ETSI TR 103 305-1: Cyber Critical Security Controls For Effective Cyber Defence Part 1: The Critical Security Controls
ETSI TR 103 305-1: Cyber Critical Security Controls For Effective Cyber Defence Part 1: The Critical Security Controls
1 (2016-08)
TECHNICAL REPORT
CYBER;
Critical Security Controls for Effective Cyber Defence;
Part 1: The Critical Security Controls
2 ETSI TR 103 305-1 V2.1.1 (2016-08)
Reference
RTR/CYBER-0012-1
Keywords
Cyber Security, Cyber-defence, information
assurance
ETSI
Important notice
The present document may be made available in electronic versions and/or in print. The content of any electronic and/or
print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any
existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the
print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at
https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx
If you find errors in the present document, please send your comment to one of the following services:
https://portal.etsi.org/People/CommiteeSupportStaff.aspx
Copyright Notification
No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying
and microfilm except as authorized by written permission of ETSI.
The content of the PDF version shall not be modified without the written authorization of ETSI.
The copyright and the foregoing restriction extend to reproduction in all media.
DECTTM, PLUGTESTSTM, UMTSTM and the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members.
3GPPTM and LTE™ are Trade Marks of ETSI registered for the benefit of its Members and
of the 3GPP Organizational Partners.
GSM® and the GSM logo are Trade Marks registered and owned by the GSM Association.
ETSI
3 ETSI TR 103 305-1 V2.1.1 (2016-08)
Contents
Intellectual Property Rights ................................................................................................................................4
Foreword.............................................................................................................................................................4
Modal verbs terminology....................................................................................................................................4
Executive summary ............................................................................................................................................4
Introduction ........................................................................................................................................................5
1 Scope ........................................................................................................................................................6
2 References ................................................................................................................................................6
2.1 Normative references ......................................................................................................................................... 6
2.2 Informative references ........................................................................................................................................ 6
3 Definitions and abbreviations ...................................................................................................................6
3.1 Definitions .......................................................................................................................................................... 6
3.2 Abbreviations ..................................................................................................................................................... 7
4 Critical Security Controls .........................................................................................................................8
4.0 Structure of the Critical Security Controls Document ........................................................................................ 8
4.1 CSC 1: Inventory of Authorized and Unauthorized Devices.............................................................................. 8
4.2 CSC 2: Inventory of Authorized and Unauthorized Software .......................................................................... 10
4.3 CSC 3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations,
and Servers ....................................................................................................................................................... 12
4.4 CSC 4: Continuous Vulnerability Assessment and Remediation ..................................................................... 14
4.5 CSC 5: Controlled Use of Administrative Privileges ....................................................................................... 16
4.6 CSC 6: Maintenance, Monitoring, and Analysis of Audit Logs ....................................................................... 18
4.7 CSC 7: Email and Web Browser Protections ................................................................................................... 20
4.8 CSC 8: Malware Defenses................................................................................................................................ 22
4.9 CSC 9: Limitation and Control of Network Ports, Protocols, and Services ..................................................... 24
4.10 CSC 10: Data Recovery Capability .................................................................................................................. 25
4.11 CSC 11: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches.................... 26
4.12 CSC 12: Boundary Defense.............................................................................................................................. 28
4.13 CSC 13: Data Protection .................................................................................................................................. 31
4.14 CSC 14: Controlled Access Based on the Need to Know ................................................................................ 33
4.15 CSC 15: Wireless Access Control .................................................................................................................... 35
4.16 CSC 16: Account Monitoring and Control ....................................................................................................... 36
4.17 CSC 17: Security Skills Assessment and Appropriate Training to Fill Gaps ................................................... 38
4.18 CSC 18: Application Software Security ........................................................................................................... 41
4.19 CSC 19: Incident Response and Management ................................................................................................. 42
4.20 CSC 20: Penetration Tests and Red Team Exercises ....................................................................................... 44
Annex A: Evolving An Attack Model for the Critical Security Controls .........................................47
Annex B: Attack Types ..........................................................................................................................49
History ..............................................................................................................................................................50
ETSI
4 ETSI TR 103 305-1 V2.1.1 (2016-08)
Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee
can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web
server) which are, or may be, or may become, essential to the present document.
Foreword
This Technical Report (TR) has been produced by ETSI Technical Committee Cyber Security (CYBER).
The present document is part 1 of a multi-part deliverable covering the Critical Security Controls for Effective Cyber
Defence, as identified below:
"must" and "must not" are NOT allowed in ETSI deliverables except when used in direct citation.
Executive summary
The present document captures and describes the top twenty Enterprise industry level cybersecurity best practices that
provide enhanced cyber security, developed and maintained by the Center for Internet Security (CIS) (formerly the
Council on CyberSecurity) as an independent, expert, global non-profit organization. The CIS provides ongoing
development, support, adoption, and use of the Critical Security Controls [i.1]. The Controls reflect the combined
knowledge of actual attacks and effective defences of experts from every part of the cyber security ecosystem. This
ensures that the Controls are an effective and specific set of technical measures available to detect, prevent, respond,
and mitigate damage from the most common to the most advanced of those attacks.
The Controls are not limited to blocking the initial compromise of systems, but also address detecting
already-compromised machines and preventing or disrupting attackers' follow-on actions. The defences identified
through these Controls deal with reducing the initial attack surface by hardening device configurations, identifying
compromised machines to address long-term threats inside an organization's network, disrupting attackers' command-
and-control of implanted malicious code, and establishing an adaptive, continuous defence and response capability that
can be maintained and improved. The five critical tenets of an effective cyber defence system as reflected in the Critical
Security Controls are:
• Offense informs defence: Use knowledge of actual attacks that have compromised systems to provide the
foundation to continually learn from these events to build effective, practical defences. Include only those
controls that can be shown to stop known real-world attacks.
ETSI
5 ETSI TR 103 305-1 V2.1.1 (2016-08)
• Prioritization: Invest first in Controls that will provide the greatest risk reduction and protection against the
most dangerous threat actors, and that can be feasibly implemented in a computing environment.
• Metrics: Establish common metrics to provide a shared language for executives, IT specialists, auditors, and
security officials to measure the effectiveness of security measures within an organization so that required
adjustments can be identified and implemented quickly.
• Continuous diagnostics and mitigation: Carry out continuous measurement to test and validate the
effectiveness of current security measures, and to help drive the priority of next steps.
• Automation: Automate defences so that organizations can achieve reliable, scalable, and continuous
measurements of their adherence to the Controls and related metrics.
Introduction
The evolution of cyber defence is increasingly challenging. Massive data losses, theft of intellectual property, credit
card breaches, identity theft, threats to privacy, denial of service - these have become endemic. Access exists to an
extraordinary array of security tools and technology, security standards, training and classes, certifications, vulnerability
databases, guidance, best practices, catalogues of security controls, and countless security checklists, benchmarks, and
recommendations.
But all of this technology, information, and oversight has become a veritable "Fog of More:" competing options,
priorities, opinions, and claims that can paralyze or distract an enterprise from vital action. Business complexity is
growing, dependencies are expanding, users are becoming more mobile, and the threats are evolving. New technology
brings great benefits, but it also means that data and applications are now distributed across multiple locations, many of
which are not within the organization's infrastructure. In this complex, interconnected world, no enterprise can think of
its security as a standalone problem.
Focus is needed to establish priority of action, collective support, and keeping knowledge and technology current in the
face of rapidly evolving problems and an apparently infinite number of possible solutions. The most critical areas need
to be addressed and the first steps taken toward maturing risk management programs. This includes a roadmap of
fundamentals, and guidance to measure and improve the implementation defensive steps that have the greatest value.
These issues led to, and drive, the Critical Security Controls. The value is determined by knowledge and data - the
ability to prevent, alert, and respond to the attacks that are plaguing enterprises today.
Initiating Implementation
Some of the Critical Security Controls, in particular CSC 1 through CSC 5, are foundational, and are the primary
recommended actions to be taken. This is the approach taken by, for example, the DHS Continuous Diagnostic and
Mitigation (CDM) Program. A similar approach is recommended by the Australian Signals Directorate (ASD) with
their "Top Four Strategies to Mitigate Targeted Intrusions" - a well-regarded and demonstrably effective set of cyber-
defense actions that map very closely into the CIS Critical Security Controls.
