82185300
82185300
Field Definitions
ID This is the ID number of the specific critical security control sub-control reference as included i
Category This is the critical control category as defined by the Critical Security Controls documentation.
Critical Security Control Detail This is the detail behind each specific sub-control as defined by the Critical Security Controls do
EOF Function This standards for "Executive Order Framework (EOF)" function. These functions were defined
Sensor or Baseline This is the type of technical system or baseline that we believe is necessary in order to implem
Policy Approved This question determines whether the organization currently has a policy defined that indicate
Control Implemented This question determines whether or not the organization currently has implemented this sub
Control Automated This question determines whether or not the organization currently has automated the implem
Control Reported to Business This question determines whether or not the organization is reporting this sub control to busin
ls Initial Assessment Tool (v5.0b)
assessment of their information assurance maturity level based on the controls defined by the Critical
r suggestions can be directed to info@auditscripts.com. In order to use this tool, the assessor must only
C #20. By choosing a drop down choice for each critical control, the assessment tool will automatically
ers to each question, the dashboard worksheet will automatically populate with the overall maturity level
anization's progress and what percentage of the Critical Security Controls they are currently following. Ideally
nformation, but in the meanwhile, this tool can be used to help start the process of manually assessing the
*Rating is on a 0-5 scale. Pol i ci es Compl ete Control s 1-5 Impl emented Al l Con
Control s 1-5 Impl emented Al l Control s Impl emented Al l Control s Automated Al l Control s Reported
0% 0% 0% 0% 0% 0% 0% 0% 0% 0%
0% 0% 0% 0% 0% 0% 0% 0% 0% 0%
0% 0% 0% 0% 0% 0% 0% 0% 0% 0%
0% 0% 0% 0% 0% 0% 0% 0% 0% 0%
0% 0% 0% 0%
1.1 QW Deploy an automated asset inventory discovery tool and use it to build a preliminary
asset inventory of systems connected to an organization’s public and private
network(s). Both active tools that scan through network address ranges and passive
tools that identify hosts based on analyzing their traffic should be employed.
Deploy dynamic host configuration protocol (DHCP) server logging, and utilize a system
1.2 QW to improve the asset inventory and help detect unknown systems through this DHCP
information.
1.3 QW Ensure that all equipment acquisitions automatically update the inventory system as
new, approved devices are connected to the network.
Maintain an asset inventory of all systems connected to the network and the network
devices themselves, recording at least the network addresses, machine name(s),
purpose of each system, an asset owner responsible for each device, and the
1.4 V/A department associated with each device. The inventory should include every system
that has an Internet protocol (IP) address on the network, including but not limited to
desktops, laptops, servers, network equipment (routers, switches, firewalls, etc.),
printers, storage area networks, Voice Over-IP telephones, multi-homed addresses,
virtual addresses, etc. The asset inventory created must also include data on whether
the device is a portable and/or personal device. Devices such as mobile phones,
tablets, laptops, and other portable electronic devices that store or process data must
be identified, regardless of whether they are attached to the organization’s network.
Deploy network level authentication via 802.1x to limit and control which devices can
1.5 C/H be connected to the network. The 802.1x must be tied into the inventory data to
determine authorized versus unauthorized systems.
Deploy network access control (NAC) to monitor authorized systems so if attacks occur,
1.6 C/H the impact can be remediated by moving the untrusted system to a virtual local area
network that has minimal access.
1.7 ADV Utilize client certificates to validate and authenticate systems prior to connecting to the
private network.
This work
Security Control #1: Inventory of Authorized and Unauthorized Devices
0% 0% 0%
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
thorized Devices
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0% 0% 0% 0%
Deploy application whitelisting technology that allows systems to run software only if it
is included on the whitelist and prevents execution of all other software on the system.
The whitelist may be very extensive (as is available from commercial whitelist vendors),
2.1 QW so that users are not inconvenienced when using common software. Or, for some
special-purpose systems (which require only a small number of programs to achieve
their needed business functionality), the whitelist may be quite narrow. When
protecting systems with customized software that may be seen as difficult to whitelist,
use item 8 below (isolating the custom software in a virtual operating system that does
not retain infections.).
Devise a list of authorized software and version that is required in the enterprise for
2.2 QW each type of system, including servers, workstations, and laptops of various kinds and
uses. This list should be monitored by file integrity checking tools to validate that the
authorized software has not been modified.
Perform regular scanning for unauthorized software and generate alerts when it is
discovered on a system. A strict change-control process should also be implemented
2.3 QW to control any changes or installation of software to any systems on the network. This
includes alerting when unrecognized binaries (executable files, DLL’s and other
libraries, etc.) are found on a system, even inside of compressed archives. This
includes checking for unrecognized or altered versions of software by comparing file
hash values (attackers often utilize altered versions of known software to perpetrate
attacks, and file hash comparisons will reveal the compromised software components).
