CIS Controls Microsoft Windows 10 Cyber Hygiene Guide PDF
CIS Controls Microsoft Windows 10 Cyber Hygiene Guide PDF
Contents
Introduction ..................................................................................................................................... 1
Purpose........................................................................................................................................... 1
Audience ......................................................................................................................................... 3
Assumptions ................................................................................................................................... 4
Document Structure ........................................................................................................................ 4
Relevant Microsoft Products ........................................................................................................... 5
CIS Controls Assessment Module .................................................................................................. 6
CIS Sub-Controls Identified as Implementation Group 1 ................................................................ 8
CIS Control 1.4: Maintain Detailed Asset Inventory .................................................................................... 8
CIS Control 3.4: Deploy Automated Operating System Patch Management Tools .................................. 15
CIS Control 3.5: Deploy Automated Software Patch Management Tools ................................................. 16
CIS Control 4.3: Ensure the Use of Dedicated Administrative Accounts .................................................. 18
CIS Control 7.1: Ensure Use of Only Fully Supported Browsers and Email Clients ................................. 22
CIS Control 8.2: Ensure Anti-Malware Software and Signatures Are Updated......................................... 24
CIS Control 10.5: Ensure All Backups Have at Least One Offline Backup Destination ............................ 31
i
CIS Control 11.4: Install the Latest Stable Version of Any Security-Related Updates on All Network
Devices ..................................................................................................................................................... 32
CIS Control 13.2: Remove Sensitive Data or Systems Not Regularly Accessed by Organization ........... 36
CIS Control 14.6: Protect Information Through Access Control Lists ....................................................... 38
CIS Control 15.7: Leverage the Advanced Encryption Standard (AES) to Encrypt Wireless Data ........... 39
CIS Control 15.10: Create Separate Wireless Network for Personal and Untrusted Devices .................. 40
CIS Control 17.6: Train Workforce on Identifying Social Engineering Attacks .......................................... 48
CIS Control 17.8: Train Workforce on Causes of Unintentional Data Exposure ....................................... 50
CIS Control 17.9: Train Workforce Members on Identifying and Reporting Incidents............................... 51
CIS Control 19.3: Designate Management Personnel to Support Incident Handling ................................ 53
CIS Control 19.5: Maintain Contact Information for Reporting Security Incidents .................................... 54
CIS Control 19.6: Publish Information Regarding Reporting Computer Anomalies and Incidents............ 55
Configuring Automated Operating System Patch Management Tools via Windows Settings .................. 69
Configuring Automated Operating System Patch Management Tools via LGPE ..................................... 72
iii
Figures
Figure 1 - Implementation Group Definitions .................................................................................. 3
Figure 2 - Security Threats ............................................................................................................. 4
Figure 3 - Sample Hardware Asset Tracking Spreadsheet........................................................... 61
Figure 4 - Sample Software Asset Tracking Spreadsheet ............................................................ 62
Figure 5 - Sample Sensitive Information Tracking Spreadsheet................................................... 63
Figure 6 - Searching for Settings .................................................................................................. 64
Figure 7 - Windows Settings Home Screen .................................................................................. 65
Figure 8 - Listing of Installed Applications .................................................................................... 66
Figure 9 - Selected Installed Application....................................................................................... 67
Figure 10 - Uninstalling an Application ......................................................................................... 68
Figure 11 - Searching for Windows Update Settings .................................................................... 69
Figure 12 - Windows Update Status ............................................................................................. 70
Figure 13 - Advanced Update Options.......................................................................................... 71
Figure 14 - Searching for LGPE.................................................................................................... 72
Figure 15 - LGPE Home Screen ................................................................................................... 73
Figure 16 - LGPE Windows Components ..................................................................................... 74
Figure 17 - LGPE Windows Update Settings ................................................................................ 75
Figure 18 - Auto Download Home Screen .................................................................................... 76
Figure 19 - Searching for the Microsoft Store ............................................................................... 77
Figure 20 - Microsoft Store Home Screen .................................................................................... 78
Figure 21 - Available Settings in Microsoft Store .......................................................................... 79
Figure 22 - Detailed Settings in Microsoft Application Store ......................................................... 80
Figure 23 - Searching for Windows Update Settings .................................................................... 81
Figure 24 - Windows Update Home Screen ................................................................................. 82
Figure 25 - Windows Update Advanced Options .......................................................................... 83
Figure 26 - Advanced Windows Update Options .......................................................................... 84
Figure 27 - Searching for Windows Settings................................................................................. 85
Figure 28 - Windows Settings Home Screen ................................................................................ 86
Figure 29 - Windows Accounts Home Screen .............................................................................. 86
Figure 30 - Sign-in Options Home Screen .................................................................................... 87
Figure 31 - Changing a Windows Password ................................................................................. 87
Figure 32 - Searching for LGPE.................................................................................................... 88
Figure 33 - LGPE Home Screen ................................................................................................... 89
Figure 34 - LGPE Security Settings .............................................................................................. 89
Figure 35 - LGPE Minimum Password Length.............................................................................. 90
Figure 36 - Selecting Minimum Password Length ........................................................................ 90
Figure 37 - Searching for Windows Settings................................................................................. 91
Figure 38 - Windows Settings Home Screen ................................................................................ 92
Figure 39 - Account Home Screen................................................................................................ 92
Figure 40 - Searching for LGPE.................................................................................................... 93
Figure 41 - LGPE Home Screen ................................................................................................... 94
Figure 42 - Advanced Audit Policy Configuration Home Screen .................................................. 94
Figure 43 - Advanced Audit Policy Configuration ......................................................................... 95
Figure 44 - System Audit Policies ................................................................................................. 96
iv
Figure 45 - Audit Credential Validation Policies ............................................................................ 96
Figure 46 - Audit Computer Account Management....................................................................... 97
Figure 47 - Audit Other Account Management Events ................................................................. 97
Figure 48 - Audit Security Group Management ............................................................................ 98
Figure 49 - Audit User Account Management ............................................................................... 98
Figure 50 - Audit Process Creation ............................................................................................... 99
Figure 51 - Audit Logoff ................................................................................................................ 99
Figure 52 - Audit Logon .............................................................................................................. 100
Figure 53 - Audit Special Logon.................................................................................................. 100
Figure 54 - Audit Audit Policy Change ........................................................................................ 101
Figure 55 - Audit Authentication Policy Change ......................................................................... 101
Figure 56 - Audit IPsec Driver ..................................................................................................... 102
Figure 57 - Audit Security State Change .................................................................................... 102
Figure 58 - Audit Security System Extension.............................................................................. 103
Figure 59 - Audit System Integrity............................................................................................... 103
Figure 60 - Searching for the LGPE............................................................................................ 104
Figure 61 - Searching for Windows Defender ............................................................................. 105
Figure 62 - Windows Defender Security Center Home Screen .................................................. 106
Figure 63 - Searching for LGPEr ................................................................................................ 107
Figure 64 - LGPE Home Screen ................................................................................................. 108