ETSI
6 ETSI TR 103 305-1 V2.1.1 (2016-08)
1 Scope
The present document describes a specific set of technical measures available to detect, prevent, respond, and mitigate
damage from the most common to the most advanced of cyber attacks. The measures reflect the combined knowledge
of actual attacks and effective defences.
The present document is technically equivalent and compatible with The Center for Internet Cybersecurity [i.1].
2 References
NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee
their long term validity.
The following referenced documents are not necessary for the application of the present document but they assist the
user with regard to a particular subject area.
[i.1] The Center for Internet Cybersecurity: "Critical Security Controls for Effective Cyber Defense
Version 6.0," October 15, 2015.
[i.4] ETSI TR 103 305-2: "CYBER; Critical Security Controls for Effective Cyber Defence;
Part 2: Measurement and auditing".
3.1 Definitions
For the purposes of the present document, the following terms and definitions apply:
Critical Security Control (CSC): specified capabilities that reflect the combined knowledge of actual attacks and
effective defences of experts that are maintained by the Center for Internet Security
quick win: actions that can be relatively easily taken with minimal resources that have a significant cyber security
benefit
ETSI
7 ETSI TR 103 305-1 V2.1.1 (2016-08)
3.2 Abbreviations
For the purposes of the present document, the following abbreviations apply:
802.1x Institute of Electrical and Electronic Engineers Standard for Port-based Network Access Control
[i.3]
ACK ACKnowledge
ACL Access Controls List
AES Advanced Encryption Standard
APT Advanced Persistent Threat
ASD Australian Signals Directorate
ASLR Address Space Layout Randomization
BYOD Bring Your Own Device
C2 Command and Control
CCETM Common Configuration Enumeration
CD Compact Disc
CDM Continuous Diagnostic and Mitigation
CERT Computer Emergency Response Team
CIS Center for Internet Security
CPETM Common Platform Enumeration
CSC Critical Security Control or Capability
CVE® Common Vulnerability Enumeration
CVSS Common Vulnerability Scoring System
DBIR Data Breach Investigations Report
DEP Data Execution Prevention
DHCP Dynamic Host Configuration Protocol
DHS Department of Homeland Security
DLP Data Loss Prevention
DMZ DeMilitarized Zone
DNS Domain Name System
DVD Digital Versatile Disc or Digital Video Disc
EAP Extensible Authentication Protocol
EMET Enhanced Mitigation Experience Toolkit
HSM Hardware Security Modules
HTTP Hypertext Transfer Protocol
ICMP Internet Control Message Protocol
ID IDentifier
IDS Intrusion Detection System
IP Internet Protocol
IPS Intrusion Prevention System
IPSEC Internet Protocol Security
IPv6 Internet Protocol version 6
ISO International Organization for Standardization
IT Information Technology
LAN Local Area Network
LDAP Lightweight Directory Access Protocol
MAC Media Access Control
NAC Network Access Control
NIST National Institute of Standards and Technology
OTP One Time Password
OVAL® Open Vulnerability and Assessment Language
OWASP Open Web Application Security Project
RDP Remote Desktop Protocol
SCADA Supervisory Control and Data Acquisition
SCAP Security Content Automation Program
SEM Security Event Manager
SIEM Security Information Event Management or Security Incident Event Management
SIM Subscriber Information Module
SP Special Publication
SPF Sender Policy Framework
SQL Structured Query Language
SSL Secure Sockets Layer
ETSI
8 ETSI TR 103 305-1 V2.1.1 (2016-08)
SYN SYNchronize
TCP Transmission Control Protocol
TLS Transport Layer Security
URL Uniform Resource Locator
USB Universal Serial Bus
VLAN Virtual Local Area Network
VNC Virtual Channel Network
VPN Virtual Private Network
WAF Web Application Firewall
WIDS Wireless Intrusion Detection System
WPA2 Wi-Fi Protected Access II
XCCDF Extensible Configuration Checklist
NOTE: CPE®, CVETM, OVAL® and CCETM are trademarks of The MITRE Corporation operating as a non-profit
Federally Funded Research and Development Center (FFRDC) of the U.S. Department of Homeland
Security. See http://stixproject.github.io/legal/. Both CVE® and OVAL® are registered service marks.
This information is given for the convenience of users of the present document and does not constitute an
endorsement by ETSI of the product named. Equivalent products may be used if they can be shown to
lead to the same results.
• A description of the importance of the Control (Why is This Control Critical) in blocking or identifying
presence of attacks and an explanation of how attackers actively exploit the absence of this control.
• A chart of the specific actions ("sub-controls") that organizations are taking to implement, automate, and
measure effectiveness of this control.
In addition to the present document, ETSI TR 103 305-2 [i.4], can be referenced for implementing each control.
Attackers, who can be located anywhere in the world, are continuously scanning the address space of target
organizations, waiting for new and unprotected systems to be attached to the network. Attackers also look for devices
(especially laptops) which come and go off of the enterprise's network, and so get out of synch with patches or security
updates. Attacks can take advantage of new hardware that is installed on the network one evening but not configured
and patched with appropriate security updates until the following day. Even devices that are not visible from the
Internet can be used by attackers who have already gained internal access and are hunting for internal jump points or
victims. Additional systems that connect to the enterprise's network (e.g. demonstration systems, temporary test
systems, guest networks) should also be managed carefully and/or isolated in order to prevent adversarial access from
affecting the security of enterprise operations.
As new technology continues to come out, BYOD (bring your own device) - where employees bring personal devices
into work and connect them to the enterprise network - is becoming very common. These devices could already be
compromised and be used to infect internal resources.
Managed control of all devices also plays a critical role in planning and executing system backup and recovery.
ETSI
9 ETSI TR 103 305-1 V2.1.1 (2016-08)
This Control includes both technical and procedural actions, united in a process that accounts for and manages the
inventory of hardware and all associated information throughout its life cycle. It links to business governance by
establishing information/asset owners who are responsible for each component of a business process that includes
information, software, and hardware. Organizations can use large-scale, comprehensive enterprise products to maintain
IT asset inventories. Others use more modest tools to gather the data by sweeping the network, and manage the results
separately in a database.
Maintaining a current and accurate view of IT assets is an ongoing and dynamic process. Organizations can actively
scan on a regular basis, sending a variety of different packet types to identify devices connected to the network. Before
such scanning can take place, organizations should verify that they have adequate bandwidth for such periodic scans by
consulting load history and capacities for their networks. In conducting inventory scans, scanning tools could send
traditional ping packets (e.g. ICMP Echo Request) looking for ping responses to identify a system at a given IP address.
Because some systems block inbound ping packets, in addition to traditional pings, scanners can also identify devices
on the network using transmission control protocol (TCP) synchronize (SYN) or acknowledge (ACK) packets. Once
they have identified IP addresses of devices on the network, some scanners provide robust fingerprinting features to
determine the operating system type of the discovered machine.
In addition to active scanning tools that sweep the network, other asset identification tools passively listen on network
interfaces for devices to announce their presence by sending traffic. Such passive tools can be connected to switch span
ports at critical places in the network to view all data flowing through such switches, maximizing the chance of
identifying systems communicating through those switches.
Many organizations also pull information from network assets such as switches and routers regarding the machines
connected to the network. Using securely authenticated and encrypted network management protocols, tools can
retrieve MAC addresses and other information from network devices that can be reconciled with the organization's asset
inventory of servers, workstations, laptops, and other devices. Once MAC addresses are confirmed, switches should
implement 802.1x and NAC to only allow authorized systems that are properly configured to connect to the network
[i.3].
ETSI
10 ETSI TR 103 305-1 V2.1.1 (2016-08)
Wireless devices (and wired laptops) may periodically join a network and then disappear, making the inventory of
currently available systems very dynamic. Likewise, virtual machines can be difficult to track in asset inventories when
they are shut down or paused. Additionally, remote machines accessing the network using virtual private network
(VPN) technology may appear on the network for a time, and then be disconnected from it. Whether physical or virtual,
each machine using an IP address should be included in an organization's asset inventory.
Organizations will find that by diagramming the entities necessary to fully meet the goals defined in this control, it will
be easier to identify how to implement them, test the controls, and identify where potential failures in the system might
occur.