Deploy software inventory tools throughout the organization covering each of the
operating system types in use, including servers, workstations, and laptops. The
2.4 QW software inventory system should track the version of the underlying operating system
as well as the applications installed on it. Furthermore, the tool should record not only
the type of software installed on each system, but also its version number and patch
level.
2.5 V/A The software inventory systems must be tied into the hardware asset inventory so all
devices and associated software are tracked from a single location.
2.6 C/H
Dangerous file types (e.g., .exe, .zip, .msi) should be closely monitored and/or blocked.
Virtual machines and/or air-gapped systems should be used to isolate and run
2.7 ADV applications that are required for business operations but based on higher risk should
not be installed within a networked environment.
2.8 ADV Configure client workstations with non-persistent, virtualized operating environments
that can be quickly and easily restored to a trusted snapshot on a periodic basis.
Deploy software that only provides signed software ID tags. A software identification
2.9 ADV tag is an XML file that is installed alongside software and uniquely identifies the
software, providing data for software inventory and asset management.
This work is
curity Control #2: Inventory of Authorized and Unauthorized Software
0% 0% 0%
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
horized Software
0% 0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0% 0% 0% 0%
Establish and ensure the use of standard secure configurations of your operating
systems. Standardized images should represent hardened versions of the underlying
3.1 QW operating system and the applications installed on the system. Hardening typically
includes: removal of unnecessary accounts (including service accounts), disabling or
removal of unnecessary services, configuring non-executable stacks and heaps,
applying patches, closing open and unused network ports, implementing intrusion
detection systems and/or intrusion prevention systems, and use of host-based
firewalls. These images should be validated and refreshed on a regular basis to update
their security configuration in light of recent vulnerabilities and attack vectors.
Implement automated patching tools and processes for both applications and for
3.2 QW operating system software. When outdated systems can no longer be patched, update
to the latest version of application software. Remove outdated, older, and unused
software from the system.
3.3 QW Limit administrative privileges to very few users who have both the knowledge
necessary to administer the operating system and a business need to modify the
configuration of the underlying operating system. This will help prevent installation of
unauthorized software and other abuses of administrator privileges.
Follow strict configuration management, building a secure image that is used to build
all new systems that are deployed in the enterprise. Any existing system that becomes
3.4 QW compromised should be re-imaged with the secure build. Regular updates or
exceptions to this image should be integrated into the organization’s change
management processes. Images should be created for workstations, servers, and other
system types used by the organization.
Store the master images on securely configured servers, validated with integrity
checking tools capable of continuous inspection, and change management to ensure
3.5 QW that only authorized changes to the images are possible. Alternatively, these master
images can be stored in offline machines, air-gapped from the production network,
with images copied via secure media to move them between the image storage servers
and the production network.
Negotiate contracts to buy systems configured securely out of the box using
3.6 V/A standardized images, which should be devised to avoid extraneous software that would
increase their attack surface and susceptibility to vulnerabilities.
Utilize file integrity checking tools to ensure that critical system files (including sensitive
system and application executables, libraries, and configurations) have not been
altered. All alterations to such files should be automatically reported security
3.8 C/H personnel. The reporting system should have the ability to account for routine and
expected changes, highlighting unusual or unexpected alterations. For investigative
support, the reporting system should be able to show the history of configuration
changes over time and identify who made the change (including the original logged-in
account in the event of a user ID switch, such as with the su or sudo command). These
integrity checks should also identify suspicious system alterations such as owner and
permissions changes to files or directories; the use of alternate data streams which
could be used to hide malicious activities; as well as detecting the introduction of extra
files into key system areas (which could indicate malicious payloads left by attackers or
additional files inappropriately added during batch distribution processes).
Implement and test an automated configuration monitoring system that measures all
3.9 ADV secure configuration elements that can be measured through remote testing using
features such as those included with tools compliant with Security Content Automation
Protocol (SCAP), and alerts when unauthorized changes occur. This includes detecting
new listening ports, new administrative users, changes to group and local policy
objects, (where applicable), and new services running on a system.
Deploy system configuration management tools, such as Active Directory Group Policy
3.10 C/H Objects for Microsoft Windows systems or Puppet for UNIX systems that will
automatically enforce and redeploy configuration settings to systems at regularly
scheduled intervals. They should be capable of triggering redeployment of
configuration settings on a scheduled, manual, or event-driven basis.
This work is
ecurity Control #3: Secure Configurations for Hardware and Software
0% 0% 0%
Prevent
Prevent
Prevent
Secure System Configuration No Policy
Baselines & Images
Prevent
Monitor
Monitor
Detect
Prevent
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
re and Software
0% 0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0% 0% 0% 0%
Run automated vulnerability scanning tools against all systems on the network on a
weekly or more frequent basis and deliver prioritized lists of the most critical
vulnerabilities to each responsible system administrator along with risk scores that
compare the effectiveness of system administrators and departments in reducing risk.
