0% found this document useful (0 votes)
13 views

CIS controls

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

CIS controls

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

SOC Experts

Cybersecurity Career Launcher

Assignment #8
CIS Critical Control

Sl Control Purpose Technologies Products


No
Organizations must actively Asset HP Asset Manager
Inventory and
1 manage all the hardware Management
Control of
Enterprise Assets devices on the network, so Tool
that only authorized devices
are given access and
unauthorized devices can be
quickly identified and
disconnected before they inflict
any harm
Actively manage (inventory, Asset Automate
Inventory and
2 track, and correct) all software Management Inventory
Control of
Software Assets (operating systems and software Management
applications) on the network
so that only authorized
software is installed and can
execute, and that unauthorized
and unmanaged software is
found and prevented from
installation or execution.

Develop processes and Data AxCrypt Premium


Data Protection
3 technical controls to identify, Encryption
classify, securely handle,
retain, and dispose of data.

Establish and maintain the Firewall Check point


Secure
4 secure configuration of software
enterprise assets (end-user
devices, including portable and
mobile; network devices; non-
computing/IoT devices; and
servers) and software
(operating systems and
applications).
Account Use processes and tools to Active Windows AD,
5 Management assign and manage Directory Azure Ad
authorization to credentials for
user accounts, including
administrator accounts, as well
as service accounts, to
enterprise assets and
software.
SOC Experts
Cybersecurity Career Launcher

Access Control Use processes and tools to Domain Fintech Data


6 Management create, assign, manage, and controller Privacy Vault
revoke access credentials and
privileges for user,
administrator, and service
accounts for enterprise assets
and software.
Continuous Develop a plan to continuously Vulnerability Qualis
7 Vulnerability assess and track vulnerabilities Assessment
Management on all enterprise assets within solution
the enterprise’s infrastructure,
in order to remediate, and
minimize, the window of
opportunity for attackers.
Monitor public and private
industry sources for new threat
and vulnerability information.
Audit Log Collect, alert, review, and Windows Palo Alto EDR
8 Management retain audit logs of events that event log
could help detect, understand,
or recover from an attack.
Email and Web Improve protections and Email Proof point
9 Browser detections of threats from Security
Protections email and web vectors, as
these are opportunities for
attackers to manipulate human
behavior through direct
engagement.
Malware Prevent or control the EDR Fire I HX
10 Defenses installation, spread, and
execution of malicious
applications, code, or scripts
on enterprise assets.

Data Recovery Establish and maintain data Data AWS cloud


11 recovery practices sufficient to Redundancy
restore in-scope enterprise
assets to a pre-incident and
trusted state.

Network Establish, implement, and Cloud Sumo Logic


12 Infrastructure actively manage (track, report, Resource
Management correct) network devices, in Management
order to prevent attackers
from exploiting vulnerable
network services and access
points.
SOC Experts
Cybersecurity Career Launcher

Network Operate processes and tooling Network and SolarWinds


13 Monitoring and to establish and maintain System
Defense comprehensive network Management
monitoring and defense
against security threats across
the enterprise’s network
infrastructure and user base.
Security Establish and maintain a Phishing Hoxhunt
14 Awareness and security awareness program to Risk Test.
Skills Training influence behavior among the
workforce to be security
conscious and properly skilled
to reduce cybersecurity risks
to the enterprise.
Service Provider Develop a process to evaluate Jira Service ITSM
15 Management service providers who hold Management
sensitive data, or are
responsible for an enterprise’s
critical IT platforms or
processes, to ensure these
providers are protecting those
platforms and data
appropriately.

Application Manage the security life cycle Software Veracode


16 Software of in-house developed, hosted, Composition
Security or acquired software to Analysis
prevent, detect, and remediate
security weaknesses before
they can impact the
enterprise.

Incident SIEM Splunk


17 Response and Establish a program to develop
Management and maintain an incident
response capability (e.g.,
policies, plans, procedures,
defined roles, training, and
communications) to prepare,
detect, and quickly respond to
an attack.

Penetration Test the effectiveness and Vapt Cuko Sandbox,


18 Testing resiliency of enterprise assets Metasploit
through identifying and
exploiting weaknesses in
controls (people, processes,
and technology), and
simulating the objectives and
actions of an attacker.

You might also like