Figure 1
Attackers continuously scan target organizations looking for vulnerable versions of software that can be remotely
exploited. Some attackers also distribute hostile web pages, document files, media files, and other content via their own
web pages or otherwise trustworthy third-party sites. When unsuspecting victims access this content with a vulnerable
browser or other client-side program, attackers compromise their machines, often installing backdoor programs and bots
that give the attacker long-term control of the system. Some sophisticated attackers may use zero-day exploits, which
take advantage of previously unknown vulnerabilities for which no patch has yet been released by the software vendor.
Without proper knowledge or control of the software deployed in an organization, defenders cannot properly secure
their assets.
Poorly controlled machines are more likely to be either running software that is unneeded for business purposes
(introducing potential security flaws), or running malware introduced by an attacker after a system is compromised.
Once a single machine has been exploited, attackers often use it as a staging point for collecting sensitive information
from the compromised system and from other systems connected to it. In addition, compromised machines are used as a
launching point for movement throughout the network and partnering networks. In this way, attackers may quickly turn
one compromised machine into many. Organizations that do not have complete software inventories are unable to find
systems running vulnerable or malicious software to mitigate problems or root out attackers.
Managed control of all software also plays a critical role in planning and executing system backup and recovery.
ETSI
11 ETSI TR 103 305-1 V2.1.1 (2016-08)
Whitelisting can be implemented using a combination of commercial whitelisting tools, policies or application
execution tools that come with anti-virus suites and with operating systems. Commercial software and asset inventory
tools are widely available and in use in many enterprises today. The best of these tools provide an inventory check of
hundreds of common applications used in enterprises, pulling information about the patch level of each installed
program to ensure that it is the latest version and leveraging standardized application names, such as those found in the
common platform enumeration specification.
Features that implement whitelists are included in many modern endpoint security suites. Moreover, commercial
solutions are increasingly bundling together anti-virus, anti-spyware, personal firewall, and host-based intrusion
detection systems (IDS) and intrusion prevention systems (IPS), along with application white and black listing. In
particular, most endpoint security solutions can look at the name, file system location, and/or cryptographic hash of a
given executable to determine whether the application should be allowed to run on the protected machine. The most
effective of these tools offer custom whitelists based on executable path, hash, or regular expression matching. Some
even include a gray list function that allows administrators to define rules for execution of specific programs only by
certain users and at certain times of day.
Figure 2
ETSI
12 ETSI TR 103 305-1 V2.1.1 (2016-08)
As delivered by manufacturers and resellers, the default configurations for operating systems and applications are
normally geared to ease-of-deployment and ease-of-use - not security. Basic controls, open services and ports, default
accounts or passwords, older (vulnerable) protocols, pre-installation of unneeded software; all can be exploitable in
their default state.
Developing configuration settings with good security properties is a complex task beyond the ability of individual users,
requiring analysis of potentially hundreds or thousands of options in order to make good choices (the Procedures and
Tool section below provides resources for secure configurations). Even if a strong initial configuration is developed and
installed, it should be continually managed to avoid security "decay" as software is updated or patched, new security
vulnerabilities are reported, and configurations are "tweaked" to allow the installation of new software or support new
operational requirements. If not, attackers will find opportunities to exploit both network-accessible services and client
software..
ETSI
13 ETSI TR 103 305-1 V2.1.1 (2016-08)
Rather than start from scratch developing a security baseline for each software system, organizations should start from
publicly developed, vetted, and supported security benchmarks, security guides, or checklists. Excellent resources
include:
Organizations should augment or adjust these baselines to satisfy local policies and requirements, but deviations and
rationale should be documented to facilitate later reviews or audits.
For a complex enterprise, the establishment of a single security baseline configuration (for example, a single installation
image for all workstations across the entire enterprise) is sometimes not practical or deemed unacceptable. It is likely
that one will need to support different standardized images, based on the proper hardening to address risks and needed
functionality of the intended deployment.
EXAMPLE: A web server in the DMZ vs. an email or other application server in the internal network.
The number of variations should be kept to a minimum in order to better understand and manage the security properties
of each, but organizations then should be prepared to manage multiple baselines.
Commercial and/or free configuration management tools can then be employed to measure the settings of operating
systems and applications of managed machines to look for deviations from the standard image configurations. Typical
configuration management tools use some combination of an agent installed on each managed system, or agentless
inspection of systems by remotely logging in to each managed machine using administrator credentials. Additionally, a
hybrid approach is sometimes used whereby a remote session is initiated, a temporary or dynamic agent is deployed on
the target system for the scan, and then the agent is removed.
Figure 3
ETSI
14 ETSI TR 103 305-1 V2.1.1 (2016-08)
Cyber defenders need to operate in a constant stream of new information: software updates, patches, security advisories,
threat bulletins, etc. Understanding and managing vulnerabilities has become a continuous activity, requiring significant
time, attention, and resources.
Attackers have access to the same information and can take advantage of gaps between the appearance of new
knowledge and remediation. For example, when researchers report new vulnerabilities, a race starts among all parties,
including: attackers (to "weaponize", deploy an attack, exploit); vendors (to develop, deploy patches or signatures and
updates), and defenders (to assess risk, regression-test patches, install).
Organizations that do not scan for vulnerabilities and proactively address discovered flaws face a significant likelihood
of having their computer systems compromised. Defenders face particular challenges in scaling remediation across an
entire enterprise, and prioritizing actions with conflicting priorities, and sometimes-uncertain side effects.
ETSI
15 ETSI TR 103 305-1 V2.1.1 (2016-08)
A large number of vulnerability scanning tools are available to evaluate the security configuration of systems. Some
enterprises have also found commercial services using remotely managed scanning appliances to be effective. To help
standardize the definitions of discovered vulnerabilities in multiple departments of an organization or even across
organizations, it is preferable to use vulnerability scanning tools that measure security flaws and map them to
vulnerabilities and issues categorized using one or more of the following industry-recognized vulnerability,
configuration, and platform classification schemes and languages: CVE®, CCETM, OVAL®, CPETM, CVSS and/or
XCCDF.
Advanced vulnerability scanning tools can be configured with user credentials to log in to scanned systems and perform
more comprehensive scans than can be achieved without login credentials. The frequency of scanning activities,
however, should increase as the diversity of an organization's systems increases to account for the varying patch cycles
of each vendor.
In addition to the scanning tools that check for vulnerabilities and misconfigurations across the network, various free
and commercial tools can evaluate security settings and configurations of local machines on which they are installed.
Such tools can provide fine-grained insight into unauthorized changes in configuration or the inadvertent introduction of
security weaknesses by administrators.
Effective organizations link their vulnerability scanners with problem-ticketing systems that automatically monitor and
report progress on fixing problems, and that make unmitigated critical vulnerabilities visible to higher levels of
management to ensure the problems are solved.
The most effective vulnerability scanning tools compare the results of the current scan with previous scans to determine
how the vulnerabilities in the environment have changed over time. Security personnel use these features to conduct
vulnerability trending from month to month.
As vulnerabilities related to unpatched systems are discovered by scanning tools, security personnel should determine
and document the amount of time that elapses between the public release of a patch for the system and the occurrence of
the vulnerability scan. If this time window exceeds the organization's benchmarks for deployment of the given patch's
criticality level, security personnel should note the delay and determine if a deviation was formally documented for the
system and its patch. If not, the security team should work with management to improve the patching process.
Additionally, some automated patching tools may not detect or install certain patches due to an error by the vendor or
administrator. Because of this, all patch checks should reconcile system patches with a list of patches each vendor has
announced on its website.
ETSI
16 ETSI TR 103 305-1 V2.1.1 (2016-08)
Figure 4
The misuse of administrative privileges is a primary method for attackers to spread inside a target enterprise. Two very
common attacker techniques take advantage of uncontrolled administrative privileges. In the first, a workstation user
running as a privileged user, is fooled into opening a malicious email attachment, downloading and opening a file from
a malicious website, or simply surfing to a website hosting attacker content that can automatically exploit browsers. The
file or exploit contains executable code that runs on the victim's machine either automatically or by tricking the user
into executing the attacker's content. If the victim user's account has administrative privileges, the attacker can take over
the victim's machine completely and install keystroke loggers, sniffers, and remote control software to find
administrative passwords and other sensitive data. Similar attacks occur with email. An administrator inadvertently
opens an email that contains an infected attachment and this is used to obtain a pivot point within the network that is
used to attack other systems.
