Show Menu
Cheatography

GSEC CIS CONTROLS Cheat Sheet by

A cheat sheet for GSEC regarding Cis Controls

The CIS Critical Security Controls

CIS CONTROLS
EXPLAN­ATION
Inventory and Control of Hardware Assets
Identify devices on your organi­zat­ion’s network, keep them updated, and maintain an inventory of assets that store or process inform­ation.
Inventory and Control of Software Assets
Use software inventory tools to automate all software docume­ntation to ensure unauth­orized software is blocked from executing on assets.
Continuous Vulner­ability Management
Utilize a complaint vulner­ability scanning tool to monitor your systems on the network to identify vulner­abi­lities and keep them up to date.
Controlled Use of Admini­str­ative Privileges
Configure systems to issue a log entry, alert when accounts are changed, and ensure admini­str­ative accounts have proper access.
Secure Config­uration for Hardware and Software on Mobile Devices, Laptops, Workst­ations, and Servers
Maintain docume­nted, standard security config­uration standards for all authorized operating systems and software.
Mainte­nance, Monito­ring, and Analysis of Audit Logs
Ensure that local logging has been enabled and approp­riate logs are aggregated to a central log management system for analysis and review.
Email and Web Browser Protec­tions
Ensure that only supported web browsers and email clients can execute in the organi­zation using the latest official version.
Malware Defenses
Utilize centrally managed anti-m­alware software to monitor and defend each organi­zat­ion's workst­ations and servers contin­uously.
Limita­tions and Control of Network Ports, Protocols, and Services
Ensure that only network ports, protocols, and services listening on a system with validated business needs are running on each system, and perform automated port scans on a regular basis.
Data Recovery Capabi­lities
Ensure that all system data and key systems are automa­tically backed up on a regular basis.
Secure Config­uration for Network Devices, such as Firewalls, Routers, and Switches
Compare all network device config­ura­tions against approved security config­ura­tions, and manage all network devices using multi-­factor authen­tic­ation and encrypted sessions.
Boundary Defense
Deny commun­ica­tions with known malicious or unused Internet IP addresses and limit access only to trusted and necessary IP address ranges.
Data Protection
Deploy an automated tool on network perimeters that monitors for unauth­orized transfer of sensitive inform­ation and blocks such transfers while alerting inform­ation security profes­sio­nals.
Controlled Access Based on the Need to Know
Segment the network based on the label or classi­fic­ation level of the inform­ation stored.
Wireless Access Control
Leverage the Advanced Encryption Standard to encrypt wireless data in transit and create a separate wireless network for personal or untrusted devices.
Account Monitoring and Control
Require multi-­factor authen­tic­ation for all user accounts on all systems, whether managed onsite or by a third-­party provider.
Implement a Security Awareness and Training Program
Perform a skills gap analysis and train the workforce on how to identify different forms of social engine­ering attacks, such as phishing, phone scams, and impers­onation calls.
Applic­ation Software Security
Establish secure coding practices approp­riate to the progra­mming language and develo­pment enviro­nment being used.
Incident Response & Management
Ensure that there are written incident response plans that define the roles of personnel as well as phases of incident handli­ng/­man­age­ment.
Penetr­ation Tests and Red Team Exercises
Establish a program for penetr­ation tests that includes a full scope of common attacks, such as wireless, client­-based, and web applic­ation attacks.

The CIS Critical Security Controls

CIS CONTROLS
EXPLAN­ATION
Inventory and Control of Hardware Assets
Identify devices on your organi­zat­ion’s network, keep them updated, and maintain an inventory of assets that store or process inform­ation.
Inventory and Control of Software Assets
Use software inventory tools to automate all software docume­ntation to ensure unauth­orized software is blocked from executing on assets.
Continuous Vulner­ability Management
Utilize a complaint vulner­ability scanning tool to monitor your systems on the network to identify vulner­abi­lities and keep them up to date.
Controlled Use of Admini­str­ative Privileges
Configure systems to issue a log entry, alert when accounts are changed, and ensure admini­str­ative accounts have proper access.
Secure Config­uration for Hardware and Software on Mobile Devices, Laptops, Workst­ations, and Servers
Maintain docume­nted, standard security config­uration standards for all authorized operating systems and software.
Mainte­nance, Monito­ring, and Analysis of Audit Logs
Ensure that local logging has been enabled and approp­riate logs are aggregated to a central log management system for analysis and review.
Email and Web Browser Protec­tions
Ensure that only supported web browsers and email clients can execute in the organi­zation using the latest official version.
Malware Defenses
Utilize centrally managed anti-m­alware software to monitor and defend each organi­zat­ion's workst­ations and servers contin­uously.
Limita­tions and Control of Network Ports, Protocols, and Services
Ensure that only network ports, protocols, and services listening on a system with validated business needs are running on each system, and perform automated port scans on a regular basis.
Data Recovery Capabi­lities
Ensure that all system data and key systems are automa­tically backed up on a regular basis.
Secure Config­uration for Network Devices, such as Firewalls, Routers, and Switches
Compare all network device config­ura­tions against approved security config­ura­tions, and manage all network devices using multi-­factor authen­tic­ation and encrypted sessions.
Boundary Defense
Deny commun­ica­tions with known malicious or unused Internet IP addresses and limit access only to trusted and necessary IP address ranges.
Data Protection
Deploy an automated tool on network perimeters that monitors for unauth­orized transfer of sensitive inform­ation and blocks such transfers while alerting inform­ation security profes­sio­nals.
Controlled Access Based on the Need to Know
Segment the network based on the label or classi­fic­ation level of the inform­ation stored.
Wireless Access Control
Leverage the Advanced Encryption Standard to encrypt wireless data in transit and create a separate wireless network for personal or untrusted devices.
Account Monitoring and Control
Require multi-­factor authen­tic­ation for all user accounts on all systems, whether managed onsite or by a third-­party provider.
Implement a Security Awareness and Training Program
Perform a skills gap analysis and train the workforce on how to identify different forms of social engine­ering attacks, such as phishing, phone scams, and impers­onation calls.
Applic­ation Software Security
Establish secure coding practices approp­riate to the progra­mming language and develo­pment enviro­nment being used.
Incident Response & Management
Ensure that there are written incident response plans that define the roles of personnel as well as phases of incident handli­ng/­man­age­ment.
Penetr­ation Tests and Red Team Exercises
Establish a program for penetr­ation tests that includes a full scope of common attacks, such as wireless, client­-based, and web applic­ation attacks.
 

Comments

No comments yet. Add yours below!

Add a Comment

Your Comment

Please enter your name.

    Please enter your email address

      Please enter your Comment.

          Related Cheat Sheets

          Access Control Models Cheat Sheet
          GSEC OVERVIEW Cheat Sheet

          More Cheat Sheets by xoulea

          Computer Networks Cheat Sheet
          Nmap Cheat Sheet