Figure 65 - LGPE Administrative Templates............................................................................... 108
Figure 66 - LGPE Windows Defender Antivirus .......................................................................... 109
Figure 67 - Windows Defender Antivirus Settings ...................................................................... 109
Figure 68 - LGPE Real-time Protection ...................................................................................... 110
Figure 69 - Real-time Protection Settings ................................................................................... 111
Figure 70 - Searching for LGPE.................................................................................................. 112
Figure 71 - LGPE Home Screen ................................................................................................. 113
Figure 72 - LGPE Administrative Templates............................................................................... 113
Figure 73 - LGPE Windows Defender Antivirus .......................................................................... 114
Figure 74 - LGPE Windows Defender Antivirus Scan................................................................. 114
Figure 75 - Windows Antivirus Scan Settings ............................................................................. 115
Figure 76 - Searching for Windows Settings............................................................................... 116
Figure 77 - Windows Settings Home Screen .............................................................................. 117
Figure 78 - Bluetooth and Other Devices Settings...................................................................... 117
Figure 79 - AutoPlay Settings ..................................................................................................... 118
Figure 80 - Searching for LGPE.................................................................................................. 119
Figure 81 - LGPE Home Screen ................................................................................................. 120
Figure 82 - LGPE Administrative Templates............................................................................... 120
Figure 83 - LGPE AutoPlay Policies ........................................................................................... 121
Figure 84 - LGPE AutoRun Settings ........................................................................................... 122
Figure 85 - Turn off AutoPlay Settings ........................................................................................ 123
Figure 86 - Proper AutoPlay Configuration ................................................................................. 124
Figure 87 - Searching for Windows Defender ............................................................................. 125
Figure 88 - Windows Defender Security Center Home Screen .................................................. 126
Figure 89 - Firewall and Network Protection Settings ................................................................. 127
Figure 90 - Windows Firewall Public Network Settings............................................................... 127
v
Figure 91 - Searching for Windows Backup Settings.................................................................. 128
Figure 92- Windows 10 Backup Settings .................................................................................... 129
Figure 93 - File History Backup Options ..................................................................................... 129
Figure 94- Advanced File History Options .................................................................................. 130
Figure 95- Final File History Screen ........................................................................................... 130
Figure 96 - Searching for Windows Backup Settings.................................................................. 131
Figure 97- Windows 10 Backup Settings .................................................................................... 132
Figure 98 - Backup and Restore Home Screen .......................................................................... 132
Figure 99 - Selecting the Storage Location for Backups............................................................. 133
Figure 100- Choosing the Storage Location ............................................................................... 133
Figure 101 - Selecting the Accounts that will be Backed Up ...................................................... 134
Figure 102 - Back Up in Progress ............................................................................................... 134
Figure 103 - Searching for BitLocker .......................................................................................... 135
Figure 104 - Turn on BitLocker Setting ....................................................................................... 136
Figure 105 - Starting BitLocker Error Screen .............................................................................. 136
Figure 106 - Configure Hardware-Based Encryption .................................................................. 137
Figure 107 - Enabling Software-Based Encryption ..................................................................... 138
Figure 108 - Identifying Additional BitLocker Settings ................................................................ 139
Figure 109 - Searching for BitLocker Startup Authentication Settings ........................................ 140
Figure 110 - Requiring Additional Authentication at Startup Policy………………………………. 141
Figure 111 - Checking the System for BitLocker Support…………………………………………. 142
Figure 112 - BitLocker Setup…………………………………………………………………………. 142
Figure 113 - BitLocker Preparation Screen…………………………………………………………. 143
Figure 114 - Additional BitLocker Preparation Screen……………………………………………...143
Figure 115 - Windows Recovery Warning……………………………………………………………144
Figure 116 - Select Unlock Method…………………………………………………………………...145
Figure 117 - BitLocker Password Creation……………………………………………………….…..146
Figure 118 - Recovery Key Selection…………………………………………………………………147
Figure 119 - Encryption Type Selection………………………………………………………………148
Figure 120 - Run BitLocker System Check…………………………………………………….……..148
Figure 121 - Choosing the Encryption Mode…………………………………………………………149
Figure 122 - Searching for Windows Network Status……………………………………………….150
Figure 123 - Windows Network Status........................................................................................151
Figure 125 - Identifying AES on Local WiFi…………………………………………………………. 152
Figure 126 - Searching for Windows Settings……………………………………………………… 153
Figure 127 - Windows Settings Home Screen……………………………………………………….154
Figure 128 - Individual Account Home Screen…………………………………………………….…155
Figure 129 - Identifying Other Accounts on Windows…………………………………………….…156
Figure 130 - Searching for LGPE…………………………………………………………….…….….157
Figure 131 - LGPE Home Screen……………………………………………………………………..158
Figure 132 - LGPE Windows Settings………………………………………………………………...159
Figure 133 - LGPE Local Policies……………………………………………………………………..160
Figure 134 - Selecting Interactive Logon Settings…………………………………………………...160
Figure 135 - Interactive Logon Settings……………………………………………………………….161
vi
CIS Controls Microsoft® Windows® 10 Cyber Hygiene Guide
This work is licensed under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 International
Public License (the link can be found at https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode).
To further clarify the Creative Commons license related to the CIS Controls content, you are authorized to copy
and redistribute the content as a framework for use by you, within your organization and outside of your
organization for non-commercial purposes only, provided that (i) appropriate credit is given to CIS, and (ii) a link
to the license is provided. Additionally, if you remix, transform, or build upon the CIS Controls, you may not
distribute the modified materials. Users of the CIS Controls framework are also required to refer to
(http://www.cisecurity.org/controls/) when referring to the CIS Controls in order to ensure that users are
employing the most up to date guidance. Commercial use of the CIS Controls is subject to the prior approval of
CIS (Center for Internet Security, Inc.).
Acknowledgements
CIS (Center for Internet Security, Inc.) would like to thank the many security experts who volunteer their time and
talent to support the CIS Controls and other CIS work. CIS products represent the effort of a veritable army of
volunteers from across the industry, generously giving their time and talent in the name of a more secure online
experience for everyone.
vii
Introduction
The CIS Controls are a prioritized set of actions that collectively form a defense-in-depth set of
best practices that mitigate the most common attacks against systems and networks. The CIS
Controls are developed by a community of Information Technology (IT) experts who apply their
first-hand experience as cyber defenders to create these globally accepted security best
practices. The experts who develop the CIS Controls come from a wide range of sectors including
retail, manufacturing, healthcare, education, government, defense, and others. While the CIS
Controls address the general practices that most organizations should take to secure their
systems, some operational environments may present unique requirements not addressed by the
CIS Controls.
We are at a fascinating point in the evolution of what we now call cyber defense. To help us
understand the cyber threat, we have seen the
emergence of threat information feeds, reports, tools, The Center for Internet Security, Inc.
alert services, standards, and threat-sharing frameworks. (CIS) is a 501(c)(3) non-profit organization
To top it all off, we are surrounded by security whose mission is to identify, develop,
requirements, risk management frameworks, compliance validate, promote, and sustain best practices
regimes, regulatory mandates, and so forth. There is no in cybersecurity; deliver world-class
shortage of information available to security practitioners cybersecurity solutions to prevent and
on what they should do to secure their infrastructure. But rapidly respond to cyber incidents;
all this technology, information, and oversight has and build and lead communities to enable
become a veritable “Fog of More” with competing options, an environment of trust in cyberspace.
priorities, opinions, and claims that can paralyze or
distract an enterprise from vital action. Business For additional information, go to
complexity is growing, dependencies are expanding, https://www.cisecurity.org/
users are becoming more mobile, and the threats are
evolving. New technology brings us great benefits, but it also means that our data and
applications are distributed across multiple locations, many of which are not within our
organization’s infrastructure.
Purpose
Credit card breaches, identity theft, ransomware, theft of intellectual property, loss of privacy,
denial of service – these cyber incidents have become everyday news. Victims include some of
the largest, best-funded, and most security-savvy enterprises: government agencies, major
retailers, financial services companies, even security solution vendors. Many of the victims have
millions of dollars to allocate for cybersecurity, yet still fall short in their efforts to defend against
common attacks. What is even more disturbing is that many of the attacks could have been
prevented by well-known security practices such as regular patching and secure configurations.
