Implement These 10 CIS Controls

Increase your cybersecurity level with these 10 CIS Controls

The Center for Internet Security (CIS) has developed a set of 20 critical security controls that organizations can use to improve their cybersecurity. These controls are designed to provide a strong foundation for protecting against the most common cyber threats. In this blog post, we will discuss the top 10 CIS controls and how they can make a world of difference in improving your cybersecurity.

Top 10 CIS Controls

  1. Inventory of Authorized and Unauthorized Devices: One of the most important controls is to maintain an inventory of all devices connected to your network, including both authorized and unauthorized devices. This will help you identify any potential security risks and take action to address them.
  2. Inventory of Authorized and Unauthorized Software: Another important control is to maintain an inventory of all software installed on your systems, including both authorized and unauthorized software. This will help you identify any potential security risks and take action to address them.  
  3. Secure Configurations for Hardware and Software: Properly configuring your systems and software is essential for protecting against cyber threats. The CIS controls recommend that you implement secure configurations for all hardware and software, including setting up firewalls, antivirus software, and other security measures.
  4. Continuous Vulnerability Management: Vulnerability management is critical for identifying and addressing vulnerabilities in your systems. The CIS controls recommend that you perform regular vulnerability scans and apply security updates in a timely manner.
  5. Controlled Use of Administrative Privileges: Limiting the number of users with administrative privileges can help to reduce the risk of a cyber attack. The CIS controls recommend that you limit administrative access to only those who need it and that you monitor the use of administrative privileges.
  6. Maintenance, Monitoring, and Analysis of Audit Logs: Auditing is critical for identifying security incidents and determining the root cause of a security breach. The CIS controls recommend that you maintain, monitor, and analyze audit logs on a regular basis.
  7. Email and Web Browser Protections: Email and web browsers are common entry points for cybercriminals. The CIS controls recommend that you implement email and web browser protections, including using anti-spam and anti-phishing software and disabling browser plugins that may be used to exploit vulnerabilities.
  8. Malware Defenses: Malware is a major threat to cybersecurity. The CIS controls recommend that you implement malware defenses, including using antivirus and anti-malware software and implementing a patch management program.
  9. Limitation and Control of Network Ports, Protocols, and Services: Limiting and controlling network ports, protocols, and services can help to reduce the risk of a cyber attack. The CIS controls recommend that you limit and control network access, including disabling unnecessary ports and protocols and implementing network segmentation.
  10. Data Recovery Capability: Data recovery is critical for restoring access to data following a cyber attack. The CIS controls recommend that you implement a data recovery plan that includes regularly backing up data, testing backups, and maintaining off-site copies of data.
    In conclusion, the CIS controls provide a strong foundation for protecting against the most common cyber threats. By implementing these controls, you can improve your cybersecurity and protect your organization, your data and your people. By identifying and addressing vulnerabilities, implementing security measures, and monitoring your systems, you can greatly reduce the risk of a cyber attack and keep your business safe.

Ref: https://www.cisecurity.org/controls/cis-controls-list


January 12, 2023
Share this post
Tags
Archive
Traditional Antivirus Software is No Longer Enough to Protect Your Business
Sophisticated Cybercriminals Require Sophisticated Protection