentication protocols such as Extensible Authentication Protocol-Transport Layer Security (EAP/TLS), which provide credential protection and mutual authentication. g. Disable peer-to-peer wireless network capabilities on wireless clients. h. Disable wireless peripheral access of devices (such as Bluetooth), unless such access is required for a documented business need. i. Create separate virtual local area networks (VLANs) for BYOD systems or other untrusted devices. Internet access from this VLAN should go through at least the same border as corporate traffic. Enterprise access from this VLAN should be treated as untrusted, filtered, and audited accordingly. Actual Controls: Control Responsible Accountable Consulted Informed Segmented network IT Admin (Network Management team) IT Admin (Network Management team) InfoSec, IT Teams, CISO IT Management Guest network IT Admin (Network Management team) IT Admin (Network Management team) InfoSec, IT Teams, CISO IT Management Split tunneling disabled. IT Admin (Network Management team) IT Admin (Network Management team) InfoSec, IT Teams, CISO IT Management User Agreements IT Management IT Admin (Network Management team) InfoSec, IT Teams, CISO IT Management Network vulnerability scanning tools to detect rogue Wireless devices on the network InfoSec IT Admin (Network Management team) IT Admin (Network Management team), IT Management, CISO IT Management Future Controls: Control Responsible Accountable Consulted Informed
  • 28. Critical Control 16: Account Monitoring and Control Control Statement: Actively manage the life cycle of system and application accounts – their creation, use, dormancy, deletion – to minimize opportunities for attackers to leverage them. Expected Controls: a. Review all system accounts and disable any account that cannot be associated with a business process and owner. b. Ensure that all accounts have an expiration date that is monitored and enforced. c. Establish and follow a process for revoking system access by disabling accounts immediately upon termination of an employee or contractor. Disabling instead of deleting accounts allows preservation of audit trails. d. Regularly monitor the use of all accounts, automatically logging off users after a standard period of inactivity. e. Configure screen locks on systems to limit access to unattended workstations. f. Monitor account usage to determine dormant accounts, notifying the user or user’s manager. Disable such accounts if not needed, or document and monitor exceptions (e.g., vendor maintenance accounts needed for system recovery or continuity operations). Require that managers match active employees and contractors with each account belonging to their managed staff. Security or system administrators should then disable accounts that are not assigned to valid workforce members. g. Use and configure account lockouts such that after a set number of failed login attempts the account is locked for a standard period of time. h. Monitor attempts to access deactivated accounts through audit logging. i. Configure access for all accounts through a centralized point of authentication, for example Active Directory or LDAP. Configure network and security devices for centralized authentication as well. j. Profile each user’s typical account usage by determining normal time-of-day access and access duration. Reports should be generated that indicate users who have logged in during unusual hours or have exceeded their normal login duration. This includes flagging the use of the user’s credentials from a computer other than computers on which the user generally works. k. Require multi-factor authentication for all user accounts that have access to sensitive data or systems. Multi-factor authentication can be achieved using smart cards, certificates, One Time Password (OTP) tokens, or biometrics.
  • 29. l. Where multi-factor authentication is not supported, user accounts shall be required to use long passwords on the system (longer than 14 characters). m. Ensure that all account usernames and authentication credentials are transmitted across networks using encrypted channels. n. Verify that all authentication files are encrypted or hashed and that these files cannot be accessed without root or administrator privileges. Audit all access to password files in the system. Actual Controls: Control Responsible Accountable Consulted Informed Periodic Account Review InfoSec Asset Owner (Application Owners, Server Owners, IT Admins) Asset Owner (Application Owners, Server Owners, IT Admins) IT Management Review User Lifecycle Management System InfoSec Asset Owner (Application Owners, Server Owners, IT Admins) Asset Owner (Application Owners, Server Owners, IT Admins) IT Management Configure account lockouts after failed login attempts. IT Admin (Server/Network/E nd-Point Admin) IT Admin (Server/Network/E nd-Point Admin) InfoSec, Asset Owner (Application Owners, Server Owners, IT Admins), CISO IT Management Dual-Factor accounts for high privilege accounts. IT Admin (Server/Network/E nd-Point Admin) IT Admin (Server/Network/E nd-Point Admin) InfoSec, Asset Owner (Application Owners, Server Owners, IT Admins), CISO IT Management Future Controls: Control Responsible Accountable Consulted Informed Critical Control 17: Security Skills Assessment and Appropriate Training to Fill Gaps Control Statement: For all functional roles in the organization (prioritizing those mission-critical to the business and its security), identify the specific knowledge, skills, and abilities needed to support defense of the enterprise; develop and execute an integrated plan to assess, identify gaps, and remediate through policy, organizational planning, training, and awareness programs.