What are the rest of us supposed to do? How do organizations with small budgets and limited
resources respond to the continuing cyber problem? This guide seeks to empower the owners of
small and medium-sized enterprises (SMEs) to protect their businesses with a small number of
high priority actions based on the Center for Internet Security’s Critical Security Controls (CIS
Controls). Historically, the CIS Controls utilized the order of the Controls as a means of focusing
1
an organization’s cybersecurity activities, resulting in a subset of the first six CIS Controls referred
to as cyber hygiene. However, many of the practices found within the CIS cyber hygiene control
set can be difficult for organizations with limited resources to implement. This highlighted a need
for a collection of best practices focused on balancing resource constraints and effective risk
mitigation. As a result, CIS is proposing the following guidance to prioritize CIS Control utilization,
known as CIS Implementation Groups (IGs).
Implementation Group 1
Implementation Group 2
Implementation Group 3
A Group 3 organization employs security experts that specialize in the difference facets
of cybersecurity (e.g., risk management, penetration testing, application security). Group
3 systems and data contain sensitive information or functions that are subject to
regulatory and compliance oversight. A Group 3 organization must address availability of
services and the confidentiality and integrity of sensitive data. Successful attacks can
cause significant harm to the public welfare. Sub-Controls selected for Group 3 must
abate targeted attacks from a sophisticated adversary and reduce the impact of zero-day attacks.
While this approach provides generalized guidance for prioritizing usage of the CIS Controls, this
should not replace an organization’s need to understand their own organizational risk posture.
Organizations should still seek to conduct their own care analysis and tailor their implementation
of the CIS controls based on what is appropriate and reasonable given their resources, mission,
and risks. Using these types of methods, such as those described in the CIS Risk Assessment
Method (RAM), combinations of different implementation groups can inform risk-information
2
decisions about which sub-controls in their implementation group they may not want to
implement, and in turn which higher group’s controls they should strive for. The intention is to
help an organization focus its efforts based on the resources they have available and integrate
controls into any pre-existing risk management process.
The IGs are self-assessed organizational categories based on relevant cybersecurity attributes.
Each IG identifies a subset of the CIS Controls that the community has broadly assessed to be
reasonable for an organization with a similar risk profile to the definition assigned in Figure 1, and
resources to strive to implement. These IGs represent a horizontal cut across the CIS Controls
tailored to that type of enterprise, where each IG builds upon the previous one. Accordingly, an
organization implementing the sub-controls defined for their IG is moving towards a standard
requirement of care as described in the CIS RAM.
This guide provides detailed information on how to accomplish each of the sub-controls within
Implementation Group 1 (IG1). This guide builds upon the best practices established via the CIS
Controls V7.1. Where possible, the document provides step-by-step guidance on how
organizations utilizing the Microsoft Windows operating system and supporting platforms can
meet applicable sub-controls.
Audience
This document is meant to help individuals and organizations comply with the set of cybersecurity
protections detailed within IG1. The primary audience for this guide is IT contractors for small-, to
medium-sized businesses, although it is beneficial to anyone concerned about the security
threats listed in Figure 1 – Security Threats:
3
Figure 2- Security Threats
Assumptions
A set of assumptions were identified when developing this guidance:
• Individuals and organizations using this guidance lack large numbers of cybersecurity-
focused professionals within their organizations.
• The systems being safeguarded may not be domain-joined, meaning that there is not a
central location from which to deploy policy.
• The organization likely has few to zero servers.
• The organization likely uses some cloud services to provide key pieces of infrastructure,
such as email.
• The IT environment is fairly static and does not change much over time.
Document Structure
The presentation of each sub-control in this document includes the following elements:
4
• Guidance and Tools: This section provides additional information for implementing the
Sub-Control, alongside pointers to external guidance documents. Free and open source
tools for accomplishing a given Sub-Control can also be found here.
• Acronyms and References: This section contains commonly used acronyms and
abbreviations alongside references mentioned throughout the document.
• Step-by-Step Instructions: Many of the Sub-Controls contain step-by-step instructions
for putting the cybersecurity control in place.
Microsoft Windows 10 Home and Windows 10 Pro are separate editions of Microsoft’s Windows
10 operating system. Microsoft provides a useful guide to the differences between these two
editions of Windows at the following link (https://www.microsoft.com/en-us/windows/compare).
Windows 10 Pro will be the primary edition of the Windows 10 operating system discussed within
this document. Windows Home provides the basics most users need to accomplish everyday
tasks, such as writing documents, manipulating spreadsheets, and browsing the Internet.
Windows Home is also not meant for commercial usage. However, most businesses need more
power in order to get their job done, and Windows 10 Pro is designed to fill that niche.
Two common primary enterprise needs include management and security. Windows 10 Pro
allows an organization to join a system to a domain. This means that a sever or domain controller
will be able to remotely distribute policy and configuration settings from a single centralized
system. These policies allow an enterprise to manage how employees can use their computer
systems, such as locking their systems after a period of inactivity. Deploying policies is an
extremely powerful enterprise feature that can also activate enterprise class security mitigations
that may otherwise not be used. For instance, Windows 10 Pro contacts BitLocker, which is
Microsoft’s full disk encryption system. BitLocker can also encrypt any Universal Serial Bus (USB)
and other extra drives.
Office 365 is Microsoft’s subscription-based cloud offering that includes an entire suite of
Microsoft’s web-based applications. This includes standard business applications like Word,
Excel, and Outlook. Office 365 also includes the Office 365 Admin Center, which provides access
to Azure Active Directory. This feature allows an enterprise to join Windows 10 Pro systems to a
5
cloud-based domain. This provides many, but not all, of the security and management benefits of
using a domain controller without needing to setup an instance of Microsoft Server on premises.
The first version of the Controls Assessment Module covers IG1 in Windows 10 environments,
providing a combination of automated checks and survey questions to cover the 43 IG1 Sub-
Controls. For the more procedural Sub-Controls, the Controls Assessment Module allows users
to save yes/no answers documenting their implementation of those Sub-Controls at the
organizational level. For Sub-Controls that are conducive to automation, specific settings in the
environment are checked to generate a machine-specific pass or fail for that Sub-Control.
Although it is the goal of CIS for a Windows 10 system configured with this Windows 10
Implementation Guide to pass a Controls Assessment Module assessment, there are subtle
differences for a subset of CIS Sub-Controls. The Controls Assessment Module currently checks
for the set of CIS Sub-Controls listed below with the differences between Sub-Control
assessment methodologies between this Windows 10 Implementation Guide and the Controls
Assessment Module.
Table 1 - Comparison Control IDs Against Control Assessment Module and Windows 10 Guide
Ctrl
Controls Assessment Module Windows 10 Guide
ID
Passes if automatic updates are set to
‘Auto Download and schedule the Shows how to enforce Windows 10 updates
3.4
install’
6
Ctrl
Controls Assessment Module Windows 10 Guide
ID
Passes if any Antivirus is enabled and
Shows how to configure Windows Defender
8.2 up-to-date
Passes if AutoPlay and AutoRun are Shows how to configure AutoPlay and
8.5 disabled AutoRun
7
CIS Sub-Controls Identified as Implementation Group 1
CIS Control 1.4: Maintain Detailed Asset Inventory
Maintain an accurate and up-to-date inventory of all technology assets with the potential to store
or process information. This inventory shall include all assets, whether connected to the
organization’s network or not.
Category
Procedural, Technical
Purpose
An accurate and up-to-date inventory of computer systems within a network is often the first step
in securing an enterprise. This list of information systems is known as a hardware asset
inventory. Having a definitive list of what hardware is supposed to be part of a network enables
comparison against the list of systems that are in place. This allows for the identification of
unauthorized devices that should not be connected. A hardware asset inventory also helps define
what an organization needs to protect.