4.1 QW Use a SCAP-validated vulnerability scanner that looks for both code-based
vulnerabilities (such as those described by Common Vulnerabilities and Exposures
entries) and configuration-based vulnerabilities (as enumerated by the Common
Configuration Enumeration Project).
Correlate event logs with information from vulnerability scans to fulfill two goals. First,
personnel should verify that the activity of the regular vulnerability scanning tools
4.2 QW themselves is logged. Second, personnel should be able to correlate attack detection
events with earlier vulnerability scanning results to determine whether the given
exploit was used against a target known to be vulnerable.
Deploy automated patch management tools and software update tools for operating
system and software/applications on all systems for which such tools are available and
4.5 V/A safe. Patches should be applied to all systems, even systems that are properly air
gapped.
Carefully monitor logs associated with any scanning activity and associated
4.6 V/A administrator accounts to ensure that all scanning activity and associated access via
the privileged account is limited to the timeframes of legitimate scans.
Compare the results from back-to-back vulnerability scans to verify that vulnerabilities
were addressed either by patching, implementing a compensating control, or
documenting and accepting a reasonable business risk. Such acceptance of business
4.7 C/H risks for existing vulnerabilities should be periodically reviewed to determine if newer
compensating controls or subsequent patches can address vulnerabilities that were
previously accepted, or if conditions have changed, increasing the risk.
Measure the delay in patching new vulnerabilities and ensure that the delay is equal to
4.8 C/H or less than the benchmarks set forth by the organization. Alternative
countermeasures should be considered if patches are not available.
Evaluate critical patches in a test environment before pushing them into production on
enterprise systems. If such patches break critical business applications on test
4.9 C/H machines, the organization must devise other mitigating controls that block
exploitation on systems where the patch cannot be deployed because of its impact on
business functionality.
0% 0% 0%
Detect
Detect
Detect
Vulnerability Intelligence Service No Policy
Monitor
Prevent
Monitor
Prevent
Prevent
0% 0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
4.0 International License.
Critical Sec
0% 0% 0% 0%
Configure laptops, workstations, and servers so that they will not auto-run content
5.3 QW from removable media, like USB tokens (i.e., “thumb drives”), USB hard drives,
CDs/DVDs, FireWire devices, external serial advanced technology attachment devices,
and mounted network shares,.
5.4 QW Configure systems so that they automatically conduct an anti-malware scan of
removable media when inserted.
5.5 QW Scan and block all e-mail attachments entering the organization’s e-mail gateway if they
contain malicious code or file types that are unnecessary for the organization’s
business. This scanning should be done before the e-mail is placed in the user’s inbox.
This includes e-mail content filtering and web content filtering.
This work is
Critical Security Control #5: Malware Defenses
0% 0% 0%
Prevent
Prevent
Log Management System / SIEM No Policy
Monitor
Anti-Malware / Endpoint Protection No Policy
Monitor System
Respond
Log Management System / SIEM No Policy
Monitor
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
n Completion Reporting Completion
0% 0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0% 0% 0% 0%
Protect web applications by deploying web application firewalls (WAFs) that inspect all
traffic flowing to the web application for common web application attacks, including
but not limited to cross-site scripting, SQL injection, command injection, and directory
traversal attacks. For applications that are not web-based, specific application firewalls
6.2 QW should be deployed if such tools are available for the given application type. If the
traffic is encrypted, the device should either sit behind the encryption or be capable of
decrypting the traffic prior to analysis. If neither option is appropriate, a host-based
web application firewall should be deployed.
For in-house developed software, ensure that explicit error checking is performed and
6.3 V/A documented for all input, including for size, data type, and acceptable ranges or
formats.
6.5 V/A Do not display system error messages to end-users (output sanitization).
Maintain separate environments for production and nonproduction systems.
6.6 V/A Developers should not typically have unmonitored access to production environments.
Test in-house-developed web and other application software for coding errors and
potential vulnerabilities prior to deployment using automated static code analysis
6.7 C/H software, as well as manual testing and inspection. In particular, input validation and
output encoding routines of application software should be reviewed and tested.
For acquired application software, examine the product security process of the vendor
6.8 C/H (history of vulnerabilities, customer notification, patching/remediation) as part of the
overall enterprise risk management process.
Ensure that all software development personnel receive training in writing secure code
6.10 C/H for their specific development environment.
For in-house developed applications, ensure that development artifacts (sample data
6.11 C/H and scripts; unused libraries, components, debug code; or tools) are not included in
the deployed software, or accessible in the production environment.
This work is
Critical Security Control #6: Application Software Security
0% 0% 0%
Prevent
Detect
Application Code Review / No Policy
Prevent Vulnerability Scanning System
Application Code Review / No Policy
Vulnerability Scanning System
Prevent
Detect
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
curity
0% 0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0% 0% 0% 0%
Use wireless intrusion detection systems (WIDS) to identify rogue wireless devices and
7.3 V /H detect attack attempts and successful compromises. In addition to WIDS, all wireless
traffic should be monitored by WIDS as traffic passes into the wired network.