The second common technique used by attackers is elevation of privileges by guessing or cracking a password for an
administrative user to gain access to a target machine. If administrative privileges are loosely and widely distributed, or
identical to passwords used on less critical systems, the attacker has a much easier time gaining full control of systems,
because there are many more accounts that can act as avenues for the attacker to compromise administrative privileges.
ETSI
17 ETSI TR 103 305-1 V2.1.1 (2016-08)
NOTE: Su, Sudo, Linux, Unix, RunAs are the names of products supplied by a variety of parties. Some versions
are proprietary, others are free/open-source software. Windows® is a registered trademark of Microsoft
Corporation. This information is given for the convenience of users of the present document and does not
constitute an endorsement by ETSI of the product named. Equivalent products may be used if they can be
shown to lead to the same results.
Built-in operating system features can extract lists of accounts with super-user privileges, both locally on individual
systems and on overall domain controllers. To verify that users with high-privileged accounts do not use such accounts
for day-to-day web surfing and email reading, security personnel should periodically gather a list of running processes
to determine whether any browsers or email readers are running with high privileges. Such information gathering can be
scripted, with short shell scripts searching for a dozen or more different browsers, email readers, and document editing
programs running with high privileges on machines. Some legitimate system administration activity may require the
execution of such programs over the short term, but long-term or frequent use of such programs with administrative
privileges could indicate that an administrator is not adhering to this control.
To enforce the requirement for strong passwords, built-in operating system features for minimum password length can
be configured to prevent users from choosing short passwords. To enforce password complexity (requiring passwords to
be a string of pseudo-random characters), built-in operating system settings or third-party password complexity
enforcement tools can be applied.
ETSI
18 ETSI TR 103 305-1 V2.1.1 (2016-08)
Figure 5
Deficiencies in security logging and analysis allow attackers to hide their location, malicious software, and activities on
victim machines. Even if the victims know that their systems have been compromised, without protected and complete
logging records they are blind to the details of the attack and to subsequent actions taken by the attackers. Without solid
audit logs, an attack may go unnoticed indefinitely and the particular damages done may be irreversible.
Sometimes logging records are the only evidence of a successful attack. Many organizations keep audit records for
compliance purposes, but attackers rely on the fact that such organizations rarely look at the audit logs, so they do not
know that their systems have been compromised. Because of poor or nonexistent log analysis processes, attackers
sometimes control victim machines for months or years without anyone in the target organization knowing, even though
the evidence of the attack has been recorded in unexamined log files.
ETSI
19 ETSI TR 103 305-1 V2.1.1 (2016-08)
Most free and commercial operating systems, network services, and firewall technologies offer logging capabilities.
Such logging should be activated, with logs sent to centralized logging servers. Firewalls, proxies, and remote access
systems (VPN, dial-up, etc.) should all be configured for verbose logging, storing all the information available for
logging in the event a follow-up investigation is required. Furthermore, operating systems, especially those of servers,
should be configured to create access control logs when a user attempts to access resources without the appropriate
privileges. To evaluate whether such logging is in place, an organization should periodically scan through its logs and
compare them with the asset inventory assembled as part of Critical Control 1 in order to ensure that each managed item
actively connected to the network is periodically generating logs.
Analytical programs such as SIM/SEM solutions for reviewing logs can provide value, but the capabilities employed to
analyze audit logs are quite extensive, even including, importantly, just a cursory examination by a person. Actual
correlation tools can make audit logs far more useful for subsequent manual inspection. Such tools can be quite helpful
in identifying subtle attacks. However, these tools are neither a panacea nor a replacement for skilled information
security personnel and system administrators. Even with automated log analysis tools, human expertise and intuition are
often required to identify and understand attacks.
ETSI
20 ETSI TR 103 305-1 V2.1.1 (2016-08)
Figure 6
Web browsers and email clients are very common points of entry and attack because of their high technical complexity
and flexibility, and their direct interaction with users and with the other systems and websites. Content can be crafted to
entice or spoof users into taking actions that greatly increase risk and allow introduction of malicious code, loss of
valuable data, and other attacks.
ETSI
21 ETSI TR 103 305-1 V2.1.1 (2016-08)
Web Browser
Most web browsers today have basic security features, but it is not adequate to rely on one aspect of security. A web
server is made up of layers that provide multiple avenues of attack. The foundation of any web browser is the operating
system and the secret to ensuring that it remains secure is simple: keep it updated with the latest security patches.
Ensure that patches are up-to-date and installed properly, as any server running old patches will become a victim.
Update any software components that run on a web server. Anything that is non-essential, such as DNS servers and
remote administration tools like VNC or Remote Desktop, should be disabled or removed. If remote administration
tools are essential, however, then avoid using default passwords or anything that can be easily guessed This is not only
.
applicable for remote access tools, but user accounts, switches and routers as well.
A flexible firewall is one of the strongest forms of defense against security breaches. When a web server is targeted the
attack will attempt to upload hacking tools or malware immediately, so as to take advantage of the security breach
before it is fixed. Without a good anti-virus package, a breach in security can go unnoticed for a significant amount of
time.
Cybercriminals can exploit cookies in malicious ways. Changing the browser settings to block third party cookies will
help reduce this risk. The autocomplete or autofill feature saves keystrokes by storing information recently typed.
However, autocomplete for login information poses a big risk if the laptop is lost or stolen. And restricting add-ons to
an absolute minimum will reduce the attack surface. Add-ons can harbor malware and increase the possibilities for
attacking the browser. Configure the browsers to prevent them from installing add-ons without a prompt.
Most popular browsers employ a database of phishing and/or malware sites to protect against the most common threats.
Make sure that the IT department and the users enable content filters. And turn on the popup blockers. Popups are not
only annoying, they also can host embedded malware directly or lure users into clicking on something using social
engineering tricks. Be sure that the selected browser has popup blocking enabled.
Email represents one the most interactive ways humans work with computers, encouraging the right behavior is just as
important as the technical settings.
Passwords containing common words or phrases are easy to crack. Ensure complex passwords are created; a
combination of letters, numbers and special characters is complex enough. Passwords should be changed on a regular
basis, every 45-60 days.
Implementing two-factor authentication is another way to ensure the user is authentic, reducing the attack surface.
Using a spam-filtering tool reduces the number of malicious emails that come into the network. Initiating a Sender
Policy Framework to verify that the domain an email is coming from is authentic, helps reduce Spam and Phishing
activities. Installing an encryption tool to secure email and communications adds another layer of user and networked
based security.
ETSI
22 ETSI TR 103 305-1 V2.1.1 (2016-08)
Figure 7
Malicious software is an integral and dangerous aspect of Internet threats, and can be designed to attack the systems,
devices, or data. It can be fast-moving, fast-changing, and enter through any number of points like end-user devices,
email attachments, web pages, cloud services, user actions, and removable media. Modern malware can be designed to
avoid defenses, or to attack or disable them.
Malware defenses should be able to operate in this dynamic environment through large-scale automation, rapid
updating, and integration with processes like Incident Response. They should also be deployed at multiple possible
points-of-attack to detect, stop the movement of, or control the execution of malicious software. Enterprise endpoint
security suites provide administrative features to verify that all defenses are active and current on every managed
system.
ETSI
23 ETSI TR 103 305-1 V2.1.1 (2016-08)
To ensure anti-virus signatures are up to date, organizations use automation. They use the built-in administrative
features of enterprise endpoint security suites to verify that anti-virus, anti-spyware, and host-based IDS features are
active on every managed system. They run automated assessments daily and review the results to find and mitigate
systems that have deactivated such protections, as well as systems that do not have the latest malware definitions.
Some enterprises deploy free or commercial honeypot and "tarpit" tools to identify attackers in their environment.
Security personnel should continuously monitor these tools to determine whether traffic is directed to them and account
logins are attempted. When they identify such events, these personnel should gather the source address from which this
traffic originates and other details associated with the attack for follow-on investigation.