An asset inventory often extends beyond solely what is connected to the network. Many
organizations utilize older smartphones, laptops, networking gear, and other technology that may
not be connected, or even powered on; yet might still contain sensitive information if the data is
exfiltrated outside of the network. In addition to physical systems, many enterprises use third-
party services for website hosting or email that are hosted in the cloud. Accordingly, any third-
party services and cloud platforms should be included in the asset inventory. Examples of what to
track include:
Although asset management does not specifically mitigate any threats, it is the foundation for a
large majority of cybersecurity activities. Cybersecurity expert Daniel Meissler points out that, “If
You’re Not Doing Continuous Asset Management You’re Not Doing Security”, and argues that it
is one of the most important aspects of cybersecurity. Meissler states that lacking this asset
inventory is one of the main reasons that companies get breached. If you don’t know what you
are supposed to be defending, you can’t properly defend it.
Automation
This Sub-Control is automatable but not every enterprise will have the resources to do so. In this
case, many organizations will perform manual asset tracking by hand. Manual asset tracking
often uses a spreadsheet with predefined columns and rows to help companies track the right
data. It is often cumbersome, prone to error, and takes a good deal of time to get right. However,
even an inventory with some holes in it is better than no asset inventory at all. Automated asset
inventory can include using a web application or program installed on an in-house computer to
store and track information within a database. It can also include a scanning tool that will
8
automatically query devices with a variety of methods. There is a hybrid solution, where
organizations use free or open source tools like those mentioned below and copy the results from
those scans into a spreadsheet or other database.
9
CIS Control 1.6: Address Unauthorized Assets
Ensure that unauthorized assets are either removed from the network, quarantined, or the
inventory is updated in a timely manner.
Category
Procedural
Purpose
This Sub-Control is meant to ensure that a list of authorized assets can be compared against the
list of devices that are actually connected to an enterprise network. Any difference between the
devices on this list and what exists on the network should be investigated and will likely include
phones, tablets, and laptops. It is possible that a device under investigation is actually authorized
to be in place. In this case, it can be removed from the investigation list. If a device is not meant
to be on the network, it should be removed from the network and thoroughly investigated.
Unauthorized devices may be accessing enterprise network traffic, including proprietary or
sensitive information. They also are in a position on the network from which to launch attacks and
hack into organizational systems.
Automation
This Sub-Control is automatable but will require someone with a higher than average level of
network know-how in order to install, configure, and regularly use the right software packages.
10
CIS Control 2.1: Maintain Inventory of Authorized Software
Maintain an up-to-date list of all authorized software that is required in the enterprise for any
business purpose on any business system.
Category
Procedural
Purpose
An accurate and up-to-date inventory of all company software is nearly as
important as tracking the hardware inventory, as detailed in Sub-Control Shadow IT
1.4. By tracking the software being used on organizational assets, it is
possible to ensure that only authorized software is installed. This is known When unauthorized IT software
is used for enterprise business,
as creating an authorized software inventory. Unauthorized software may
this is known as shadow IT.
include older versions of previously authorized software applications, or These IT systems, applications,
software installed by an employee, unbeknownst to the enterprise and cloud platforms are in use
(sometimes referred to as shadow IT). Unauthorized software also includes without the knowledge and
any malware or malicious code installed by an attacker that gained access approval of management and
to an enterprise system or network. Understanding the software installed on are not tracked or secured.
a system helps organizations to define their software attack surface and
allows for a plan to be devised to remove that software.
Software should be tracked for all enterprise systems and devices, even if they do not have
network access. An old, unpatched application running on a non-networked system may be
connected to the enterprise network at some point in the future. Old phones, laptops, networking
appliances, and other technology that are rarely powered on may still contain sensitive
information. In addition to physical systems, some companies may rely upon cloud infrastructure
for email and data storage. Virtualized systems are another asset type that can contain sensitive
enterprise data. Software associated with cloud-based and virtualized systems should both be
included in a software asset inventory. Therefore, examples of software on different types of
systems that should be tracked to comply with this Sub-Control include:
Although asset management does not specifically mitigate any threats, it is the foundation for a
large majority of cybersecurity activities. Organizations interested in a stretch goal to help
address future threats can consider implementing CIS Sub-Control 2.4, which suggests the
following information to be tracked:
● name,
● version,
● publisher,
● install date, and,
● operating system.
11
Automation
This Sub-Control is automatable but not all organizations will have the resources to do so. Many
small- to medium-sized organizations will need to manually curate their software inventory.
Manually tracking software information is generally done with a spreadsheet with predefined
columns and rows to facilitate proper data collection. It is often cumbersome, prone to error, and
takes a good deal of time to get right. Yet, even an incomplete inventory is better than no asset
inventory at all. Automated software inventory management can include using a web application
or program installed on an in-house computer to store and track information within a database. It
can also include a scanning tool that will automatically query devices with a variety of methods.
12
CIS Control 2.2: Ensure Software Is Supported by Vendor
Ensure that only software applications or operating systems currently supported and receiving
vendor updates are added to the organization’s authorized software inventory. Unsupported
software should be tagged as unsupported in the inventory system.
Category
Procedural
Purpose
The phrase vendor supported software means that a program or application being used for
enterprise business is a product currently offered and available for purchase from the developer.
Furthermore, a supported application is still generally under development, which means that
software and security updates are regularly made available and distributed to customers. If an
organization is using unsupported software, any computer system running that software will most
likely be vulnerable to attack.
Software that is out of date often contains vulnerabilities and other software bugs that can be
used by an attacker to gain a foothold within an enterprise network. The longer software goes
without receiving an update, the more likely it is to have significant security problems. Therefore,
triaging the number of bugs and their severity is key. Allowing unpatched and old software within
an enterprise is one of the most dangerous practices possible from a security perspective.
Automation
This Sub-Control is not automatable. No automated method exists for a computer system to
identify if software purchased from a vendor is currently supported.
● Length of pledged support – Support may be provided for 5 years, whereas others may
only be supported for 6 months. This is one of the most critical factors.
● Cost of support – Many products will receive updates for free, yet others may charge for
updates.
● Who will provide support – The original developer or some other developer may support
the application.
● Support history – Pledges of support are often made, but sometimes not kept.
13
CIS Control 2.6: Address Unapproved Software
Ensure that unauthorized software is either removed or the inventory is updated in a timely
manner.
Category
Procedural
Purpose
This Sub-Control is the natural progression from Sub Control 2.1. Once a software asset
inventory has been created, each computer, phone, and/or tablet should be checked to ensure
that the software installed on that system is authorized to be there. When unapproved software is
identified, it should be uninstalled or otherwise removed. A regular cadence should be
established to survey relevant systems for unauthorized software.
Unapproved software has not been reviewed by anyone within an organization that has decision
authority for IT. Additionally, it has not been reviewed by a security professional to understand if
the software meets an organization’s minimum baselines for security. Unapproved software is
commonly out of date and can contain known vulnerabilities that can be exploited. Unapproved
software may also be malware, all of which should be avoided.
Automation
This is an automatable Sub-Control and multiple types of tools can used to alleviate this problem.
Examples include typical IT asset management tools, that can help to track both hardware and
software, alongside versions of software in use. Refer to Sub-Controls 1.4 and 2.1 for additional
information regarding this category of software tools. Another category of software that can help
is antivirus, which helps to identify malicious software installation and identify when it is on a
system. Finally, whitelisting software will let an enterprise specify a list of applications that are
allowed to run on enterprise systems.
14
CIS Control 3.4: Deploy Automated Operating System Patch Management
Tools
Deploy automated software update tools in order to ensure that the operating systems are
running the most recent security updates provided by the software vendor.
