{"id":43,"date":"2017-01-19T23:27:51","date_gmt":"2017-01-19T23:27:51","guid":{"rendered":"https:\/\/hjinterim.wordpress.com\/?p=43"},"modified":"2017-01-19T23:27:51","modified_gmt":"2017-01-19T23:27:51","slug":"sans-top-20-critical-security-controls-and-ssh","status":"publish","type":"post","link":"https:\/\/hjinterim.tech\/index.php\/2017\/01\/19\/sans-top-20-critical-security-controls-and-ssh\/","title":{"rendered":"SANS Top 20 Critical Security Controls and SSH"},"content":{"rendered":"<figure id=\"attachment_1830\" aria-describedby=\"caption-attachment-1830\" style=\"width: 1190px\" class=\"wp-caption alignnone\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-1830\" src=\"https:\/\/hjinterim.files.wordpress.com\/2017\/01\/cyber-security-cogs-fotolia.jpg\" alt=\"Cyber Security on the Gears.\" width=\"1200\" height=\"400\" \/><figcaption id=\"caption-attachment-1830\" class=\"wp-caption-text\">Cyber Security on the Mechanism of Metal Gears.<\/figcaption><\/figure>\n<h2>What Are the SANS 20 Controls?<\/h2>\n<p>The SANS CIS Critical Security Controls (SANS CIS) are a recommended set of actions for cyber defense that provide specific and actionable ways to stop today\u2019s most pervasive and dangerous attacks. The controls are applicable for all kinds of business and IT organizations, and they analyze all the data about attacks and intrusions. The objective of the SANS CIS top 20 Controls is to protect your critical assets, infrastructure, and information. The controls will help identify your network vulnerabilities, strength your organization\u2019s defensive posture and to monitor of your sensitive information. Benefits include (to name a few):<\/p>\n<p>\u2022 Compromises will be reduced,<\/p>\n<p>\u2022 The need for recovery efforts will be minimized,<\/p>\n<p>\u2022 And the associated costs will be cut down.<\/p>\n<p>SANS CIS suggests that you conduct a security control gap assessment to compare your organization\u2019s current security stance to the detailed recommendations of the critical controls. SSH communication solutions support your gap assessment effort and offers up reports that further confirms the effectiveness of your access controls. Additionally, our solutions are key to the organizations\u2019 provisioning systems and access governance processes.<\/p>\n<p>Furthermore, SSH communication security solutions will continuously monitor your network to ensure the security and trust of elevated, privileged and 3rd party access controls.<\/p>\n<h2>SANS Top 20 Critical Security Controls and SSH<\/h2>\n<p>Information security is a complex and multi-faceted topic. Security requires attention on multiple levels, all the way from individual users and applications and down to the level of systems and networks. While some aspects of information security have all along been in focus and under tight security scrutiny, there are also areas that have received less attention. The user- and application-level identity and security management appears to be an area that the security industry players have placed their emphasis on, while system-level issues have traditionally seen less attention.<\/p>\n<p>Given the purpose of SANS CIS CSC which is defensive actions to stop dangerous cyber attacks, the SSH protocol contributes to the defense bottom line by:<\/p>\n<p>\u2022 Scanning and detecting the network such as IP addresses and identify hosts based on analyzing their traffic. In this way, both authorized and unauthorized devices and system would be detected.<\/p>\n<p>\u2022 Encrypting traffic between two end points, and supporting the protection of secure access.<\/p>\n<p>\u2022 Is a secure alternative\/replacement for older tools (telnet, FTP, rsh, etc.) that prevents unauthorized access to the network, which could lead to security breach?<\/p>\n<p>\u2022 Ensuring only authorized users access to the system.<\/p>\n<p>\u2022 Securing mission critical backups and business continuity processes.<\/p>\n<p>\u2022 Most of all, preventing man-in-the middle attacks, and provide a secure network environment.