Skip to main content

Critical Security Control V7.0.1

SANS Institute and Center for Internet Security (CIS) together with other organizations, developed the 20 Critical Security Controls (CSC) for Effective Cyber Defense.

CIS Controls are not a replacement for any existing compliance framework such ISMS, NIST, CSF, PCI etc, rather it’s core building block toward any GRC journey.
What is CSC?
  1. Critical security Controls are recommended sets of actions for effective cyber defence.
  2. Provides specific and actionable ways to stop today's most pervasive and dangerous attacks.
Whys CSC? 
  1. A principal benefit of the controls is that they prioritize and focus on smaller number of actions with high pay-off results.
  2. The controls are effective because they are derived from the most common attack patterns highlighted in the leading threat report and vetted across by a very broad community of government and industry practitioners.
  3. Created by people who know how attacks work such as:
    • NSA Red & Blue team
    • US Dept of Energy.
    • Nuclear energy labs
    • Law enforcement org.
    • Nations top forensics and incident response org.
  4. Continued value is that controls are updated based on new attacks that are identified and analyzed by groups from Verizon to Symantec.
  5. Addresses the key control requirement from various standards, frameworks & regulations at operational level.
More details on CSC v7.0.1 can be found at https://www.cisecurity.org/controls/

Comments

Post a Comment

Popular posts from this blog

MTBF MTTR MTTD

Juniper SRX : Proxy ARP on Juniper SRX

Proxy ARP ( Address Resolution Protocol ) is a technique by which a intermediate network device like router replies to ARP request for a given IP address that is not part of local network.  The router acts as a proxy for the destination device to which the host wants to communicate and provides its own MAC address as the reply. Note: Proxy ARP can help devices on a network reach remote subnets without the need to configure routing or a default gateway. Disadvantages of Proxy ARP Proxy ARP can lead to security and performance issues on the network.  It poses a security risk by making the network vulnerable to ARP spoofinf attack. In attacks, malicious devices can impersonate proxies. Intercept or modify traffic between devices. It may introduce inconsistency into the network’s topology. Addressing scheme by concealing device locations and identities. Let see when and how proxy ARP is configured in Juniper by answering below questions which often comes to our mind ...