Category
Technical
Purpose
Security patches are updates to a computer’s operating system (OS) or installed software
applications and are a basic part of IT maintenance. The patches the OS developers provide
often contain new features, but also contain fixes to recently discovered security vulnerabilities.
Over time, operating systems go “stale” and need to be updated. Without a constant stream of
security patches, computer systems can be infected by malware that can read sensitive company
data, or simply destroy it. Accordingly, patching systems is one of the primary ways an enterprise
can protect itself from attackers.
CIS Benchmarks: CIS offers PDFs with configuration guidelines for 140+ technologies
(https://www.cisecurity.org/cis-benchmarks).
15
CIS Control 3.5: Deploy Automated Software Patch Management Tools
Deploy automated software update tools in order to ensure that third-party software on all
systems is running the most recent security updates provided by the software vendor.
Category
Technical
Purpose
Security patches are updates to a computer system’s operating system or installed software and
applying them is a basic part of IT maintenance. Just like patching the OS, patching these
software applications is a basic part of cybersecurity. The patches from application developers
may contain new features, but also contain fixes to recently discovered security vulnerabilities.
Without a constant stream of security patches, old and insecure applications can have
vulnerabilities exploited, and infected by malware that can read sensitive enterprise data, or
simply destroy it.
Automation
Some operating systems can help to remind users to update certain applications, especially those
obtained within the application marketplace that is part of the operating system. With today’s
platforms, app stores are not just on mobile devices. Microsoft Windows 10 has an app store
called Windows Apps and Apple’s store is called the Mac App Store. Both stores can be
configured to automatically install software updates from the application developer that were
initially installed via an app store.
Software obtained outside of an app store must be updated in an entirely different manner. Third-
party software distributed outside the app store requires dedicated management software to
patch it. In the end, keeping the total number of programs installed on a computer to the smallest
number possible, helps with both management and security by reducing attack surface.
● Itarian: This package offers a free patch management solution for Windows
(https://us.itarian.com/patch-management/free-windows-patch-management-
software.php).
● Opsi: Opsi is a more complicated solution that can help to manage both Windows and
Linux platforms (https://www.opsi.org).
● PDQ: The free tier can assist in keeping systems up to date (https://www.pdq.com).
● Microsoft Store: If applications are installed via the Microsoft Application Store, they can
be set to be automatically updated (https://support.microsoft.com/en-
us/help/15081/windows-turn-on-automatic-app-updates).
Category
Procedural
Purpose
Default passwords are the passwords that ship with computers, applications, routers, and other
equipment. Default passwords are a very common way for computer systems, devices, and
applications to be hacked. Lists of default passwords for operating systems, applications, and
devices are readily available on the Internet for anyone to download and try. Therefore, enterprise
passwords need to be changed from the defaults to something that is not easily guessable or
easily available from a search engine.
If a password for a wireless router is guessed, an attacker will be able to add and remove network
devices, which will allow them to read sensitive enterprise information. To guess a router’s default
password, it is often sufficient to identify the manufacturer and model of the device. Attackers
may be able to find this information by viewing the device in person, or remotely based on a
router’s wireless network name (i.e., service set identifier (SSID)), MAC address, and network
scans. Lists are easily available online with the default passwords for wireless routers commonly
used in small and home offices. If a password for an application, device, or other system is
guessed, an attacker may be able to read the enterprise information stored there or take control
of the entire device.
Automation
Changing default passwords within software and network equipment is generally not
automatable. Each software application or piece of network equipment must be individually
investigated and changed.
One of the main issues with changing default passwords is the need to remember all the
passwords. Writing passwords down on paper is considered an insecure practice. A better option
is to use a password manager. Free examples include:
CIS Benchmarks: The benchmark for an OS or application may contain passwords that should be
changed, but not all products will have CIS Benchmarks, or have default passwords
(https://www.cisecurity.org/cis-benchmarks).
17
CIS Control 4.3: Ensure the Use of Dedicated Administrative Accounts
Ensure that all users with administrative account access use a dedicated or secondary account
for elevated activities. This account should only be used for administrative activities and not
Internet browsing, email, or similar uses.
Category
Procedural
Purpose
Accounts on a computer system can have different types and sets of privileges. The accounts
with the highest access privileges are called administrative accounts. Other terms for
administrative account include admin account or superuser accounts. These accounts grant
access to all a computer system’s data and functionality. It follows that protecting these accounts
is of the utmost importance. If administrative accounts are abused or taken advantage of, they
can be used to compromise an entire system and potentially the other computers connected to
them via a network. For example, if an administrative account is used to browse the web, and
accidentally downloads malware, the malware will be able to run on a computer with the highest
levels of access.
Yet, administrative accounts are needed for certain important tasks, such as installing new
programs, updating the operating system, or adding new users. This Sub-Control states that
administrative tasks need to be performed with a separate account solely dedicated to
administrative tasks. Normal user accounts should be used for everyday business tasks, like
using accounting software or performing market research via the web. If a vulnerability is
exploited within a normal user account, the impact will be substantially less than if the same
vulnerability is exploited under an admin account.
If someone can obtain administrative access on a computer system, they essentially have the
keys to the kingdom. They will be able to steal passwords stored on the computer, which may be
used in other computer systems or applications within a network. They will also be able to install
a rootkit which is a type of malware that is sometimes undetectable, even by antivirus software.
These types of information could compromise enterprise systems for months or even years.
Automation
This Sub-Control generally cannot be automated. Users must manually check to identify if their
account is an administrator account and if it’s not, establish separate administrative accounts.
18
Guidance and Tools
There is no standard that can be pointed to for how to keep everyday user accounts and
administrative accounts separate. With that said, the following guidance can be useful:
19
CIS Control 5.1: Establish Secure Configurations
Maintain documented security configuration standards for all authorized operating systems and
software.
Category
Technical
Purpose
Establishing secure configurations means that each computer system within an enterprise must
have the appropriate security settings applied. Many computers do not come with all the security
settings appropriately configured “out of the box” as these settings tend to decrease the
functionality and options afforded to users. Further complicating the situation, as operating
systems and applications receive updates configuration settings can change. New configuration
settings may be created, and others may be removed. This creates a constant problem that
needs to be regularly monitored and addressed.
As delivered by manufacturers and resellers, the default configurations for operating systems and
applications are normally geared towards ease-of-deployment and ease-of-use, not security.
Open services and ports, default accounts or passwords, older (vulnerable) protocols,
preinstallation of unneeded software; all can be exploitable in their default state. All these
improper configuration settings can be taken advantage of by attackers. Properly configuring
enterprise computer systems can help to defend against major types of malware and even
network-based attacks.
Automation
This Sub-Control is completely automatable if an enterprise decides to acquire the appropriate
software. Moving past this Sub-Control, some software tools can help organizations to maintain
secure configurations over time, which can be quite difficult. Although initial configurations may
be done by hand, monitoring for changes and out of date settings is best performed by software.
CIS Benchmarks: CIS offers free PDFs with configuration guidelines for 140+ technologies
(https://www.cisecurity.org/cis-benchmarks).
20
CIS Control 6.2: Activate Audit Logging
Ensure that local logging has been enabled on all systems and networking devices.
Category
Technical
Purpose
On the surface, logging may appear to be a low priority activity, but it is a critical cybersecurity
control to have in place within an enterprise. Once a security breach occurs, reviewing logs is
often the primary way that computer incident responders identify who did what, and when they did
it. Furthermore, if logging is enabled on network devices (e.g., routers), historical activities can be
tracked for the entire enterprise network. Logs can also be helpful to an enterprise when
performing general maintenance activities to understand the current status of computer systems
and networks and be notified to take action if there is a problem.
Logging is not a prevention mechanism, meaning that logs do not stop attacks directly. Instead,
logs help to provide tamper detection, which means if an unauthorized modification occurs within
an enterprise computer system (or its data), it is possible to know that something was changed.