  • 30. Expected controls: a. Perform gap analysis to see which skills employees need and which behaviors employees are not adhering to, using this information to build a baseline training and awareness roadmap for all employees. b. Deliver training to fill the skills gap. If possible, use more senior staff to deliver the training. A second option is to have outside teachers provide training onsite so the examples used will be directly relevant. If you have small numbers of people to train, use training conferences or online training to fill the gaps. c. Implement a security awareness program that: i. focuses only on the methods commonly used in intrusions that can be blocked through individual action, ii. is delivered in short online modules convenient for employees, iii. is updated frequently (at least annually) to represent the latest attack techniques, iv. is mandated for completion by all employees at least annually, and v. is reliably monitored for employee completion. d. Validate and improve awareness levels through periodic tests to see whether employees will click on a link from suspicious e-mail or provide sensitive information on the telephone without following appropriate procedures for authenticating a caller; targeted training should be provided to those who fall victim to the exercise. e. Use security skills assessments for each of the mission-critical roles to identify skills gaps. Use hands-on, real-world examples to measure mastery. If you do not have such assessments, use one of the available online competitions that simulate real-world scenarios for each of the identified jobs to measure skills mastery. Actual Controls: Control Responsible Accountable Consulted Informed Ad Hoc Security training requests by team members Asset Owners Asset Owners InfoSec, CISO IT Management InfoSec Team Training InfoSec team InfoSec team IT Management Organization Future Control: Control Responsible Accountable Consulted Informed
  • 31. Critical Control 18: Application Software Security Control Statement: Manage the security life cycle of all in-house developed and acquired software to prevent, detect, and correct security weaknesses. Expected Controls: a. For all acquired application software, check that the version you are using is still supported by the vendor. If not, update to the most current version and install all relevant patches and vendor security recommendations. b. Protect web applications by deploying web application firewalls (WAFs) that inspect all traffic flowing to the web application for common web application attacks, including but not limited to cross-site scripting, SQL injection, command injection, and directory traversal attacks. For applications that are not web-based, specific application firewalls should be deployed if such tools are available for the given application type. If the traffic is encrypted, the device should either sit behind the encryption or can decrypt the traffic prior to analysis. If neither option is appropriate, a host-based web application firewall should be deployed. c. For in-house developed software, ensure that explicit error checking is performed and documented for all input, including for size, data type, and acceptable ranges or formats. d. Test in-house-developed and third-party-procured web applications for common security weaknesses using automated remote web application scanners prior to deployment, whenever updates are made to the application, and on a regular recurring basis. Input validation and output encoding routines of application software should be reviewed and tested. e. Do not display system error messages to end-users (output sanitization). f. Maintain separate environments for production and nonproduction systems. Developers should not typically have unmonitored access to production environments. g. For applications that rely on a database, use standard hardening configuration templates. All systems that are part of critical business processes should also be tested. h. Ensure that all software development personnel receive training in writing secure code for their specific development environment. i. For in-house developed applications, ensure that development artifacts (sample data and scripts; unused libraries, components, debug code; or tools) are not included in the deployed software, or accessible in the production environment. Actual Controls: Control Responsible Accountable Consulted Informed
  • 32. Web Application Firewall InfoSec Asset Owner (Application) owner Asset Owner (Application Owner), CISO IT Management IT Management Security Scans Infosec Asset Owner (Application) owner IT Supervisors/ Managers IT Management Developer Standards /Secure Application Development Guidelines Asset Owner (Application) owner/team Asset Owner (Application) owner/team IT Management, CISO IT Management Future Controls Control Responsible Accountable Consulted Informed Critical Control 19: Incident Response and Management Control Statement: Protect the organization’s information, as well as its reputation, by developing and implementing an incident response infrastructure (e.g., plans, defined roles, training, communications, management oversight) for quickly discovering an attack and then effectively containing the damage, eradicating the attacker’s presence, and restoring the integrity of the network and systems. Expected Controls: a. Ensure that there are written incident response procedures that include a definition of personnel roles for handling incidents. The procedures should define the phases of incident handling. b. Assign job titles and duties for handling computer and network incidents to specific individuals. c. Define management personnel who will support the incident handling process by acting in key decision-making roles. d. Devise organization-wide standards for the time required for system administrators and other personnel to report anomalous events to the incident handling team, the mechanisms for such reporting, and the kind of information that should be included in the incident notification. This reporting should also include notifying the appropriate Community Emergency Response Team in accordance with all legal or regulatory requirements for involving that organization in computer incidents.