Figure 8
ETSI
24 ETSI TR 103 305-1 V2.1.1 (2016-08)
Attackers search for remotely accessible network services that are vulnerable to exploitation. Common examples
include poorly configured web servers, mail servers, file and print services, and domain name system (DNS) servers
installed by default on a variety of different device types, often without a business need for the given service. Many
software packages automatically install services and turn them on as part of the installation of the main software
package without informing a user or administrator that the services have been enabled. Attackers scan for such issues
and attempt to exploit these services, often attempting default user IDs and passwords or widely available exploitation
code.
Port scanning tools are used to determine which services are listening on the network for a range of target systems. In
addition to determining which ports are open, effective port scanners can be configured to identify the version of the
protocol and service listening on each discovered open port. This list of services and their versions are compared against
an inventory of services required by the organization for each server and workstation in an asset management system.
Recently added features in these port scanners are being used to determine the changes in services offered by scanned
machines on the network since the previous scan, helping security personnel identify differences over time.
ETSI
25 ETSI TR 103 305-1 V2.1.1 (2016-08)
Figure 9
When attackers compromise machines, they often make significant changes to configurations and software. Sometimes
attackers also make subtle alterations of data stored on compromised machines, potentially jeopardizing organizational
effectiveness with polluted information. When the attackers are discovered, it can be extremely difficult for
organizations without a trustworthy data recovery capability to remove all aspects of the attacker's presence on the
machine.
ETSI
26 ETSI TR 103 305-1 V2.1.1 (2016-08)
Once per quarter (or whenever new backup equipment is purchased), a testing team should evaluate a random sample of
system backups by attempting to restore them on a test bed environment. The restored systems should be verified to
ensure that the operating system, application, and data from the backup are all intact and functional.
In the event of malware infection, restoration procedures should use a version of the backup that is believed to predate
the original infection.
Offsite / Offline
Backups
Computing Systems
Figure 10
As delivered from manufacturers and resellers, the default configurations for network infrastructure devices are geared
for ease-of-deployment and ease-of-use - not security. Open services and ports, default accounts (including service
accounts) or passwords, support for older (vulnerable) protocols, pre-installation of unneeded software; all can be
exploitable in their default state.
ETSI
27 ETSI TR 103 305-1 V2.1.1 (2016-08)
Attackers take advantage of network devices becoming less securely configured over time as users demand exceptions
for specific business needs. Sometimes the exceptions are deployed and then left undone when they are no longer
applicable to the business needs. In some cases, the security risk of the exception is neither properly analyzed nor
measured against the associated business need and can change over time. Attackers search for vulnerable default
settings, electronic holes in firewalls, routers, and switches and use those to penetrate defenses. They exploit flaws in
these devices to gain access to networks, redirect traffic on a network, and intercept information while in transmission.
Through such actions, the attacker gains access to sensitive data, alters important information, or even uses a
compromised machine to pose as another trusted system on the network.
Some organizations use commercial tools that evaluate the rule set of network filtering devices to determine whether
they are consistent or in conflict, providing an automated sanity check of network filters and search for errors in rule
sets or access controls lists (ACLs) that may allow unintended services through the device. Such tools should be run
each time significant changes are made to firewall rule sets, router ACLs, or other filtering technologies.
ETSI
28 ETSI TR 103 305-1 V2.1.1 (2016-08)
Figure 11
Attackers focus on exploiting systems that they can reach across the Internet, including not only DMZ systems but also
workstation and laptop computers that pull content from the Internet through network boundaries. Threats such as
organized crime groups and nation-states use configuration and architectural weaknesses found on perimeter systems,
network devices, and Internet-accessing client machines to gain initial access into an organization. Then, with a base of
operations on these machines, attackers often pivot to get deeper inside the boundary to steal or change information or
to set up a persistent presence for later attacks against internal hosts. Additionally, many attacks occur between business
partner networks, sometimes referred to as extranets, as attackers hop from one organization's network to another,
exploiting vulnerable systems on extranet perimeters.
To control the flow of traffic through network borders and police content by looking for attacks and evidence of
compromised machines, boundary defenses should be multi-layered, relying on firewalls, proxies, DMZ perimeter
networks, and network-based IPS and IDS. It is also critical to filter both inbound and outbound traffic.
It should be noted that boundary lines between internal and external networks are diminishing as a result of increased
interconnectivity within and between organizations as well as the rapid rise in deployment of wireless technologies.
These blurring lines sometimes allow attackers to gain access inside networks while bypassing boundary systems.
However, even with this blurring of boundaries, effective security deployments still rely on carefully configured
boundary defenses that separate networks with different threat levels, sets of users, and levels of control. And despite
the blurring of internal and external networks, effective multi-layered defenses of perimeter networks help lower the
number of successful attacks, allowing security personnel to focus on attackers who have devised methods to bypass
boundary restrictions.
ETSI
29 ETSI TR 103 305-1 V2.1.1 (2016-08)
The boundary defenses included in this control build on Critical Control 10. The additional recommendations here focus
on improving the overall architecture and implementation of both Internet and internal network boundary points.
Internal network segmentation is central to this control because once inside a network, many intruders attempt to target
the most sensitive machines. Usually, internal network protection is not set up to defend against an internal attacker.
Setting up even a basic level of security segmentation across the network and protecting each segment with a proxy and
a firewall will greatly reduce an intruder's access to the other parts of the network.
ETSI
30 ETSI TR 103 305-1 V2.1.1 (2016-08)
One element of this control can be implemented using free or commercial IDS and sniffers to look for attacks from
external sources directed at DMZ and internal systems, as well as attacks originating from internal systems against the
DMZ or Internet. Security personnel should regularly test these sensors by launching vulnerability-scanning tools
against them to verify that the scanner traffic triggers an appropriate alert. The captured packets of the IDS sensors
should be reviewed using an automated script each day to ensure that log volumes are within expected parameters and
that the logs are formatted properly and have not been corrupted.
Additionally, packet sniffers should be deployed on DMZs to look for Hypertext Transfer Protocol (HTTP) traffic that
bypasses HTTP proxies. By sampling traffic regularly, such as over a three-hour period once a week, information
security personnel can search for HTTP traffic that is neither sourced by nor destined for a DMZ proxy, implying that
the requirement for proxy use is being bypassed.
To identify back-channel connections that bypass approved DMZs, network security personnel can establish an
Internet-accessible system to use as a receiver for testing outbound access. This system is configured with a free or
commercial packet sniffer. Then, security personnel can connect a sending test system to various points on the
organization's internal network, sending easily identifiable traffic to the sniffing receiver on the Internet. These packets
can be generated using free or commercial tools with a payload that contains a custom file used for the test. When the
packets arrive at the receiver system, the source address of the packets should be verified against acceptable DMZ
addresses allowed for the organization. If source addresses are discovered that are not included in legitimate, registered
DMZs, more detail can be gathered by using a traceroute tool to determine the path that packets take from the
sender to the receiver system.
Figure 12
ETSI
31 ETSI TR 103 305-1 V2.1.1 (2016-08)
Data resides in many places. Protection of that data is best achieved through the application of a combination of
encryption, integrity protection and data loss prevention techniques. As organizations continue their move towards
cloud computing and mobile access, it is important that proper care be taken to limit and report on data exfiltration
while also mitigating the effects of data compromise.
The adoption of data encryption, both in transit and at rest, provides mitigation against data compromise. This is true if
proper care has been taken in the processes and technologies associated with the encryption operations. An example of
this is the management of cryptographic keys used by the various algorithms that protect data. The process for
generation, use and destruction of keys should be based on proven processes as defined in standards such as
NIST SP 800-57 part 1 [i.2].
Care should also be taken to ensure that products used within an enterprise implement well known and vetted
cryptographic algorithms, as identified by NIST. Re-evaluation of the algorithms and key sizes used within the
enterprise on an annual basis is also recommended to ensure that organizations are not falling behind in the strength of
protection applied to their data.
For organizations that are moving data to the cloud, it is important to understand the security controls applied to data in
the cloud multi-tenant environment, and determine the best course of action for application of encryption controls and
security of keys. When possible, keys should be stored within secure containers such as Hardware Security Modules
(HSMs).