Automation
There are various methods of how to automate logging. Enabling logging on systems can be
done manually on a system-by-system basis. Yet, logging is often considered a system
configuration option and can be automated with software dedicated to assessing and
implementing secure configurations. Moving past just enabling logs, systems known as SIEMs
(security information and event management) can be utilized that ingest log data from all systems
in an enterprise and perform data analysis to find breaches or network-wide issues or failures.
SEIMs typically require a more advanced IT infrastructure and dedicated IT personnel to manage.
CIS Benchmarks: The CIS Benchmarks offer a list of what logging settings should be enabled for
various platforms and applications (https://www.cisecurity.org/cis-benchmarks).
21
CIS Control 7.1: Ensure Use of Only Fully Supported Browsers and Email
Clients
Ensure that only fully supported web browsers and email clients are allowed to execute in the
organization; ideally only using the latest version of the browsers and email clients provided by
the vendor.
Category
Procedural
Purpose
Web browsers and email clients are some of the most common applications that employees use
to access the Internet. This means that browsers and email clients are on the front line of an
organization’s IT infrastructure and are regularly exposed to a variety of digital threats. In fact,
they are arguably the most exposed applications within an enterprise. Because of this, browsers
and email systems should be kept up to date since the most recent version of a software
application includes the most recent security patches.
Attacks on email clients and browsers can lead to a variety of cybersecurity problems. One
potential problem source is the installation of browser extensions, which are small applications
that can extend a browser’s functionality. These can be helpful and provide security benefits
(such as managing passwords). Unfortunately, if an attacker is able to install a malicious browser
extension, they can often severely compromise the security of a browser by viewing all web
activity and potentially reading information that would normally be inaccessible.
Automation
Some browsers update automatically by default, like Chrome; whereas others will require an
additional configuration. Email clients can be similarly setup to receive automated updates.
Security tools can be utilized to understand when browsers, email clients, and other programs are
out of date.
CIS Benchmarks: CIS offers free PDFs with configuration guidelines for common browsers
(https://www.cisecurity.org/cis-benchmarks).
22
CIS Control 7.7: Use of DNS Filtering Services
Use Domain Name System (DNS) filtering services to help block access to known malicious
domains.
Category
Technical
Purpose
While the DNS can be difficult to grasp, the important details are relatively simple. DNS can be
thought of as a phonebook for websites that translates a human understandable domain such as
(www.cisecurity.org) to a series of numbers that a computer can understand (i.e., Internet
Protocol (IP) address). Therefore, when a computer wants to connect to cisecurity.org, it uses
DNS to look up where it can find example.com, much like how a phone book would be used to
search a person’s name to get their phone number. And all of this happens transparently in the
background when requesting a webpage, so that individuals to solely need to remember the
domain name instead of complex IP addresses.
This Sub-Control helps prevent enterprise infrastructure from connecting to known malicious
servers that control, host, or distribute malware, or collect sensitive information. Many attackers
will host a malicious domain like “evil.com” to enable malicious activities, such as tricking users
into giving sensitive credentials (i.e., phishing) or control already infected systems. By using a
DNS filtering service, an enterprise can ensure their systems are pointing to a filtered phonebook
(DNS responses) that would not provide bad phone number to any known bad domains; thereby
protecting an enterprise from being infected or communicating with malicious systems.
Automation
There are many ways that this Sub-Control can be implemented in an environment and it will
mostly depend on how the enterprise is currently configured. This Sub-Control is completely
automatable with the correct hardware and software being used in a network. Unfortunately, the
implementation of this Sub-Control will likely require someone with specialized knowledge of
networking and DNS, alongside an external trusted source for DNS information.
23
CIS Control 8.2: Ensure Anti-Malware Software and Signatures Are
Updated
Ensure that the organization’s anti-malware software updates its scanning engine and signature
database on a regular basis.
Category
Technical
Purpose
Anti-malware, also known as anti-virus, is a well-known security technology. Anti-malware suites
work by constantly monitoring all of the running applications on a system and alerting an
enterprise administrator if a malicious program or other suspicious activity is detected. A list of
suspicious applications and actions that the security technology looks for is created and kept up
to date by the anti-virus company. That company regularly delivers updates to the suspicious
applications and actions list on a regular basis, and these updates are called signatures. If
signatures are not downloaded and installed on a regular basis, machines may be vulnerable to
the most recent attacks. Because it is easy to forget, antivirus updates should be set to
automatically download and install on each and every computer or server in an enterprise.
Malware is software specifically designed to attack computer systems, devices, and data.
Malware is the catch-all term for spyware, adware, and all the other types of malicious software,
and it is quick to change and hard to track. Malware can enter an enterprise through any number
of points such as email attachments, malicious apps, web pages, and USB drives. Modern
malware can be quite benign and just slow a computer system down, or be much more pernicious
and pilfer passwords, steal proprietary company secrets, or delete all enterprise data.
Automation
This is an easy Sub-Control to automate and is worth the time spent to properly configure.
● Windows Defender Security Center: This application is a portal into a Windows system’s
overall security status, including the downloading of software updates
(https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-
security-center/windows-defender-security-center).
24
CIS Control 8.4: Configure Anti-Malware Scanning of Removable Media
Category
Technical
Purpose
Removable media includes USB drives, memory cards, and external hard drives - just to name a
few examples. These devices are commonly used to store photos, videos, and many types of
enterprise data. Removable media is also one method used by attackers to install malicious
software on computer systems. This attack method can be used to infect traditional enterprise
workstations, but also computer systems viewed as secure since they lack a WiFi or Internet
connection. Entirely banning the use of removable media is often impractical for businesses. In
order to combat this threat, enterprise systems should be configured to scan removable devices
for malware before they can be read by users.
Malware is software specifically designed to attack computer systems, devices, and data.
Malware can enter an enterprise through any number of points such as email attachments,
malicious apps, web pages, and USB drives. This Sub-Control was specifically included due to
the emerging technique of dropping USB drives embedded with malware in parking lots or other
areas where employees are likely to pick them up and plug them into enterprise systems. One
academic study dropped 300 USB sticks around a school which resulted in ~50% of them being
inserted into computers. Many were inserted into a computer within 6 minutes.
Automation
This Sub-Control is somewhat automatable and is worth the expense to properly configure it.
Windows Defender may not be able to scan removable media every time a new one is inserted,
as scans will need to be configured and performed manually on every usage.
25
CIS Control 8.5: Configure Devices to Not Auto-Run Content
Configure devices to not auto-run content from removable media
Category
Technical
Purpose
Removable media includes USB drives, memory cards, and external hard drives - just to name a
few examples. These devices are commonly used to store photos, videos, and many types of
enterprise data. Removable media is also one method used by attackers to install malicious
software on computer systems. This attack method can be used to infect traditional enterprise
workstations, but also computer systems viewed as secure since they lack a WiFi or Internet
connection. Entirely banning the use of removable media is often impractical for businesses. If
software on a USB device is allowed to automatically run, it may be able to install malware with
limited to no user interaction.
Malware is software specifically designed to attack computer systems, devices, and data.
Malware can enter an enterprise through any number of points such as email attachments,
malicious apps, web pages, and USB drives. This Sub-Control was specifically included due to
the emerging technique of dropping USB drives embedded with malware in parking lots or other
areas where employees are likely to pick them up and plug them into enterprise systems. One
academic study dropped 300 USB sticks around a school which resulted in ~50% of them being
inserted into computers. Many were inserted into a computer within 6 minutes.
https://elie.net/blog/security/concerns-about-usb-security-are-real-48-percent-of-people-do-plug-
in-usb-drives-found-in-parking-lots/
Automation
This Sub-Control is automatable natively in Windows 10 Pro. There is a setting within Windows
10 Pro that provides control on how content is run from removable devices. If a computer is
joined to a domain, these policies can be deployed across all the computers in a network.