  • 33. e. Assemble and maintain information on third-party contact information to be used to report a security incident (e.g., maintain an e-mail address of security@organization.com or have a web page http://organization.com/security). f. Publish information for all personnel, including employees and contractors, regarding reporting computer anomalies and incidents to the incident handling team. Such information should be included in routine employee awareness activities. g. Conduct periodic incident scenario sessions for personnel associated with the incident handling team to ensure that they understand current threats and risks, as well as their responsibilities in supporting the incident handling team. Actual Controls: Control Responsible Accountable Consulted Informed Incident Response Plan, and Security Incidents Reporting Template Asset Owners (Application, IT Admins) InfoSec (to investigate, resolve, review incident management) IT teams, IT Management, IT Management, and Other Stakeholders in the Organization. Disaster Recovery Plan Asset Owners (Application, IT Admins) IT Asset Owners (Application, System Admins) InfoSec, CISO IT Management, and Other Stakeholders in the Organization. Periodic testing InfoSec/ CISO IT Asset Owners (Application, System Admins) IT Asset Owners, IT Management IT Management Future Controls: Control Responsible Accountable Consulted Informed Critical Control 20: Penetration Tests and Red Team Exercises Control Statement: Test the overall strength of an organization’s defenses (the technology, the processes, and the people) by simulating the objectives and actions of an attacker. Expected Controls: a. Conduct regular external and internal penetration tests to identify vulnerabilities and attack vectors that can be used to exploit enterprise systems successfully. Penetration testing should occur from outside the network perimeter (i.e., the Internet or wireless frequencies around an organization) as well as from within its boundaries (i.e., on the internal network) to simulate both outsider and insider attacks.
  • 34. b. Any user or system accounts used to perform penetration testing should be controlled and monitored to make sure they are only being used for legitimate purposes, and are removed or restored to normal function after testing is over. c. Perform periodic Red Team exercises to test organizational readiness to identify and stop attacks or to respond quickly and effectively. d. Include tests for the presence of unprotected system information and artifacts that would be useful to attackers, including network diagrams, configuration files, older penetration test reports, e-mails or documents containing passwords or other information critical to system operation. e. Plan clear goals of the penetration test itself with blended attacks in mind, identifying the goal machine or target asset. Many APT-style attacks deploy multiple vectors—often social engineering combined with web or network exploitation. Red Team manual or automated testing that captures pivoted and multi-vector attacks offers a more realistic assessment of security posture and risk to critical assets. f. Use vulnerability scanning and penetration testing tools in concert. The results of vulnerability scanning assessments should be used as a starting point to guide and focus penetration-testing efforts. g. Wherever possible, ensure that Red Teams results are documented using open, machine-readable standards (e.g., SCAP). Devise a scoring method for determining the results of Red Team exercises so that results can be compared over time. h. Create a test bed that mimics a production environment for specific penetration tests and Red Team attacks against elements that are not typically tested in production, such as attacks against supervisory control and data acquisition and other control systems. Actual Controls: Control Responsible Accountable Consulted Informed Penetration Tests InfoSec Asset (Application) owner CISO, IT Management IT Management Future Controls: Control Responsible Accountable Consulted Informed 6. CONTROL CATEGORY:ISO CONTROLS
  • 35. ISO Control: Define Scope Control Statement: The process of prioritizing the protection requirements for the organization, based on business impact, should give organization a good measure of the critical IT processes requiring to establish a good Information Security Program. Describing these processes will define the scope for Program for the organization. Scope of the Information Security Management (ISMS) program depends on the identifying the security requirements. There are three main sources of security requirements. a. One source is derived from assessing risks to the organization, considering the organization’s overall business strategy and objectives. Through a risk assessment, threats to assets are identified, vulnerability to and likelihood of occurrence is evaluated and potential impact is estimated. b. Another source is the legal, statutory, regulatory, and contractual requirements that an organization, its trading partners, contractors, and service providers must satisfy, and their socio-cultural environment. c. A further source is the set of principles, objectives and business requirements for information processing that an organization has developed to support its operations. Actual Controls: Control Responsible Accountable Consulted Informed ISMS Scope Document CISO CISO IT Management IT Organization, Organization’s Senior Management Future Controls: Control Responsible Accountable Consulted Informed ISO Control: Setup the Information Security Team and Approach Control Statement: To establish a Security Organization necessary to ensure organization’s involvement in identifying and implementing various security measures. A dedicated security team of multiple experienced and certified individuals exists with management commitment and led by chief information security officer.