Where a specific business need for wireless access has been identified, configure
7.4 C/H wireless access on client machines to allow access only to authorized wireless
networks.
For devices that do not have an essential wireless business purpose, disable wireless
access in the hardware configuration (basic input/output system or extensible firmware
7.5 C/H interface), with password protections to lower the possibility that the user will override
such configurations.
Ensure that all wireless traffic leverages at least Advanced Encryption Standard (AES)
7.6 C/H encryption used with at least Wi-Fi Protected Access 2 (WPA2) protection.
Ensure that wireless networks use authentication protocols such as Extensible
7.7 C/H Authentication Protocol-Transport Layer Security (EAP/TLS), which provide credential
protection and mutual authentication.
Disable peer-to-peer wireless network capabilities on wireless clients, unless such
7.8 C/H functionality meets a documented business need.
Disable wireless peripheral access of devices (such as Bluetooth), unless such access is
7.9 C/H required for a documented business need.
Create separate virtual local area networks (VLANs) for BYOD systems or other
untrusted devices. Internet access from this VLAN should go through at least the same
7.10 C/H border as corporate traffic. Enterprise access from this VLAN should be treated as
untrusted and filtered and audited accordingly.
This work is
Critical Security Control #7: Wireless Access Control
0% 0% 0%
Prevent
Prevent
Configuration Enforcement System No Policy
Prevent
Prevent Configuration Enforcement System No Policy
Prevent Public Key Infrastructure (PKI) No Policy
Prevent Network Access Control (NAC) No Policy
Configuration Enforcement System No Policy
Prevent
Configuration Enforcement System No Policy
Prevent
Prevent
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
rol
0% 0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0% 0% 0% 0%
Ensure that each system is automatically backed up on at least a weekly basis, and
more often for systems storing sensitive information. To help ensure the ability to
rapidly restore a system from backup, the operating system, application software, and
8.1 QW data on a machine should each be included in the overall backup procedure. These
three components of a system do not have to be included in the same backup file or
use the same backup software. There should be multiple backups over time, so that in
the event of malware infection, restoration can be from a version that is believed to
predate the original infection. All backup policies should be compliant with any
regulatory or official requirements.
8.2 QW Test data on backup media on a regular basis by performing a data restoration process
to ensure that the backup is properly working.
Ensure that backups are properly protected via physical security or encryption when
8.3 C/H they are stored, as well as when they are moved across the network. This includes
remote backups and cloud services.
Ensure that key systems have at least one backup destination that is not continuously
8.4 C/H addressable through operating system calls. This will mitigate the risk of attacks like
CryptoLocker which seek to encrypt or damage data on all addressable data shares,
including backup destinations.
This work is
Critical Security Control #8: Data Recovery Capability
0% 0% 0%
Prevent
Backup / Recovery System No Policy
Monitor
Prevent
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
lity
0% 0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0% 0% 0% 0%
Deliver training to fill the skills gap. If possible, use more senior staff to deliver the
9.2 QW training. A second option is to have outside teachers provide training onsite so the
examples used will be directly relevant. If you have small numbers of people to train,
use training conferences or online training to fill the gaps.
Implement an online security awareness program that (1) focuses only on the methods
commonly used in intrusions that can be blocked through individual action, (2) is
9.3 QW delivered in short online modules convenient for employees (3) is updated frequently
(at least annually) to represent the latest attack techniques, (4) is mandated for
completion by all employees at least annually, and (5) is reliably monitored for
employee completion.
Validate and improve awareness levels through periodic tests to see whether
9.4 V/A employees will click on a link from suspicious e-mail or provide sensitive information
on the telephone without following appropriate procedures for authenticating a caller;
targeted training should be provided to those who fall victim to the exercise.
Use security skills assessments for each of the mission-critical roles to identify skills
9.5 C/H gaps. Use hands-on, real-world examples to measure mastery. If you do not have such
assessments, use one of the available online competitions that simulate real-world
scenarios for each of the identified jobs in order to measure skills mastery.
This work is
Control #9: Security Skills Assessment and Appropriate Training to Fill Gaps
0% 0% 0%
Prevent
Prevent
Monitor
Identify
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
te Training to Fill Gaps
0% 0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0% 0% 0% 0%
All new configuration rules beyond a baseline-hardened configuration that allow traffic
10.2 C/H to flow through network security devices, such as firewalls and network-based IPS,
should be documented and recorded in a configuration management system, with a
specific business reason for each change, a specific individual’s name responsible for
that business need, and an expected duration of the need.
10.3 C/H Use automated tools to verify standard device configurations and detect changes. All
alterations to such files should be automatically reported to security personnel.
10.4 C/H
Manage network devices using two-factor authentication and encrypted sessions.
10.5 C/H
Install the latest stable version of any security-related updates.
Manage the network infrastructure across network connections that are separated
10.6 ADV from the business use of that network, relying on separate VLANs or, preferably, on
entirely different physical connectivity for management sessions for network devices.