26
CIS Control 9.4: Apply Host-Based Firewalls or Port-Filtering
Apply host-based firewalls or port-filtering tools on end systems, with a default-deny rule that
drops all traffic except those services and ports that are explicitly allowed.
Category
Technical
Purpose
Computers are already setup with a default set of networking features right out of the box. This is
typically a permissive set of configurations that allows computer systems to connect to whatever
resources average users need. Host-based firewalls help to manage these network
configurations, block external unsolicited attempts to connect to a computer system, lessen the
impact of malware, and log network traffic for future analysis. Indeed, it is easier to download
malware onto an enterprise computer if there is no firewall in place. Malware installed on an
enterprise system can pilfer or destroy sensitive enterprise data, perform a Denial of Service
(DoS) on various systems, or look to infect other aspects of the network. By properly configuring
the built-in firewall an enterprise can help to reduce the ways that a system can be attacked.
Additionally, it can help to stop downloaded malware from communicating home and work to
prevent its installation in the first place.
Automation
This Sub-Control is completely automatable within Windows 10 Pro.
● Windows Defender Firewall with Advanced Security: This built-in host-based firewall
helps any Windows 10 Pro user meet this Sub-Control
(https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-
firewall/windows-firewall-with-advanced-security).
● Check Point Zone Alarm: This is a popular free firewall that can be installed on enterprise
computer systems (https://www.zonealarm.com/software/free-firewall).
CIS Benchmarks: CIS offers free configuration guidelines for common operating systems and
their firewalls (https://www.cisecurity.org/cis-benchmarks).
27
CIS Control 10.1: Ensure Regular Automated Backups
Ensure that all system data is automatically backed up on a regular basis.
Category
Technical
Purpose
A backup is a duplicate of a computer system’s data. If an attacker breaches a network or
computer system, their first step will often be to change system configurations to ensure they
have continued access in the future. In the process of doing so, attackers will sometimes make
subtle alterations to data that can jeopardize an organization’s effectiveness at a later date.
Backups also help to protect against many types of malware, including newer variants such as
ransomware and destructive malware, which may encrypt or simply delete an organization’s data.
Backups also help to harden an organization against natural disasters like fire and floods.
Additionally, over time, systems will fail and a plan needs to be in place to make sure that a
business can recover from whatever incident occurs. Automated backups taken on a regular
basis are a key component of an enterprise disaster recovery plan.
Automation
This Sub-Control is entirely automatable with very little effort on a Windows 10 system.
Configuring this Sub-Control enterprise-wide across all systems can take a fair amount of IT
knowledge to initially install. Backups are often setup by configuring an application to backup
information to an external computer dedicated to backups, or to an external hard drive.
● Microsoft Backup and Restore: A backup utility tool installed on Microsoft operating
systems (https://support.microsoft.com/en-us/help/17127/windows-back-up-restore).
● Amanda Network Backup: Free, open source backup tool (http://www.amanda.org).
● Bacula: Open source network backup and recovery solution (http://blog.bacula.org).
28
CIS Control 10.2: Perform Complete System Backups
Ensure that all the organization’s key systems are backed up as a complete system, through
processes such as imaging, to enable the quick recovery of an entire system.
Category
Technical
Purpose
A backup is a duplicate of a computer system’s data, but different types and degrees of backups
exist. A backup is commonly viewed as a small collection of a system’s overall data. Often only a
few important folders are backed up, such as containing photos, receipts, contracts, or tax
information. This information may be stored on another computer system, external hard drive,
removable media, or cloud service. This strategy is insufficient for protecting an organization.
Flavors of backups include incremental, differential, or complete. A complete system image is a
snapshot of all data and settings on a system.
Automation
This Sub-Control is entirely automatable, although it requires a medium to advanced level of IT
knowledge to initially setup and configure. It is often implemented by configuring a specific
application to backup information to an external storage location with sufficient free space.
29
CIS Control 10.4: Protect Backups
Ensure that backups are properly protected via physical security or encryption when they are
stored, as well as when they are moved across the network. This includes remote backups and
cloud services.
Category
Technical, Procedural
Purpose
Backups can help an enterprise recover from a variety of disaster situations, whether the cause is
malicious actors or accidents. Yet, backups can be physically and digitally targeted by attackers
looking to hurt an enterprise. Backups that are connected to a network can be altered or deleted
by malware, and physical backup drives can be stolen or suffer fires, floods, and other natural
disasters. Backups need to be protected from these threats in order to be useful when the time
comes. Digital mitigations include authenticating users before access and encrypting backups.
Physical mitigations include keeping backup drives locked away from thieves, and outside of the
same fire zone. This means that if a fire or flood were to strike an organization’s physical location,
the backups would not be affected. This is sometimes accomplished by using third-party backup
services to store data offsite. These backups need to be protected as well.
There are two primary groups of threats to backups: digital and physical. Digital threats include
local and remote attempts to access backups without being properly authenticated. Additional
issues include altering or deleting backups. Physical threats include theft of physical backups or
natural disasters (e.g., fires, floods).
Automation
This Sub-Control can be somewhat automated. Third-party services can use a virtual private
network (VPN) when backing up enterprise information to an offsite server. Microsoft’s BitLocker
can encrypt any backups stored on a system. Physical protection of backups cannot be
automated.
● Veracrypt: This tool is an open source free utility that provides full disk encryption and
can also encrypt removable drives, such as those used for backup
(https://www.veracrypt.fr/en/How%20to%20Back%20Up%20Securely.html).
● EaseUS®: This free program can encrypt system images
(https://www.easeus.com/backup-software/tb-free.html).
30
CIS Control 10.5: Ensure All Backups Have at Least One Offline Backup
Destination
Ensure that all backups have at least one offline (i.e., not accessible via a network connection)
backup destination.
Category
Procedural, Technical
Purpose
Over the past few years a new type of malware has become popular that prevents enterprises
from accessing their own data. This malware requires affected organizations to pay money in
order to regain access to their data, whereas a related form of this malware may instead block
access and never provide it ever again. Malware that requires money to obtain access once
again is called ransomware. Ransomware uses cryptography to block access to a system’s data
via encryption. If the data is never provided back, it is considered destructive malware.
Besides user education and antivirus software, one of the best defenses against ransomware is
backing up data to another system before there is a problem. But backups alone would not
completely prevent this malware from accomplishing its goals. Typical backups may be
connected to another system or network, meaning backup data can still be attacked. Therefore,
regular backups should be stored in an unconnected, off-the-network, manner.
Keeping offline backups helps organizations recover and restore systems when ransomware or
destructive malware hits a system. A common way for this malware to get into a network is to be
installed via email attachments or downloads for websites. Both of these types of malware have
impacted law enforcement, hospitals, governments, and academic institutions and cost millions of
dollars to recover.
Automation
This is a very difficult Sub-Control to automate. Keeping offline backups means that once a
backup is created, it needs to be manually removed from the network and stored elsewhere.
31
CIS Control 11.4: Install the Latest Stable Version of Any Security-Related
Updates on All Network Devices
Install the latest stable version of any security- related updates on all network devices.
Category
Technical
Purpose
Network devices include wireless routers, sometimes called wireless access points, and the
networking appliance provided from an Internet service provider (ISP). An ISP is a
telecommunications company that provides access to the Internet for companies and individuals.