<\/p>\n<h2>SANS Controls and SSH Guidance<\/h2>\n<p>Many of the SANS CIS CSC are directly or indirectly impacted by your SSH key deployment. The following table highlights a few best practices and security control implementations that will help to ensure your compliance with SANS CIS:<\/p>\n<div class=\"slate-resizable-image-embed slate-image-embed__resize-full-width\"><img decoding=\"async\" class=\"alignnone size-full wp-image-1832\" src=\"https:\/\/hjinterim.files.wordpress.com\/2017\/01\/sans-20-1.jpg\" alt=\"sans-20 1\" width=\"1024\" height=\"715\" \/><\/div>\n<div class=\"slate-resizable-image-embed slate-image-embed__resize-full-width\"><\/div>\n<div class=\"slate-resizable-image-embed slate-image-embed__resize-full-width\"><img decoding=\"async\" class=\"alignnone size-full wp-image-1833\" src=\"https:\/\/hjinterim.files.wordpress.com\/2017\/01\/sans-20-2.jpg\" alt=\"sans-20 2\" width=\"1024\" height=\"718\" \/><\/div>\n<h2><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1831\" src=\"https:\/\/hjinterim.files.wordpress.com\/2017\/01\/sans_top_20_controls_relate_to_ssh_key_based_access.png\" alt=\"SANS_top_20_controls_relate_to_SSH_key_based_access\" width=\"1139\" height=\"579\" \/><\/h2>\n<h2>Recommendations<\/h2>\n<p>The consequences of cyber-attacks are very severe since unauthorized individuals can gain access to private networks to steal important and sensitive data. Organizations should pay attention to critical security controls to ensure unauthorized devices and individuals are blocked from accessing or connecting to systems.<\/p>\n<p>The CIS Controls are particularly significant because they are upgraded by digital specialists, taking into account real threat information pulled from various open and private danger sources. Professionals from different associations joined their insight to make this agreement of controls, and it is an incredible reference point for any association hoping to enhance their data security stance. The superiority of SANS CIS Control is the prioritization. The Controls are intended to help organizations define the starting points for their defenses by guiding them to perform vulnerability assessments. Additionally, the Controls will direct organizations focus on the risks that are unique to their business and provide suggestions and methods for them to pay attention. As a result, organizations will receive immediate and high-value results by taking on actions followed the instructions of the SANS CIS Controls.<\/p>\n<p>Organizations should improve their security processes by including the numerous existing SSH identities as part of their overall identity and access management practices. Because lack of understanding how SSH is deployed and managed could lead severe consequences, your system could be attacked by unauthorized individuals, and your organizations are also under a risk of compliance perspective.<\/p>\n<p>SSH Communications Security products contribute to ensuring all controls states are implemented effectively. By using the products with proper deployment and configuration, organizations will be able to enhance their security procedures further. The SSH Communications Security tools will also detect the authorized and unauthorized devices to make sure only authorized devices connect to the system. By detecting into the secure connections and transmissions across your system, our product would evaluate, monitor and remediate all risks that associated with your SSH infrastructure. Thus, your organization will be on the progressing of achieving continuous compliance.<\/p>\n<p>Download the SANS 2016 poster below<\/p>\n<p>\u2022 <a href=\"http:\/\/www.sans.org\/media\/critical-security-controls\/critical-controls-poster-2016.pdf\" target=\"_blank\" rel=\"nofollow noopener\">SANS 2016 poster on the top-20 critical controls<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What Are the SANS 20 Controls? The SANS CIS Critical Security Controls (SANS CIS) are a recommended set of actions for cyber defense that provide specific and actionable ways to stop today\u2019s most pervasive and dangerous attacks. The controls are applicable for all kinds of business and IT organizations, and they analyze all the data &#8230; <a title=\"SANS Top 20 Critical Security Controls and SSH\" class=\"read-more\" href=\"https:\/\/hjinterim.tech\/index.php\/2017\/01\/19\/sans-top-20-critical-security-controls-and-ssh\/\">Read more<span class=\"screen-reader-text\">SANS Top 20 Critical Security Controls and SSH<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":1830,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[20],"tags":[],"class_list":["post-43","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-gdpr"],"_links":{"self":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts\/43","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/comments?post=43"}],"version-history":[{"count":0,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts\/43\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/media?parent=43"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/categories?post=43"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/tags?post=43"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}