This work is
l Security Control #10: Secure Configurations for Network Devices
0% 0% 0%
Monitor
Identify
Monitor Network Traffic / Service Baseline No Policy
Network Device Management No Policy
Monitor System
Prevent Network Traffic / Service Baseline No Policy
Network Device Management No Policy
Prevent System
Network Device Management No Policy
Prevent System
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
work Devices
0% 0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0% 0% 0% 0%
Ensure that only ports, protocols, and services with validated business needs are
11.1 QW running on each system.
Apply host-based firewalls or port filtering tools on end systems, with a default-deny
11.2 QW rule that drops all traffic except those services and ports that are explicitly allowed.
Perform automated port scans on a regular basis against all key servers and compared
11.3 QW to a known effective baseline. If a change that is not listed on the organization’s
approved baseline is discovered, an alert should be generated and reviewed.
Keep all services up to date and uninstall and remove any unnecessary components
11.4 QW from the system.
Verify any server that is visible from the Internet or an untrusted network, and if it is
11.5 V/A not required for business purposes, move it to an internal VLAN and give it a private
address.
Operate critical services on separate physical or logical host machines, such as DNS,
11.6 C/H file, mail, web, and database servers.
Place application firewalls in front of any critical servers to verify and validate the traffic
11.7 C/H going to the server. Any unauthorized services or traffic should be blocked and an alert
generated.
This work is
al Security Control #11: Limitation and Control of Network Ports
0% 0% 0%
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
twork Ports
0% 0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0% 0% 0% 0%
Use automated tools to inventory all administrative accounts and validate that each
12.2 QW person with administrative privileges on desktops, laptops, and servers is authorized by
a senior executive.
Before deploying any new devices in a networked environment, change all default
12.4 QW passwords for applications, operating systems, routers, firewalls, wireless access points,
and other systems to have values consistent with administration-level accounts.
Ensure that all service accounts have long and difficult-to-guess passwords that are
12.5 QW changed on a periodic basis, as is done for traditional user and administrative
passwords.
Through policy and user awareness, require that administrators establish unique,
different passwords for their administrative and non-administrative accounts. Each
person requiring administrative access should be given his/her own separate account.
12.8 QW Users should only use the Windows “administrator” or UNIX “root” accounts in
emergency situations. Domain administration accounts should be used when required
for system administration instead of local administrative accounts.
This work is
l Security Control #12: Controlled Use of Administrative Privileges
0% 0% 0%
Prevent
Prevent
Prevent
Host Based Access Control Lists No Policy
Prevent
Prevent
Authentication System No Policy
Prevent
Prevent
Prevent
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
ve Privileges
0% 0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0% 0% 0% 0%
Deny communications with (or limit data flow to) known malicious IP addresses (black
lists), or limit access only to trusted sites (whitelists). Tests can be periodically carried
out by sending packets from bogon source IP addresses (non-routable or otherwise
13.1 QW unused IP addresses) into the network to verify that they are not transmitted through
network perimeters. Lists of bogon addresses are publicly available on the Internet
from various sources, and indicate a series of IP addresses that should not be used for
legitimate traffic traversing the Internet.
On DMZ networks, configure monitoring systems (which may be built in to the IDS
sensors or deployed as a separate technology) to record at least packet header
information, and preferably full packet header and payloads of the traffic destined for
13.2 QW or passing through the network border. This traffic should be sent to a properly
configured Security Information Event Management (SIEM) or log analytics system so
that events can be correlated from all devices on the network.
To lower the chance of spoofed e-mail messages, implement the Sender Policy
13.3 V/A Framework (SPF) by deploying SPF records in DNS and enabling receiver-side
verification in mail servers.
Deploy network-based IDS sensors on Internet and extranet DMZ systems and
networks that look for unusual attack mechanisms and detect compromise of these
13.4 V/A systems. These network-based IDS sensors may detect attacks through the use of
signatures, network behavior analysis, or other mechanisms to analyze traffic.
Network-based IPS devices should be deployed to complement IDS by blocking known
bad signature or behavior of attacks. As attacks become automated, methods such as
IDS typically delay the amount of time it takes for someone to react to an attack. A
13.5 V/A properly configured network-based IPS can provide automation to block bad traffic.
When evaluating network-based IPS products, include those using techniques other
than signature-based detection (such as virtual machine or sandbox-based
approaches) for consideration.
Design and implement network perimeters so that all outgoing web, file transfer
protocol (FTP), and secure shell traffic to the Internet must pass through at least one
proxy on a DMZ network. The proxy should support logging individual TCP sessions;
blocking specific URLs, domain names, and IP addresses to implement a black list; and
13.6 V/A applying whitelists of allowed sites that can be accessed through the proxy while
blocking all other sites. Organizations should force outbound traffic to the Internet
through an authenticated proxy server on the enterprise perimeter. Proxies can also
be used to encrypt all traffic leaving an organization.
