{"id":55,"date":"2017-01-19T23:37:09","date_gmt":"2017-01-19T23:37:09","guid":{"rendered":"https:\/\/hjinterim.wordpress.com\/?p=55"},"modified":"2017-01-19T23:37:09","modified_gmt":"2017-01-19T23:37:09","slug":"parsing-the-20-critical-security-controls","status":"publish","type":"post","link":"https:\/\/hjinterim.tech\/index.php\/2017\/01\/19\/parsing-the-20-critical-security-controls\/","title":{"rendered":"Parsing The 20 Critical Security Controls"},"content":{"rendered":"<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone  wp-image-1793\" src=\"https:\/\/hjinterim.files.wordpress.com\/2017\/01\/d3a4febf87d1929fe6b3411042884151.jpg\" alt=\"d3a4febf87d1929fe6b3411042884151\" width=\"861\" height=\"646\" \/><\/p>\n<p>As a CISO you\u2019re faced with a fairly daunting challenge \u2013 ensure that everything you do for your enterprise is effective for your security and for your compliance.\u00a0The key word isn\u2019t security, and it\u2019s not compliance, it\u2019s\u00a0<em>effective<\/em>.\u00a0How do you know what you\u2019re doing is effective when you\u2019re potentially faced with legal (SOX), regulatory (HIPAA), contractual (PCI), and internal (ISO) requirements?\u00a0What does effective really mean, anyway?\u00a0One might say that effective is maximizing value for the minimum possible resource expense.\u00a0If you\u2019re just getting started with your security program, or want to ensure that you\u2019re moving in the right direction, this post (and many that follow) is for you.<\/p>\n<p>Recently, the Center for Strategic and International Studies (CSIS) released version four of the 20 Critical Security Controls (hosted\u00a0<a href=\"http:\/\/www.sans.org\/critical-security-controls\/\" target=\"_blank\" rel=\"nofollow noopener\">here<\/a>\u00a0by SANS).\u00a0Rather than paraphrase how these 20 critical controls were determined, I\u2019ll quote:<\/p>\n<p>These Top 20 Controls were agreed upon by a powerful consortium brought together by John Gilligan (previously CIO of the US Department of Energy and the US Air Force) under the auspices of the Center for Strategic and International Studies. Members of the Consortium include NSA, US Cert, DoD JTF-GNO, the Department of Energy Nuclear Laboratories, Department of State, DoD Cyber Crime Center plus the top commercial forensics experts and pen testers that serve the banking and critical infrastructure communities.<\/p>\n<p>The 20 critical controls (I\u2019ll call them the \u201cControls\u201d from here on out) talk about four tenets (again quoting from the source):<\/p>\n<ol>\n<li><strong>Offense informs defense:<\/strong>\u00a0Use knowledge of actual attacks that have compromised systems to provide the foundation to build effective defenses.<\/li>\n<li><strong>Metrics:<\/strong>\u00a0Establish common metrics to provide a shared language for executives, IT specialists, auditors, and security officials to measure the effectiveness of security measures within an organization so that required adjustments can be identified and implemented quickly.<\/li>\n<li><strong>Continuous monitoring:<\/strong>\u00a0Carry out continuous monitoring\/auditing to test and validate whether current security measures are proactively remediating vulnerabilities in a timely manner.<\/li>\n<li><strong>Automation:<\/strong>\u00a0Automate defenses so that organizations can achieve reliable, scalable, and continuous measurements of their adherence to the controls and related metrics.<\/li>\n<\/ol>\n<p>Implementing the Controls, while terse when compared to the likes of NIST 800-53 and COBIT v5, will take you on an informational journey through your enterprise.\u00a0Using communication methods such as Entity Relationship Diagrams and putting each control into contexts such as \u201cquick wins,\u201d \u201cvisibility and attribution,\u201d \u201cimproved information security configuration and hygiene,\u201d and \u201cadvanced sub-controls\u201d really helps you plan for an iterative improvement process over time.\u00a0Additionally, there\u2019s nothing mandating that you cover each control in order.\u00a0In fact, it\u2019s quite reasonable to start out of order.\u00a0For example, the National Security Agency has a view of the Controls as represented in the Controls\u2019 2016 Poster (<a href=\"http:\/\/www.sans.org\/security-resources\/posters\/special\/20-critical-security-controls-55\" target=\"_blank\" rel=\"nofollow noopener\">PDF<\/a>) \u2013 the following image was captured from that poster.