  • 36. Expected Controls: A security organization consisting of the following: a. Security Steering Committee headed by the Chief Information Security Officer (CISO) and including representative technology departments. b. Dedicated CISO heading security organization. Typical responsibilities for CISO will be: i. To chair the Security Steering committee meetings. ii. To serve as liaison to the Steering committee and IT Organization. iii. To coordinate the ongoing development and maintenance of information security. iv. To act as a single point of contact for the functional departments for reviewing their business requirements from a security perspective. v. To monitor compliance and periodically review violations. And vi. Organizing Information security awareness campaign for personnel to enhance the security culture and develop a broad understanding of the requirements of Information Security Program in the Organization. c. Dedicated Information Security team with following responsibilities: i. Defining technical and non-technical information security standards, procedures and guidelines; ii. Supporting Information Asset Owners in the definition and implementation of controls, processes and supporting tools to comply with the policy manual and manage information security risks; iii. Reviewing and monitoring compliance with relevant security policy statements and contributing to Internal Audit and External Audit processes; iv. Collecting, analyzing and commenting on information security metrics and incidents; v. Supporting Information Asset Owners in the investigation and remediation of information security incidents or other policy violations; vi. Liaising as necessary with related internal functions such as IT Operations, IT teams, Customer Departments and external functions such as the Police when appropriate;
  • 37. d. Information Asset Owners identified. Information Asset Owners are managers held accountable for the protection of Information Assets by their team. Information Asset Owners may delegate information security tasks to managers or other individuals but remain accountable for proper implementation of the tasks. Information Asset Owners are responsible for: i. Appropriate classification and protection of the information assets; ii. Specifying and funding suitable protective controls; iii. Authorizing access to information assets in accordance with the classification and business needs; iv. For new application system developments: Undertaking or commissioning information security risk assessments to ensure that the information security requirements are properly defined and documented during the early stages of development; v. Ensuring timely completion of regular system/data access reviews; and vi. Monitoring compliance with protection requirements affecting their assets. Actual Controls: Control Responsible Accountable Consulted Informed IT Security Steering IT Management CISO IT Management Organization Dedicated IT Security Team IT Management CISO IT Management IT Organization IT Asset Owners identified IT Management IT Management CISO IT Organization Future Controls: Control Responsible Accountable Consulted Informed ISO Control: Communicate Information Security Policy Control Statement: Information security policy is an aggregate of directives, rules, and practices that prescribes how an organization manages, protects, and distributes information. Information security policy is an essential component of information security governance— without the policy, governance has no substance and rules to enforce. Information security policy should be based on a combination of appropriate legislations (such as CJIS, HIPAA), applicable standards (such as PCI DSS, ISO 27001 etc.), and organization’s business and security requirements.