Require all remote login access (including VPN, dial-up, and other forms of access that
13.7 V/A allow login to internal systems) to use two-factor authentication.
All enterprise devices remotely logging into the internal network should be managed
by the enterprise, with remote control of their configuration, installed software, and
13.8 C/H patch levels. For third-party devices (e.g., subcontractors/vendors), publish minimum
security standards for access to the enterprise network and perform a security scan
before allowing access.
Periodically scan for back-channel connections to the Internet that bypass the DMZ,
including unauthorized VPN connections and dual-homed hosts connected to the
13.9 C/H enterprise network and to other networks via wireless, dial-up modems, or other
mechanisms.
To help identify covert channels exfiltrating data through a firewall, configure the built-
in firewall session tracking mechanisms included in many commercial firewalls to
13.13 ADV identify TCP sessions that last an unusually long time for the given organization and
firewall device, alerting personnel about the source and destination addresses
associated with these long sessions.
Deploy NetFlow collection and analysis to DMZ network flows to detect anomalous
13.14 C/H activity.
This work is
Critical Security Control #13: Boundary Defense
0% 0% 0%
Prevent
Monitor
Detect
Prevent
Network Information Flow Baseline No Policy
Monitor
Network Proxy / Firewall / No Policy
Monitor Monitoring System
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
e
0% 0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0% 0% 0% 0%
Include at least two synchronized time sources (i.e., Network Time Protocol – NTP)
14.1 QW from which all servers and network equipment retrieve time information on a regular
basis so that timestamps in logs are consistent, and are set to UTC (Coordinate
Universal Time).
Validate audit log settings for each hardware device and the software installed on it,
ensuring that logs include a date, timestamp, source addresses, destination addresses,
14.2 QW and various other useful elements of each packet and/or transaction. Systems should
record logs in a standardized format such as syslog entries or those outlined by the
Common Event Expression initiative. If systems cannot generate logs in a standardized
format, log normalization tools can be deployed to convert logs into such a format.
Ensure that all systems that store logs have adequate storage space for the logs
14.3 QW generated on a regular basis, so that log files will not fill up between log rotation
intervals. The logs must be archived and digitally signed on a periodic basis.
Develop a log retention policy to make sure that the logs are kept for a sufficient period
14.4 QW of time. Organizations are often compromised for several months without detection.
The logs must be kept for a longer period of time than it takes an organization to detect
an attack so they can accurately determine what occurred.
Have security personnel and/or system administrators run biweekly reports that
14.5 QW identify anomalies in logs. They should then actively review the anomalies,
documenting their findings.
Configure network boundary devices, including firewalls, network-based IPS, and
14.6 V/A inbound and outbound proxies, to verbosely log all traffic (both allowed and blocked)
arriving at the device.
For all servers, ensure that logs are written to write-only devices or to dedicated
14.7 V/A logging servers running on separate machines from the hosts generating the event
logs, lowering the chance that an attacker can manipulate logs stored locally on
compromised machines.
Deploy a SIEM (Security Incident and Event Management) or log analytic tools for log
aggregation and consolidation from multiple machines and for log correlation and
14.8 V/A analysis. Using the SIEM tool, system administrators and security personnel should
devise profiles of common events from given systems so that they can tune detection
to focus on unusual activity, avoid false positives, more rapidly identify anomalies, and
prevent overwhelming analysts with insignificant alerts.
Monitor for service creation events and enable process tracking logs. On Windows
14.9 ADV systems, many attackers use PsExec functionality to spread from system to system.
Creation of a service is an unusual event and should be monitored closely. Process
tracking is valuable for incident handling.
Ensure that the log collection system does not lose events during peak activity, and
14.10 ADV that the system detects and alerts if event loss occurs (such as when volume exceeds
the capacity of a log collection system). This includes ensuring that the log collection
system can accommodate intermittent or restricted-bandwidth connectivity through
the use of handshaking / flow control.
This work is
urity Control #14: Maintenance, Monitoring, and Analysis of Audit Logs
0% 0% 0%
Prevent
Prevent
Monitor
Monitor
Monitor
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
lysis of Audit Logs
0% 0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0% 0% 0% 0%
Locate any sensitive information on separated VLANS with firewall filtering. All
15.1 QW communication of sensitive information over less-trusted networks should be
encrypted.
Enforce detailed audit logging for access to nonpublic data and special authentication
15.3 V/A for sensitive data.
Segment the network based on the trust levels of the information stored on the
15.4 C/H servers. Whenever information flows over a network with a lower trust level, the
information should be encrypted.
Use host-based data loss prevention (DLP) to enforce ACLs even when data is copied off
a server. In most organizations, access to the data is controlled by ACLs that are
15.5 ADV implemented on the server. Once the data have been copied to a desktop system, the
ACLs are no longer enforced and the users can send the data to whomever they want.