Encrypting data provides a level of assurance that even if data is compromised, it is impractical to access the plaintext
without significant resources, however controls should also be put in place to mitigate the threat of data exfiltration in
the first place. Many attacks occurred across the network, while others involved physical theft of laptops and other
equipment holding sensitive information. Yet, in most cases, the victims were not aware that the sensitive data were
leaving their systems because they were not monitoring data outflows. The movement of data across network
boundaries both electronically and physically should be carefully scrutinized to minimize its exposure to attackers.
The loss of control over protected or sensitive data by organizations is a serious threat to business operations and a
potential threat to national security. While some data are leaked or lost as a result of theft or espionage, the vast
majority of these problems result from poorly understood data practices, a lack of effective policy architectures, and
user error. Data loss can even occur as a result of legitimate activities such as e-Discovery during litigation, particularly
when records retention practices are ineffective or nonexistent.
Data loss prevention (DLP) refers to a comprehensive approach covering people, processes, and systems that identify,
monitor, and protect data in use (e.g. endpoint actions), data in motion (e.g. network actions), and data at rest (e.g. data
storage) through deep content inspection and with a centralized management framework. Over the last several years,
there has been a noticeable shift in attention and investment from securing the network to securing systems within the
network, and to securing the data itself. DLP controls are based on policy, and include classifying sensitive data,
discovering that data across an enterprise, enforcing controls, and reporting and auditing to ensure policy compliance.
ETSI
32 ETSI TR 103 305-1 V2.1.1 (2016-08)
Commercial tools are available to support enterprise management of encryption and key management within an
enterprise and include the ability to support implementation of encryption controls within cloud and mobile
environments.
Definition of life cycle processes and roles and responsibilities associated with key management should be undertaken
by each organization.
Commercial DLP solutions are available to look for exfiltration attempts and detect other suspicious activities
associated with a protected network holding sensitive information. Organizations deploying such tools should carefully
inspect their logs and follow up on any discovered attempts, even those that are successfully blocked, to transmit
sensitive information out of the organization without authorization.
ETSI
33 ETSI TR 103 305-1 V2.1.1 (2016-08)
Figure 13
Some organizations do not carefully identify and separate their most sensitive and critical assets from less sensitive,
publicly accessible information on their internal networks. In many environments, internal users have access to all or
most of the critical assets. Sensitive assets may also include systems that provide management and control of physical
systems (e.g. SCADA). Once attackers have penetrated such a network, they can easily find and exfiltrate important
information, cause physical damage, or disrupt operations with little resistance. For example, in several high-profile
breaches over the past two years, attackers were able to gain access to sensitive data stored on the same servers with the
same level of access as far less important data. There are also examples of using access to the corporate network to gain
access to, then control over, physical assets and cause damage.
Table 14: CSC 14: Controlled Access Based on the Need to Know
ETSI
34 ETSI TR 103 305-1 V2.1.1 (2016-08)
it resides, and who needs access to it. To derive sensitivity levels, organizations need to put together a list of the key
types of data and the overall importance to the organization. This analysis would be used to create an overall data
classification scheme for the organization. At a base level, a data classification scheme is broken down into two levels:
public (unclassified) and private (classified). Once the private information has been identified, it can then be further
subdivided based on the impact it would have to the organization if it were compromised.
Once the sensitivity of the data has been identified, the data need to be traced back to business applications and the
physical servers that house those applications. The network then needs to be segmented so that systems of the same
sensitivity level are on the same network and segmented from systems with different trust levels. If possible, firewalls
need to control access to each segment. If data are flowing over a network with a lower trust level, encryption should be
used.
Job requirements should be created for each user group to determine what information the group needs access to in
order to perform its jobs. Based on the requirements, access should only be given to the segments or servers that are
needed for each job function. Detailed logging should be turned on for all servers in order to track access and examine
situations where someone is accessing data that they should not be accessing.
Figure 14
ETSI
35 ETSI TR 103 305-1 V2.1.1 (2016-08)
Major thefts of data have been initiated by attackers who have gained wireless access to organizations from outside the
physical building, bypassing organizations' security perimeters by connecting wirelessly to access points inside the
organization. Wireless clients accompanying traveling officials are infected on a regular basis through remote
exploitation during air travel or in cyber cafes. Such exploited systems are then used as back doors when they are
reconnected to the network of a target organization. Still other organizations have reported the discovery of
unauthorized wireless access points on their networks, planted and sometimes hidden for unrestricted access to an
internal network. Because they do not require direct physical connections, wireless devices are a convenient vector for
attackers to maintain long-term access into a target environment.
Effective organizations run commercial wireless scanning, detection, and discovery tools as well as commercial
wireless intrusion detection systems.
Additionally, the security team should periodically capture wireless traffic from within the borders of a facility and use
free and commercial analysis tools to determine whether the wireless traffic was transmitted using weaker protocols or
encryption than the organization mandates. When devices relying on weak wireless security settings are identified, they
should be found within the organization's asset inventory and either reconfigured more securely or denied access to the
organization network.
Additionally, the security team should employ remote management tools on the wired network to pull information about
the wireless capabilities and devices connected to managed systems.
ETSI
36 ETSI TR 103 305-1 V2.1.1 (2016-08)
Figure 15
Attackers frequently discover and exploit legitimate but inactive user accounts to impersonate legitimate users, thereby
making discovery of attacker behavior difficult for network watchers. Accounts of contractors and employees who have
been terminated and accounts formerly set up for Red Team testing (but not deleted afterwards) have often been
misused in this way. Additionally, some malicious insiders or former employees have accessed accounts left behind in a
system long after contract expiration, maintaining their access to an organization's computing system and sensitive data
for unauthorized and sometimes malicious purposes.
ETSI
37 ETSI TR 103 305-1 V2.1.1 (2016-08)
Although most operating systems include capabilities for logging information about account usage, these features are
sometimes disabled by default. Even when such features are present and active, they often do not provide fine-grained
detail about access to the system by default. Security personnel can configure systems to record more detailed
information about account access, and use home-grown scripts or third-party log analysis tools to analyze this
information and profile user access of various systems.
Accounts should also be tracked very closely. Any account that is dormant should be disabled and eventually removed
from the system. All active accounts should be traced back to authorized users of the system and it should be ensured
that their passwords are robust and changed on a regular basis. Users should also be logged out of the system after a
period of no activity to minimize the possibility of an attacker using their system to extract information from the
organization.
ETSI
38 ETSI TR 103 305-1 V2.1.1 (2016-08)
Figure 16
It is tempting to think of cyber defense primarily as a technical challenge, but the actions of people also play a critical
part in the success or failure of an enterprise. People fulfil important functions at every stage of system design,
implementation, operation, use, and oversight. Examples include: system developers and programmers (who may not
understand the opportunity to resolve root cause vulnerabilities early in the system life cycle); IT operations
professionals (who may not recognize the security implications of IT artifacts and logs); end users (who may be
susceptible to social engineering schemes such as phishing); security analysts (who struggle to keep up with an
explosion of new information); and executives and system owners (who struggle to quantify the role that cybersecurity
plays in overall operational/mission risk, and have no reasonable way to make relevant investment decisions).
Attackers are very conscious of these issues and use them to plan their exploitations by, for example: carefully crafting
phishing messages that look like routine and expected traffic to an unwary user; exploiting the gaps or seams between
policy and technology (e.g. policies that have no technical enforcement); working within the time window of patching
or log review; using nominally non-security-critical systems as jump points or bots.
No cyber defense approach can effectively address cyber risk without a means to address this fundamental vulnerability.
Conversely, empowering people with good cyber defense habits can significantly increase readiness.
ETSI
39 ETSI TR 103 305-1 V2.1.1 (2016-08)
Table 17: CSC 17: Security Skills Assessment and Appropriate Training to Fill Gaps
CSC 17: Security Skills Assessment and Appropriate Training to Fill Gaps
Family Control Control Description
Application 17.1 Perform gap analysis to see which skills employees need to implement the other
Controls, and which behaviors employees are not adhering to, using this information to
build a baseline training and awareness roadmap for all employees.
Application 17.2 Deliver training to fill the skills gap. If possible, use more senior staff to deliver the
training. A second option is to have outside teachers provide training onsite so the
examples used will be directly relevant. If there are small numbers of people to train,
use training conferences or online training to fill the gaps.