<\/p>\n<div class=\"slate-resizable-image-embed slate-image-embed__resize-full-width\"><img decoding=\"async\" class=\"alignnone size-full wp-image-1791\" src=\"https:\/\/hjinterim.files.wordpress.com\/2017\/01\/20-critical-controls-poster-2013-1.jpg\" alt=\"20-Critical-Controls-Poster-2013-1\" width=\"1600\" height=\"1137\" \/><\/div>\n<p>NSA View of 20 Critical Controls<\/p>\n<p>Because the Controls are broad and go deep, it would be folly to treat them all in a single post.\u00a0So, consider this post the first in a series that is \u201cParsing The 20 Critical Security Controls.\u201d\u00a0To that end, I intend to scour each control in order to identify the primary actors, identified processes and tools, and to call out detailed requirements your organization can then use as a checklist of sorts.\u00a0Then, we can have a discussion about how whether present categorization makes sense, identify gaps, and propose solutions (probably not for the light-hearted).<\/p>\n<p>The only problem is that I\u2019m not sure in what order I should cover them.<\/p>\n<p>This is where I could use your help \u2013 do you have a preference?<\/p>\n<ul>\n<li>Critical Control 1: Inventory of Authorized and Unauthorized Devices<\/li>\n<li>Critical Control 2: Inventory of Authorized and Unauthorized Software<\/li>\n<li>Critical Control 3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers<\/li>\n<li>Critical Control 4: Continuous Vulnerability Assessment and Remediation<\/li>\n<li>Critical Control 5: Malware Defenses<\/li>\n<li>Critical Control 6: Application Software Security<\/li>\n<li>Critical Control 7: Wireless Device Control<\/li>\n<li>Critical Control 8: Data Recovery Capability<\/li>\n<li>Critical Control 9: Security Skills Assessment and Appropriate Training to Fill Gaps<\/li>\n<li>Critical Control 10: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches<\/li>\n<li>Critical Control 11: Limitation and Control for Network Ports, Protocols, and Services<\/li>\n<li>Critical Control 12: Controlled Use of Administrative Privileges<\/li>\n<li>Critical Control 13: Boundary Defense<\/li>\n<li>Critical Control 14: Maintenance, Monitoring, and Analysis of Audit Logs<\/li>\n<li>Critical Control 15: Controlled Access Based on the Need to Know<\/li>\n<li>Critical Control 16: Account Monitoring and Control<\/li>\n<li>Critical Control 17: Data Loss Prevention<\/li>\n<li>Critical Control 18: Incident Response and Management<\/li>\n<li>Critical Control 19: Secure Network Engineering<\/li>\n<li>Critical Control 20: Penetration Tests and Red Team Exercises<\/li>\n<\/ul>\n<p>After reading this and try to understand the security and awareness you take a better look at below figure.<\/p>\n<div class=\"slate-resizable-image-embed slate-image-embed__resize-full-width\"><img decoding=\"async\" class=\"alignnone size-full wp-image-1795\" src=\"https:\/\/hjinterim.files.wordpress.com\/2017\/01\/95.jpg\" alt=\"95\" width=\"4538\" height=\"3188\" \/><\/div>\n<p>CIS Critical Security Controls you should be aware of&#8230;<\/p>\n<div class=\"slate-resizable-image-embed slate-image-embed__resize-full-width\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1792\" src=\"https:\/\/hjinterim.files.wordpress.com\/2017\/01\/55.jpg\" alt=\"55\" width=\"4500\" height=\"3150\" \/><\/div>\n<p>As always stay save and gain awareness of your environment&#8230;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As a CISO you\u2019re faced with a fairly daunting challenge \u2013 ensure that everything you do for your enterprise is effective for your security and for your compliance.\u00a0The key word isn\u2019t security, and it\u2019s not compliance, it\u2019s\u00a0effective.\u00a0How do you know what you\u2019re doing is effective when you\u2019re potentially faced with legal (SOX), regulatory (HIPAA), contractual &#8230; <a title=\"Parsing The 20 Critical Security Controls\" class=\"read-more\" href=\"https:\/\/hjinterim.tech\/index.php\/2017\/01\/19\/parsing-the-20-critical-security-controls\/\">Read more<span class=\"screen-reader-text\">Parsing The 20 Critical Security Controls<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":1793,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[20],"tags":[],"class_list":["post-55","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-gdpr"],"_links":{"self":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts\/55","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/comments?post=55"}],"version-history":[{"count":0,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts\/55\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/media?parent=55"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/categories?post=55"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/tags?post=55"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}