This work is
Security Control #15: Controlled Access Based on the Need to Know
0% 0% 0%
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Need to Know
0% 0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0% 0% 0% 0%
16.1 QW Review all system accounts and disable any account that cannot be associated with a
business process and owner.
16.2 QW
Ensure that all accounts have an expiration date associated with the account.
Ensure that systems automatically create a report that includes a list of locked-out
16.3 QW accounts, disabled accounts, accounts with passwords that exceed the maximum
password age, and accounts with passwords that never expire. This list should be sent
to the associated system administrator in a secure fashion.
Establish and follow a process for revoking system access by disabling accounts
16.4 QW immediately upon termination of an employee or contractor. Disabling instead of
deleting accounts allows preservation of audit trails.
16.5 QW Regularly monitor the use of all accounts, automatically logging off users after a
standard period of inactivity.
16.6 QW Configure screen locks on systems to limit access to unattended workstations.
Monitor account usage to determine dormant accounts, notifying the user or user’s
16.7 QW manager. Disable such accounts if not needed, or document and monitor exceptions
(e.g., vendor maintenance accounts needed for system recovery or continuity
operations).
Require that all non-administrator accounts have strong passwords that contain letters,
16.8 QW numbers, and special characters, be changed at least every 90 days, have a minimal
age of one day, and not be allowed to use the previous 15 passwords as a new
password. These values can be adjusted based on the specific business needs of the
organization.
16.9 QW Use and configure account lockouts such that after a set number of failed login
attempts the account is locked for a standard period of time.
Require that managers match active employees and contractors with each account
16.10 V/A belonging to their managed staff. Security or system administrators should then disable
accounts that are not assigned to active employees or contractors.
16.11 V/A
Monitor attempts to access deactivated accounts through audit logging.
Configure access for all accounts through a centralized point of authentication, for
16.12 C/H example Active Directory or LDAP. Configure network and security devices for
centralized authentication as well.
Profile each user’s typical account usage by determining normal time-of-day access
16.13 C/H and access duration. Reports should be generated that indicate users who have logged
in during unusual hours or have exceeded their normal login duration. This includes
flagging the use of the user’s credentials from a computer other than computers on
which the user generally works.
Require multi-factor authentication for accounts that have access to sensitive data or
16.14 ADV systems. Multi-factor authentication can be achieved using Smart cards with
certificates, One Time Password (OTP) tokens, or biometrics.
For authenticated access to web services within an enterprise, ensure that account
16.15 ADV usernames and passwords are passed over an encrypted channel and associated
password hash files are stored securely if a centralized service is not employed.
16.16 ADV Configure all systems to use encrypted channels for the transmission of passwords over
a network.
Verify that all password files are encrypted or hashed and that these files cannot be
16.17 ADV accessed without root or administrator privileges. Audit all access to password files in
the system.
This work is
ritical Security Control #16: Account Monitoring and Control
0% 0% 0%
Prevent
Configuration Enforcement System No Policy
Prevent
Identify User Account Inventory No Policy
Identity & Access Management No Policy
Identify System
Monitor User Account Inventory No Policy
Monitor Log Management System / SIEM No Policy
Prevent User Account Inventory No Policy
Prevent Authentication System No Policy
Monitor
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Control
0% 0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0% 0% 0% 0%
17.3 QW
Perform an assessment of data to identify sensitive information that requires the
application of encryption and integrity controls
17.4 QW Review cloud provider security practices for data protection.
Deploy an automated tool on network perimeters that monitors for certain sensitive
17.5 V/A information (i.e., personally identifiable information), keywords, and other document
characteristics to discover unauthorized attempts to exfiltrate data across network
boundaries and block such transfers while alerting information security personnel.
17.7 C/H Move data between networks using secure, authenticated, and encrypted
mechanisms.
If there is no business need for supporting such devices, configure systems so that they
will not write data to USB tokens or USB hard drives. If such devices are required,
enterprise software should be used that can configure systems to allow only specific
17.8 C/H USB devices (based on serial number or other unique property) to be accessed, and
that can automatically encrypt all data placed on such devices. An inventory of all
authorized devices must be maintained.
Use network-based DLP solutions to monitor and control the flow of data within the
17.9 C/H network. Any anomalies that exceed the normal traffic patterns should be noted and
appropriate action taken to address them.
Only allow approved Certificate Authorities (CAs) to issue certificates within the
17.10 C/H enterprise; Review and verify each CAs Certificate Practices Statement (CPS) and
Certificate Policy (CP).
Perform an annual review of algorithms and key lengths in use for protection of
17.11 C/H sensitive data.
Monitor all traffic leaving the organization and detect any unauthorized use of
encryption. Attackers often use an encrypted channel to bypass network security
17.12 ADV devices. Therefore it is essential that organizations be able to detect rogue
connections, terminate the connection, and remediate the infected system.
