Action Plan For Implementing Cyber Essentials
Action Plan For Implementing Cyber Essentials
• Inventory all hardware, software and data assets. Monitor network activity.
• Keep all systems and software up-to-date and patched. Remove unauthorized or
unsupported assets.
• Implement secure configurations on all devices.
• Use email and web browser security settings to prevent spoofed emails and block
malicious sites.
• Allow only approved software to run on systems.
• Establish a formal change management process to review security before
implementing any system changes.
• Perform vulnerability scans at least monthly and promptly remediate critical flaws.
• Encrypt data at rest on servers, in transit over networks, and on portable devices like
laptops and phones.
• Segment networks to isolate critical systems. Restrict inbound and outbound traffic
to only necessary ports/protocols.
• Disable unnecessary services, software and accounts. Restrict administrative
privileges.
• Implement application allowlisting to prevent execution of unauthorized software,
especially on critical servers.
• Perform regular vulnerability scanning and penetration testing to identify and
remediate security weaknesses.
• Use file integrity monitoring to detect unauthorized changes to critical system files
and directories.
• Deploy web application firewalls and database activity monitoring to protect against
application-layer attacks.
• Implement Data Loss Prevention (DLP) solutions to detect and prevent unauthorized
data exfiltration.
4. Ensure only authorized users access systems
• Develop, test and update an incident response plan with clear roles and
communications guidelines.
• Use business impact assessments to prioritize systems to restore first.
• Establish relationships with external incident response support providers.
• Contain incidents quickly to limit damage. Communicate transparently.
• Define criteria for declaring an incident and activating the response plan. Include
both technical and business factors.
• Identify forensic data sources like system logs and network packet captures to aid
investigation.
• Prepare communication templates for notifying internal and external stakeholders,
including law enforcement if applicable.
• Practice incident response procedures via tabletop exercises and live simulations at
least annually.
• Conduct a "lessons learned" review after major incidents to identify areas for
improvement.
• Predefine incident severity levels and corresponding response actions,
communication requirements and escalation paths.
• Identify and train an incident response team with representation from IT, security,
legal, HR and public relations.
• Establish relationships with external incident response firms and legal counsel before
an incident occurs.
• Create an incident response "playbook" with step-by-step procedures for common
incident types.
• Conduct "lessons learned" reviews after incidents and tests to identify areas for
improvement in detective and preventive controls.