Application 17.3 Implement a security awareness program that:
1) focuses on the methods commonly used in intrusions that can be blocked through
individual action;
2) is delivered in short online modules convenient for employees;
3) is updated frequently (at least annually) to represent the latest attack techniques;
4) is mandated for completion by all employees at least annually;
5) is reliably monitored for employee completion; and
6) includes the senior leadership team's personal messaging, involvement in training,
and accountability through performance metrics.
Application 17.4 Validate and improve awareness levels through periodic tests to see whether
employees will click on a link from suspicious email or provide sensitive information on
the telephone without following appropriate procedures for authenticating a caller;
targeted training should be provided to those who fall victim to the exercise.
Application 17.5 Use security skills assessments for each of the mission-critical roles to identify skills
gaps. Use hands-on, real-world examples to measure mastery. If there are no such
assessments, use one of the available online competitions that simulate real-world
scenarios for each of the identified jobs in order to measure mastery of skills mastery.
An effective enterprise-wide training program should take a holistic approach and consider policy and technology at the
same time as the training of people. For example, policies should be designed with technical measurement and
enforcement when possible, reinforced by training to fill gaps, technical controls can be implemented to bound and
minimize the opportunity for people to make mistakes, and so focus the training on things that cannot be managed
technically.
To be effective in both cost and outcome, security training should be prioritized, focused, specific, and measurable. A
key way to prioritize training is to focus first on those jobs and roles that are critical to the mission or business outcome
of the enterprise. One way to identify these mission-critical jobs is to reference the work of the 2012 Task Force on
Cyber Skills established by the Secretary of Homeland Security:
A comprehensive taxonomy of cybersecurity roles is available through the National Cybersecurity Workforce
Framework, developed by the National Institute of Standards and Technology (NIST), which maps to roles commonly
found in enterprises and government organizations.
ETSI
40 ETSI TR 103 305-1 V2.1.1 (2016-08)
General awareness training for all users also plays an important role. But even this training should be tailored to
functional roles and focused on specific actions that put the organization at risk, and measured in order to drive
remediation.
The key to upgrading skills is measurement through assessments that show both the employee and the employer where
knowledge is sufficient and where there are gaps. Once the gaps have been identified, those employees who have the
requisite skills and knowledge can be called upon to mentor employees who need to improve their skills. In addition,
the organization can develop training plans to fill the gaps and maintain employee readiness.
A full treatment of this topic is beyond the scope of the Critical Security Controls. However, the Cybersecurity
Workforce Handbook published by the Center for Internet Security (https://www.cisecurity.org/) provides foundational
steps to take in optimizing the workforce for enterprise security.
Figure 17
ETSI
41 ETSI TR 103 305-1 V2.1.1 (2016-08)
Attacks often take advantage of vulnerabilities found in web-based and other application software. Vulnerabilities can
be present for many reasons, including coding mistakes, logic errors, incomplete requirements, and failure to test for
unusual or unexpected conditions. Examples of specific errors include: the failure to check the size of user input; failure
to filter out unneeded but potentially malicious character sequences from input streams; failure to initialize and clear
variables; and poor memory management allowing flaws in one part of the software to affect unrelated (and more
security critical) portions. There is a flood of public and private information about such vulnerabilities available to
attackers and defenders alike, as well as a robust marketplace for tools and techniques to allow "weaponization" of
vulnerabilities into exploits. Attackers can inject specific exploits, including buffer overflows, SQL injection attacks,
cross-site scripting, cross-site request forgery, and click-jacking of code to gain control over vulnerable machines. In
one attack, more than 1 million web servers were exploited and turned into infection engines for visitors to those sites
using SQL injection. During that attack, trusted websites from state governments and other organizations compromised
by attackers were used to infect hundreds of thousands of browsers that accessed those websites. Many more web and
non-web application vulnerabilities are discovered on a regular basis.
The security of applications (in-house developed or acquired) is a complex activity requiring a complete program
encompassing enterprise-wide policy, technology, and the role of people. These are often broadly defined or required by
formal Risk Management Frameworks and processes.
ETSI
42 ETSI TR 103 305-1 V2.1.1 (2016-08)
A comprehensive treatment of this topic is beyond the scope of the Critical Security Controls. However, the actions in
CSC 6 provide specific, high-priority steps that can improve Application Software Security. In addition, the many
excellent comprehensive resources dedicated to this topic should be used. Examples include: the DHS "Build Security
In" Program (https://buildsecurityin.us-cert.gov/), and The Open Web Application Security Project (OWASP)
(www.owasp.org).
Figure 18
Cyber incidents are now just part of our way of life. Even large, well-funded, and technically sophisticated enterprises
struggle to keep up with the frequency and complexity of attacks. The question of a successful cyber-attack against an
enterprise is not "if" but "when."
When an incident occurs, it is too late to develop the right procedures, reporting, data collection, management
responsibility, legal protocols, and communications strategy that will allow the enterprise to successfully understand,
manage, and recover. Without an incident response plan, an organization may not discover an attack in the first place,
or, if the attack is detected, the organization may not follow good procedures to contain damage, eradicate the attacker's
presence, and recover in a secure fashion. Thus, the attacker may have a far greater impact, causing more damage,
infecting more systems, and possibly exfiltrate more sensitive data than would otherwise be possible were an effective
incident response plan in place.
ETSI
43 ETSI TR 103 305-1 V2.1.1 (2016-08)
After defining detailed incident response procedures, the incident response team should engage in periodic scenario-
based training, working through a series of attack scenarios fine-tuned to the threats and vulnerabilities the organization
faces. These scenarios help ensure that team members understand their role on the incident response team and also help
prepare them to handle incidents.
A full treatment of this topic is beyond the scope of the Critical Security Controls. However, the actions in CSC 18
provide specific, high-priority steps that can improve enterprise security, and should be a part of any comprehensive
incident and response plan.
ETSI
44 ETSI TR 103 305-1 V2.1.1 (2016-08)
Figure 19
Attackers often exploit the gap between good defensive designs and intentions and implementation or maintenance.
Examples include: the time window between announcement of a vulnerability, the availability of a vendor patch, and
actual installation on every machine; well-intentioned policies which have no enforcement mechanism (especially those
intended to restrict risky human actions); failure to apply good configurations and other practices to the entire
enterprise, or to machines that come in-and-out of the network; and failure to understand the interaction among multiple
defensive tools, or with normal system operations that have security implications.
In addition, successful defense requires a comprehensive program of technical defenses, good policy and governance,
and appropriate action by people. In a complex environment where technology is constantly evolving, and new attacker
tradecraft appears regularly, organizations should periodically test their defenses to identify gaps and to assess their
readiness.
Penetration testing starts from the identification and assessment of vulnerabilities that can be identified in the enterprise.
It complements this by designing and executing tests that demonstrate specifically how an adversary can either subvert
the organization's security goals (e.g. the protection of specific Intellectual Property) or achieve specific adversarial
objectives (e.g. establishment of a covert Command and Control infrastructure). The result provides deeper insight,
through demonstration, into the business risks of various vulnerabilities.
Red Team exercises take a comprehensive approach at the full spectrum of organization policies, processes, and
defenses in order to improve organizational readiness, improve training for defensive practitioners, and inspect current
performance levels. Independent Red Teams can provide valuable and objective insights about the existence of
vulnerabilities and the efficacy of defenses and mitigating controls already in place and even of those planned for future
implementation.
ETSI
45 ETSI TR 103 305-1 V2.1.1 (2016-08)
Table 20: CSC 20: Penetration Tests and Red Team Exercises
Penetration testing and Red Teaming only provide significant value when basic defensive measures have already been
put into place, and when they are performed as part of a comprehensive, ongoing program of security management and
improvement. These are often specified and required by formal Risk Management Frameworks and processes.
Each organization should define a clear scope and rules of engagement for penetration testing and Red Team analyses.
The scope of such projects should include, at a minimum, systems with the organization's highest value information and
production processing functionality. Other lower-value systems may also be tested to see if they can be used as pivot
points to compromise higher-value targets. The rules of engagement for penetration tests and Red Team analyses should
describe, at a minimum, times of day for testing, duration of tests, and the overall test approach.