17.13 ADV Block access to known file transfer and e-mail exfiltration websites.
Define roles and responsibilities related to management of encryption keys within the
17.14 ADV enterprise; define processes for lifecycle.
Where applicable, implement Hardware Security Modules (HSMs) for protection of
17.15 ADV private keys (e.g., for sub CAs) or Key Encryption Keys.
This work is
Critical Security Control #17: Data Protection
0% 0% 0%
Prevent
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
on Completion Reporting Completion
0% 0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0% 0% 0% 0%
Devise organization-wide standards for the time required for system administrators and
other personnel to report anomalous events to the incident handling team, the
18.4 QW mechanisms for such reporting, and the kind of information that should be included in
the incident notification. This reporting should also include notifying the appropriate
Community Emergency Response Team in accordance with all legal or regulatory
requirements for involving that organization in computer incidents.
Assemble and maintain information on third-party contact information to be used to
18.5 QW report a security incident (i.e., maintain an e-mail address of
security@organization.com or have a web page http://organization.com/security).
Publish information for all personnel, including employees and contractors, regarding
18.6 QW reporting computer anomalies and incidents to the incident handling team. Such
information should be included in routine employee awareness activities.
Conduct periodic incident scenario sessions for personnel associated with the incident
18.7 C/H handling team to ensure that they understand current threats and risks, as well as their
responsibilities in supporting the incident handling team.
This work is
tical Security Control #18: Incident Response and Management
0% 0% 0%
No Policy
Prevent Incident Management Standard
No Policy
Prevent Incident Management Standard
No Policy
Prevent Incident Management Standard
No Policy
No Policy
Prevent Incident Management Standard
No Policy
Prevent Incident Management Standard
No Policy
Prevent Incident Management Standard
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
nagement
0% 0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0% 0% 0% 0%
19.2 C/H To support rapid response and shunning of detected attacks, engineer the network
architecture and its corresponding systems for rapid deployment of new access control
lists, rules, signatures, blocks, blackholes, and other defensive measures.
Deploy domain name systems (DNS) in a hierarchical, structured fashion, with all
internal network client machines configured to send requests to intranet DNS servers,
19.3 V/A not to DNS servers located on the Internet. These internal DNS servers should be
configured to forward requests they cannot resolve to DNS servers located on a
protected DMZ. These DMZ servers, in turn, should be the only DNS servers allowed to
send requests to the Internet.
19.4 C/H
Segment the enterprise network into multiple, separate trust zones to provide more
granular control of system access and additional intranet boundary defenses.
This work is
Critical Security Control #19: Secure Network Engineering
0% 0% 0%
Prevent
Prevent
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
eering
0% 0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0% 0% 0% 0%
Conduct regular external and internal penetration tests to identify vulnerabilities and
20.1 QW attack vectors that can be used to exploit enterprise systems successfully. Penetration
testing should occur from outside the network perimeter (i.e., the Internet or wireless
frequencies around an organization) as well as from within its boundaries (i.e., on the
internal network) to simulate both outsider and insider attacks.
Any user or system accounts used to perform penetration testing, should be controlled
20.2 QW and monitored to make sure they are only being used for legitimate purposes, and are
removed or restored to normal function after testing is over.
20.3 V/A Perform periodic Red Team exercises to test organizational readiness to identify and
stop attacks or to respond quickly and effectively.
Include tests for the presence of unprotected system information and artifacts that
20.4 V/A would be useful to attackers, including network diagrams, configuration files, older
penetration test reports, e-mails or documents containing passwords or other
information critical to system operation.
Plan clear goals of the penetration test itself with blended attacks in mind, identifying
20.5 V/A the goal machine or target asset. Many APT-style attacks deploy multiple vectors—
often social engineering combined with web or network exploitation. Red Team
manual or automated testing that captures pivoted and multi-vector attacks offers a
more realistic assessment of security posture and risk to critical assets.
Use vulnerability scanning and penetration testing tools in concert. The results of
20.6 C/H vulnerability scanning assessments should be used as a starting point to guide and
focus penetration testing efforts.
20.7 ADV Devise a scoring method for determining the results of Red Team exercises so that
results can be compared over time.
Create a test bed that mimics a production environment for specific penetration tests
20.8 ADV and Red Team attacks against elements that are not typically tested in production, such
as attacks against supervisory control and data acquisition and other control
systems.
This work is
al Security Control #20: Penetration Tests and Red Team Exercises
0% 0% 0%
No Policy
No Policy
Monitor Penetration Testing System
No Policy
Identify Penetration Testing System
No Policy
No Policy
No Policy
Monitor Penetration Testing System
No Policy
Prevent Penetration Testing System
No Policy
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
am Exercises
0% 0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
Policy Status
No Policy
Informal Policy
Partial Written Policy
Written Policy
Approved Written Policy
Implementation Status
Not Implemented
Parts of Policy Implemented
Implemented on Some Systems
Implemented on All Systems
Automation Status
Not Automated
Parts of Policy Automated
Automated on Some Systems
Automated on All Systems
Reporting Status
Not Reported
Parts of Policy Reported
Reported on Some Systems
Reported on All Systems