  • 38. Organization’s information security policy should address the fundamentals of organization’s information security governance structure, including: a. Information security roles and responsibilities; b. Statement of security controls baseline and rules for exceeding the baseline; and c. Rules of behavior that Organization’s users are expected to follow and minimum repercussions for noncompliance. Actual Controls: Control Responsible Accountable Consulted Informed CySAFE Framework InfoSec CISO IT Management IT Organization, Organization’s Senior Management. Written Information Security Program InfoSec CISO IT Management IT Organization Future Controls: Control Responsible Accountable Consulted Informed ISO Control: Identify Resources, Ownership and Standard Operating Procedures for IT Processes Control Statement: All information and assets associated with information processing facilities should be owned by a designated part of the organization. To ensure the correct and secure operation of information processing facilities, the responsibilities and procedures for the management and operation of all information processing facilities should be established. This includes the development of appropriate operating procedures. Segregation of duties should be implemented, where appropriate, to reduce the risk of negligent or deliberate system misuse. Expected Controls: a. Owners should be identified for the IT Processes, and the owner should be responsible for: i. Ensuring that information and assets associated for their IT Process are appropriately classified;
  • 39. ii. Defining and periodically reviewing access restrictions and classifications, considering applicable access control policies; b. Operating procedures should be documented, maintained, and made available to all authorized users. Documented procedures should be prepared for system activities associated with the IT Processes. Documented procedures should be maintained for system activities associated with IT Process. Some examples are System start, shutdown, backup, equipment maintenance, media handling etc. c. Changes to IT Processes and associated systems should be controlled. The following items should be considered: i. Identification and recording of significant changes; ii. Planning and testing of changes; iii. Assessment of the potential impacts, including security impacts, of such changes; iv. Formal approval procedure for proposed changes; v. Communication of change details to authorized stakeholders; vi. Rollback procedures, including procedures and responsibilities for aborting and recovering from unsuccessful changes and unforeseen events. d. Segregation of duties: Duties and areas of responsibility should be segregated to reduce opportunities for unauthorized or unintentional modification or misuse of the organization’s assets. Care should be taken that no single person can access, modify or use assets without authorization or detection. The initiation of an event should be separated from its authorization. The possibility of collusion should be considered in designing the controls. e. Development, test, and operational facilities should be separated to reduce the risks of unauthorized access or changes to the operational system. Actual Controls: Control Responsible Accountable Consulted Informed IT Asset Owners identified IT Management IT Management CISO IT Organization Operating procedures Document Asset Owner (Application Owners, IT Admins) Asset Owner (Application Owners, IT Admins) InfoSec, CISO, IT Management IT Management Development, test, and operational facilities are separated to reduce the risks of Asset Owner (Application Owners, IT Admins) Asset Owner (Application Owners, IT Admins) InfoSec, CISO, IT Management IT Management
  • 40. unauthorized access or changes to the operational system. Future Controls: Control Responsible Accountable Consulted Informed ISO Control: Monitoring and review of third party services Control Statement: The services, reports and records provided by the third party should be regularly monitored and reviewed, and audits should be carried out regularly. Expected Controls: a. Information security terms and conditions are included in the agreements (Contracts, SOW) with the third-party service providers. b. Information security terms and conditions in the agreements are being adhered to by the service providers. c. The organization maintains sufficient overall control and visibility into all security aspects for sensitive or critical information or information processing facilities accessed, processed or managed by the third-party service providers. Actual Controls: Control Responsible Accountable Consulted Informed Information security terms and conditions are included in the vendor agreements Asset Owner (Application Owners, IT Admins) Asset Owner (Application Owners, IT Admins) CISO, IT Management, Legal Department IT Management Future Controls: Control Responsible Accountable Consulted Informed
  • 41. ISO Control: Complete Summary of Controls Control Statement: IT Asset/Process owners should develop detailed list of all the controls that have been selected for the IT Asset/Process they are responsible for. List of controls should be backed up by risk assessment. List of controls backed by risk assessment will provide strategic and tactical direction to the Organization. Expected Controls: a. Inventory of IT Processes and assets in the organization. b. Risk Assessment process for documenting risks, vulnerabilities, risk treatment plan, list of controls implemented to mitigate the risk, and action plan for implementing additional controls as needed. c. List of recommended controls. This list can be developed by the Organization by studying regulatory, business, contractual requirements. Organization can use ISO 27001, NIST 800-53, and other relevant control frameworks as a reference to determine controls to be used for protecting organization’s information assets. Actual Controls: Control Responsible Accountable Consulted Informed List of Security Controls for the IT Process/Asset Asset Owner (Application Owners, IT Admins) Asset Owner (Application Owners, IT Admins) CISO, IT Management, Legal Department IT Management Future Controls: Control Responsible Accountable Consulted Informed ISO Control: Define and Generate Records (evidence) Control Statement: Organization (IT Process Owner) has a list of records to provide evidence of conformity to requirements and the effective operation of the ISMS and controls, including the protection requirements been defined and maintained. Expected Controls:
  • 42. a. Record of evidence based on the Control Category: Strategy/Scope, Planning/Design/Configuration, Operations, Monitoring/Metrics, and Response/Recovery. b. The Individual/team that is responsible/accountable for a control discussed in this document must ensure maintaining appropriate record/evidence to demonstrate the operational effectiveness of the control. c. The records can be useful for internal/external audits, reference document for process improvement, as a forensic evidence in investigating a breach. Actual Controls: Control Responsible Accountable Consulted Informed Information Strategy/Scope IT Management IT Management CISO IT Organization Operating procedures Document Asset Owner (Application Owners, IT Admins) Asset Owner (Application Owners, IT Admins) InfoSec, CISO, IT Management IT Management Future Controls: Control Responsible Accountable Consulted Informed ISO Control: Physical and Environmental Security Control Statement: Critical or sensitive information-processing facilities physically protected from unauthorized access, damage, interference, and environmental threats. Expected Controls: a. Physical entry controls, securing offices, rooms, and facilities. Physical protection and guidelines for working in secure areas. Public access, delivery, and loading areas are controlled. b. Physical protection against damage from fire, flood, earthquake, explosion, civil unrest, and other forms of natural or man-made disaster should be designed and applied. Actual Controls: Control Responsible Accountable Consulted Informed Well defined Security Perimeters, Site IT Management IT Management CISO, Legal Department Organization
  • 43. Perimeters are physically sound, Manned reception area, Intruder detection systems. Only Authorized personnel can access the facilities. IT Management IT Management CISO, Legal Department Organization Future Controls: Control Responsible Accountable Consulted Informed ISO Control: Measure Effectiveness of Controls Control Statement: Organization has implemented process to measure the effectiveness of security controls. Expected Controls: a. Organization has adopted a framework like CySAFE to assess, understand and prioritize their basic IT security needs. b. Organization has procedures to Monitor, measure, analyze and evaluate the IT Security controls. Actual Controls: Control Responsible Accountable Consulted Informed Periodic Management Reports – e.g. CySAFE Score CISO CISO InfoSec, IT Teams IT Management Metrics to evaluate effectiveness of security devices InfoSec InfoSec IT Teams, CISO CISO Security Metrics Scope and Processes InfoSec InfoSec CISO IT Management Future Controls: Control Responsible Accountable Consulted Informed
  • 44. ISO Control: Update Annual Planning Control Statement: Organization must include IT Security in the Annual planning. Expected Controls: a. IT security is included in the capital planning and enterprise architecture processes. b. Organization conducts annual IT security reviews of all programs and systems. c. Organization uses the findings from IT Security review to improve the current IT Security controls, and introduce new IT Security controls as needed. d. IT management should require that all requests for technology solution expenditures include technology risk identification and risk mitigation requirements as part of the cost benefit analysis, project objectives, deliverables and funding request. e. Organization has an information security strategy that is aligned with the Organization’s risk management and corporate governance requirements should be developed and implemented. Actual Controls: Control Responsible Accountable Consulted Informed Master Plan Sizing InfoSec CISO IT Management, IT Teams IT Management Future Controls: Control Responsible Accountable Consulted Informed ISO Control: Compliance Control Statement: Organization has defined, documented and kept up to date all relevant statutory, regulatory, and contractual requirements and the organization’s approach to meet these requirements for each information system and the organization. Organization has focus on compliance with security policies and standards, and technical compliance. Expected Controls:
  • 45. a. Applicable legislations and compliance requirements are identified. The specific controls and individual responsibilities to meet these requirements should be similarly defined and documented. b. Intellectual property rights (IPR), appropriate procedures are implemented to ensure compliance with legislative, regulatory, and contractual requirements on the use of material in respect of which there may be intellectual property rights and on the use of proprietary software products. c. Compliance with organization's security policies and standards - security procedures are identified. Responsibilities are defined and documented. d. Technical compliance checking - Information systems are regularly checked for compliance with security implementation standards. Actual Controls: Control Responsible Accountable Consulted Informed Identify Compliance requirements (HIPAA, PCI, CJIS) IT Management IT Management CISO, Legal Department Organization Management prioritizes compliance requirement IT Management IT Management CISO Organization RACI for compliance programs IT Management IT Management CISO Organization’s Senior Management Annual review of internal and external compliance requirements. CISO IT Management IT Organization Organization’s Senior Management Future Controls: Control Responsible Accountable Consulted Informed