A full treatment of this topic is beyond the scope of the CIS Critical Security Controls. However, the actions in CSC 20
provide specific, high-priority steps that can improve enterprise security, and should be a part of any comprehensive
penetration testing and Red Team program.
ETSI
46 ETSI TR 103 305-1 V2.1.1 (2016-08)
Figure 20
ETSI
47 ETSI TR 103 305-1 V2.1.1 (2016-08)
Annex A:
Evolving An Attack Model for the Critical Security Controls
Background
Since their inception, the CIS Critical Security Controls ("the Controls") have had a basic tenet of "Offense Informs
Defense". That is, knowledge of actual attacks that have compromised systems (the Bad Guys' "offense") is the key
factor to inform and determine the value of defensive actions. One may not be able to afford to do everything wanted or
needed to do and so cyber defense should be driven by prioritization - what should I do first to get the most value from
my defensive resources? Value is best determined by the attacker - what are they doing to us now, and what are the
most useful, scalable actions one can take to stop them?
The Controls reflect and knowledge of actual attacks and effective defenses gathered from experts from every part of
the ecosystem across many sectors. To do this, a team reviewed and analyzed attack data from many of the leading
vendor threat reports to ensure the Controls adequately aligned with the most prevalent threats. This process is called a
"Community Attack Model" for the CIS Critical Security Controls - the gathering of relevant real-life information
about attacks and putting them into context so they can be easily and reliably mapped to defensive action. "Community"
refers to the breadth of the participants and information sources, and also to the shared labour that operates this process.
But these are the threats that the entire Community faces - the documented, specific successes of the Attackers. Any one
specific category of attack might not have hit today, but it could just as easily do so tomorrow.
The Community Attack Model began by validating and enriching mapping from a well-documented and authoritative
source of "real life" data - the Verizon Data Breach Investigations Report (2013, 2014, 2015). After the Verizon team
did their primary analysis, a volunteer panel formed by the Center for Internet Security worked with them to map the
most important categories of attacks seen in the prior year's data directly in the Controls (at a sub-Control) level, and
this map became a key part of the Verizon DBIR Recommendations. More recently, similar mappings were completed
using annual reports working with Symantec Internet Security Report 2015 and Hewlett PackardTM Cyber Risk Report
2015. This approach allows readers of these data-driven annual reports to easily and consistently map into the Controls.
NOTE: Hewlett PackardTM Cyber Risk Report 2015 is the trade name of a product supplied by Hewlett
PackardTM. This information is given for the convenience of users of the present document and does not
constitute an endorsement by ETSI of the product named. Equivalent products may be used if they can be
shown to lead to the same results.
• The mapping is from the vendor's category or summary level of attacks - not from data about every individual
attack.
• The data is created by the vendor's business model (e.g. incident response, managed security, anti-malware
sensors, threat intelligence), and so each represents an incomplete but well-documented sampling of the
ecosystem.
• The categories used by the vendors are typically in narrative form, and not presented in any standard form or
taxonomy. Recommendations are also typically in narrative form, not tied to any specific defensive
framework. Therefore, mapping from any one vendor's report to the Controls requires some discussion and
analytic judgment.
ETSI
48 ETSI TR 103 305-1 V2.1.1 (2016-08)
Figure A.1
The use of this attack information and the selection of appropriate defensive action can be seen as part of a broader
"Foundational Risk Assessment" of understanding vulnerabilities, the threats and the resulting consequences - one
that can be used by an individual enterprise as a starting point for immediate, high-value action, and can also provide a
basis for common action across an entire community.
As the community around the Controls has grown in size and diversity, and as the environment has grown more
complex, this Model should be evolved to be more scalable, repeatable, adaptable to different communities, and more
consistent with formal security frameworks - all without disrupting the spirit of cooperation and common good that has
brought us this far.
Whether one approaches this problem as an individual enterprise or as a community of enterprises, it should create and
operate an ongoing, repeatable process to find relevant new information about Attackers, assess the implications for its
environment, make key decisions, and then take action. Doing so will help determine best investments both tactically
and strategically.
• It should be driven by data from authoritative, publicly available sources, but also be able to make use of
specialized (e.g. uniquely applicable to a sector) or restricted (e.g. encumbered by classification or agreement)
knowledge.
• It should have a well-defined process to translate from attacks to action (controls) in a way that supports
prioritization and is consistent with formal Risk Management Frameworks.
• It should have an on-going "refresh" cycle that allows validation of prior defensive choices, as well as
assessment of new information.
• It should be openly demonstrable to others and negotiable (since risk is always shared with others).
So the evolution of the CIS Critical Security Controls will follow the above guidelines to continually enrich and refresh
the Controls. It will expand the number and variety of threat reports, develop a standard categorization or taxonomy of
attacks to map to other frameworks and will take advantage of existing avenues for information sharing, such as using
the Multi-State Information Sharing and Analysis Center (MS-ISAC).
ETSI
49 ETSI TR 103 305-1 V2.1.1 (2016-08)
Annex B:
Attack Types
Historically, the following Attack Types were the primary ones considered when developing the Critical Security
Controls. The types were also mapped back into the Controls as part of the discussion to ensure good coverage by the
Controls. This approach has been phased out in favour of the CIS Community Attack Model.
Attack Summary
Attackers continually scan for new, unprotected systems, including test or experimental systems, and exploit such
systems to gain control of them.
Attackers distribute hostile content on Internet-accessible (and sometimes internal) websites that exploit unpatched
and improperly secured client software running on victim machines.
Attackers continually scan for vulnerable software and exploit it to gain control of target machines.
Attackers use currently infected or compromised machines to identify and exploit other vulnerable machines across an
internal network.
Attackers exploit weak default configurations of systems that are more geared to ease of use than security.
Attackers exploit new vulnerabilities on systems that lack critical patches in organizations that do not know that they
are vulnerable because they lack continuous vulnerability assessments and effective remediation.
Attackers compromise target organizations that do not exercise their defenses to determine and continually improve
their effectiveness.
Attackers use malicious code to gain and maintain control of target machines, capture sensitive data, and then spread
it to other systems, sometimes wielding code that disables or dodges signature-based anti-virus tools.
Attackers scan for remotely accessible services on target systems that are often unneeded for business activities, but
provide an avenue of attack and compromise of the organization.
Attackers exploit weak application software, particularly web applications, through attack vectors such as SQL
injection, cross-site scripting, and similar tools.
Attackers exploit wireless access points to gain entry into a target organization's internal network, and exploit wireless
client systems to steal sensitive information.
Attackers exploit users and system administrators via social engineering scams that work because of a lack of security
skills and awareness.
Attackers exploit and infiltrate through network devices whose security configuration has been weakened over time by
granting, for specific short-term business needs, supposedly temporary exceptions that are never removed.
Attackers trick a user with an administrator-level account into opening a phishing-style email with an attachment or
surfing to the attacker's content on an Internet website, allowing the attacker's malicious code or exploit to run on the
victim machine with full administrator privileges.
Attackers exploit boundary systems on Internet-accessible DMZ networks, and then pivot to gain deeper access on
internal networks.
Attackers exploit poorly designed network architectures by locating unneeded or unprotected connections, weak
filtering, or a lack of separation of important systems or business functions.
Attackers operate undetected for extended periods of time on compromised systems because of a lack of logging and
log review.
Attackers gain access to sensitive documents in an organization that does not properly identify and protect sensitive
information or separate it from non-sensitive information.
Attackers compromise inactive user accounts left behind by temporary workers, contractors, and former employees,
including accounts left behind by the attackers themselves who are former employees.
Attackers escalate their privileges on victim machines by launching password guessing, password cracking, or privilege
escalation exploits to gain administrator control of systems, which is then used to propagate to other victim machines
across an enterprise.
Attackers gain access to internal enterprise systems and gather and exfiltrate sensitive information without detection by
the victim organization.
Attackers compromise systems and alter important data, potentially jeopardizing organizational effectiveness via
polluted information.
Attackers operate undiscovered in organizations without effective incident-response capabilities, and when the
attackers are discovered, the organizations often cannot properly contain the attack, eradicate the attacker's presence,
or recover to a secure production state.
ETSI
50 ETSI TR 103 305-1 V2.1.1 (2016-08)
History
Document history
V1.1.1 May 2015 Publication as ETSI TR 103 305
ETSI