  • 46. 7. CONTROL CATEGORY:NIST CONTROLS NIST Control: Business Environment Control Statement: The organization’s mission, objectives, stakeholders, and activities are understood and prioritized; this information is used to inform Information Security roles, responsibilities, and risk management decisions. Expected Controls: a. Priorities for organizational mission, objectives, and activities are established and communicated. b. The IT function has identified and communicated its role in delivering the organization’s overall business strategy and objectives. c. The IT function has identified and communicated principles, objectives and business requirements for information processing that an organization has developed to support its operations. d. The IT Function has established the dependencies and critical functions for delivery of critical services to support its operations. e. The IT Function has established the resilience requirements to support delivery of critical services. Actual Controls: Control Responsible Accountable Consulted Informed CIO, CISO communication with Business Units CISO/CIO CISO/CIO IT Management Organization’s Senior Management IT Organization Mission statement IT Management IT Management IT Management, CISO, Organization’s Senior Management Organization’s Senior Management Future Controls: Control Responsible Accountable Consulted Informed
  • 47. NIST Control: Governance Control Statement: The policies, procedures, and processes to manage and monitor the organization’s regulatory, legal, risk, environmental, and operational requirements are understood and inform the management of cybersecurity risk. Expected Controls: a. Organizational information security policy is established. b. Information security roles & responsibilities are coordinated and aligned with internal roles and external partners. c. Legal and regulatory requirements regarding cybersecurity, including privacy and civil liberties obligations, are understood and managed. d. Governance and risk management processes address cybersecurity risks. Actual Controls: Control Responsible Accountable Consulted Informed Information Security Policy CISO IT Management IT Management, Organization’s Senior Management Organization Future Controls: Control Responsible Accountable Consulted Informed NIST Control: Risk Management Strategy Control Statement: The organization’s priorities, constraints, risk tolerances, and assumptions are established and used to support operational risk decisions. Expected Controls: a. Asset vulnerabilities are identified and documented. b. Threat and vulnerability information is received from information sharing forums and sources.
  • 48. c. Threats, both internal and external, are identified and documented. d. Potential business impacts and likelihoods are identified. e. Threats, vulnerabilities, likelihoods, and impacts are used to determine risk. f. Risk responses are identified and prioritized. Actual Controls: Control Responsible Accountable Consulted Informed Ongoing communications to the organization about cybersecurity risks and rationale for investment in cybersecurity tools. CISO IT Management IT Management, Organization’s Senior Management Organization’s Senior Management Information Security Policy CISO IT Management IT Management, Organization’s Senior Management Organization Data classification to identify sensitive data Asset Owner (Application, Server Owner) Asset Owner (Application, Server Owner) InfoSec, CISO, IT Management IT Management Risk Registers Asset Owner (Application, Server Owner) Asset Owner (Application, Server Owner) InfoSec, CISO, IT Management IT Management Future Controls: Control Responsible Accountable Consulted Informed NIST Control: Maintenance Control Statement: Maintenance and repairs of the information system components is performed consistent with policies and procedures. Expected Controls:
  • 49. a. Maintenance and repair of organizational assets is performed and logged in a timely manner, with approved and controlled tools. b. Remote maintenance of organizational assets is approved, logged, and performed in a manner that prevents unauthorized access. Actual Controls: Control Responsible Accountable Consulted Informed Operating procedures are documented, maintained for the Information System Admins. Asset Owner (Application Owners, IT Admins) Asset Owner (Application Owners, IT Admins) InfoSec, CISO, IT Management IT Management Responsibilities the management and operation of all information processing facilities are established. Asset Owner (Application Owners, IT Admins) Asset Owner (Application Owners, IT Admins) InfoSec, CISO, IT Management IT Management Changes to information processing facilities and systems are controlled. Asset Owner (Application Owners, IT Admins) Asset Owner (Application Owners, IT Admins) InfoSec, CISO, IT Management IT Management Development, test, and operational facilities are separated to reduce the risks of unauthorized access or changes to the operational system. Asset Owner (Application Owners, IT Admins) Asset Owner (Application Owners, IT Admins) InfoSec, CISO, IT Management IT Management Hardware/Software upgrades/patches are applied to remove or reduce security weaknesses as needed. IT Admin (End- Point, Server, Network Admin) Asset Owner (Application Owners, IT Admins) InfoSec, CISO, IT Management IT Management Future Controls: Control Responsible Accountable Consulted Informed
  • 50. APPENDIX A: RACI MATRIX https://www.networkpaladin.org/single-post/2019/01/30/What-is-RACI-and-Why-You-should-Care