ISP provided appliances are confusingly referred to by multiple interchangeable terms such as
modem or cable box. Some ISPs can provide a single network device that acts as modem,
wireless access point, and firewall all in one. Regardless, all networking equipment needs to be
regularly updated – even devices from the ISP. To update the software or firmware on any of
these network appliances, it will often be necessary to access the device via an administrator
account. This is commonly done via a web browser. The correct settings to update the system will
be provided by the relevant ISP and/or network device manufacturer.
Older software on wireless access points and cable boxes or modems can lead to a malicious
actor accessing sensitive enterprise information via the device. This can occur via vulnerabilities
in protocols supported by the router or how users are authenticated to the router. If an attacker
gains access to the device, they may be able to change network passwords, grant any computer
access to the network, or potentially modify data in transit.
Automation
The degree of automatability available for this Sub-Control depends on the network appliances
that are in use within an organization. Some network appliances can be set to auto-update all
software and firmware. Others will not have this capability and will need to be manually updated
on a regular basis.
32
CIS Control 12.1: Maintain an Inventory of Network Boundaries
Maintain an up-to-date inventory of all the organization’s network boundaries.
Category
Technical
Purpose
Network boundaries define how data flows and traverses an enterprise network. Wired and
wireless boundaries will exist, alongside logical boundaries. Logical boundaries sometimes
include subnetworks (e.g., subnets), or virtual local area networks (vLANs). Generally,
information cannot flow from one subnet to another without a networking device such as a firewall
or router acting as a gatekeeper. This establishes trust boundaries between network segments.
Therefore, a survey should be conducted to understand current trust boundaries in an enterprise
network.
Specifically noting which networks are within a trust boundary, and then regularly checking them
helps to prevent from accidentally trusting an untrustworthy device or network component. For
instance, public users such as customers should not be granted access to the intranet, which
often contains sensitive enterprise information.
Automation
This Sub-Control is generally not automatable. System owners and administrators will need to
manually annotate and define network boundaries. This task needs to be performed on a fairly
regular basis.
● ZenMap: This tool builds on top of Nmap, and puts a graphic user interface on top of it to
make the tool easier to use for those who do not feel comfortable using the command line
(https://nmap.org/zenmap).
33
CIS Control 12.4: Deny Communication Over Unauthorized Ports
Deny communication over unauthorized TCP or UDP ports or application traffic to ensure that
only authorized protocols are allowed to cross the network boundary into, or out of, the network at
each of the organization’s network boundaries.
Category
Technical
Purpose
The overarching CIS Control 12 details precautions that should be taken for boundary defense,
which is the notion of establishing and protecting a perimeter around an organization’s externally
facing networking equipment. Sub-Control 12.4 manages how communication is controlled on
networking devices, such as firewalls. In order to accomplish this, the firewall configuration and
ruleset in use should be carefully reviewed, monitored, and curated. If an enterprise-grade firewall
is not in use, many of the dual-use modems/wireless access points from the ISP will often have a
firewall built into the system which can be enabled.
A large majority of attacks launched against an organization will attempt to enter networks
through a firewall. Firewalls often act the default entry point into a network and can deny
communication over certain ports. Because of this they are under nearly constant attack and
must be configured properly to protect the organization's assets sitting behind them. A firewall is
typically envisioned to protect against basic attacks using a variety of protocols such as Hypertext
Transfer Protocol (HTTP), File Transfer Protocol (FTP), and Network Time Protocol (NTP).
Automation
Expensive enterprise tools can be purchased that require skilled technical staff to monitor and
verify router configurations. This is generally not automatable for small- to medium-sized
businesses.
Guidance and Tools
It is not possible to list all of the models of networking equipment. The following links are provided
to show how to enable the built-in firewalls on some of the most common modems/wireless
access points from United States Internet Service Providers (ISPs):
CIS Benchmarks: CIS offers in-depth guidance for many types of firewalls and other network
appliances (https://www.cisecurity.org/cis-benchmarks).
34
CIS Control 13.1: Maintain an Inventory of Sensitive Information
Maintain an inventory of all sensitive information stored, processed, or transmitted by the
organization’s technology systems, including those located on-site or at a remote service
provider.
Category
Procedural
Purpose
Sensitive data can be stored on smartphones, point of sale (POS) terminals, and backend
systems. Enterprises should have a listing of their sensitive information, and which computer
systems retain that data. Those that do not carefully identify and separate their most sensitive
and critical assets from less sensitive, publicly accessible information on internal networks can
have a hard time preventing unauthorized access. If sensitive enterprise information is stored on
an unknown or unprotected system, the information is more likely to be accessed in an
unauthorized manner. Any listing of sensitive information in formation should also be properly
labeled. If sensitive enterprise information is not labeled correctly, then it may be accidentally
distributed to unauthorized outside parties.
Automation
This Sub-Control is generally not automatable. It is most often necessary to manually identify and
list sensitive files and other applicable information through usage of lists and labels within files or
documents.
Guidance and Tools
Sensitive information can be tracked in a spreadsheet in a similar manner to hardware and
software assets. CIS offers a free spreadsheet to track sensitive information within the enterprise
contained within the Appendix of this document. The definitions of, and policies surrounding the
usage of labels for data classification should be understood by all employees handling sensitive
information. This in turn means that all sensitive, confidential, or proprietary information should be
clearly labeled for internal use. Ultimately, what constitutes sensitive information is defined by
local laws and the needs of an enterprise. Examples of sensitive information include:
35
CIS Control 13.2: Remove Sensitive Data or Systems Not Regularly
Accessed by Organization
Remove sensitive data or systems not regularly accessed by the organization from the network.
These systems shall only be used as stand-alone systems (disconnected from the network) by
the business unit needing to occasionally use the system or completely virtualized and powered
off until needed.
Category
Technical
Purpose
A breach of sensitive enterprise data and systems can cost time, money, and bring an
organization out of compliance with local laws governing sensitive information. Sensitive data and
computer systems infrequently accessed may not receive the regular maintenance and attention
necessary to properly manage them. Therefore, systems that are infrequently used should be
removed from service across the entire enterprise network. This helps to reduce enterprise attack
surface leaving fewer systems that can be targeted. Older and infrequently used systems may fall
into disrepair. These systems are not likely to receive regular software updates, which means the
operating system and applications will likely contain vulnerabilities that can be exploited to access
the system and any data.
Automation
There is no way to automate the implementation of this Sub-Control. Individuals will be needed to
manually label sensitive data, and identify which systems store that sensitive data. Putting this
Sub-Control into place will often require a hardware asset inventory as detailed in Sub-Control
1.4, alongside a sensitive information inventory as detailed in Sub-Control 13.1.
Guidance and Tools
Systems that are irregularly accessed and maintained should not be network connected while
hosting sensitive enterprise information. If the systems are necessary to ensuring the goals of the
organization, consider attempting to use them in a non-networked fashion or virtualizing the
system.
36
CIS Control 13.6: Encrypt Mobile Device Data
Utilize approved cryptographic mechanisms to protect enterprise data stored on all mobile
devices.
Category
Technical
Purpose
Smartphones and tablets used by employees for work activities contain a treasure trove of
sensitive enterprise data. This includes both personal devices and those provided by the
company. This is true for upper management, rank and file, and all employees in between. It is
commonplace for employees to use a phone to obtain company email. Therefore, an
organization’s sensitive email, with proprietary secrets, financials, and more, is stored on a device
that an employee could easily misplace or have stolen. One of the best ways to help protect
against these failures is to encrypt a company’s information while on the device.
Automation
This Sub-Control is automatable if the correct combination of hardware, software, and policy is
purchased. The correct software to obtain will depend on the way that enterprise devices are
provided to employees such as with Bring Your Own Device (BYOD) scenarios. Enterprise
mobility management (EMM) systems can force all of the smartphones or tablets accessing
company email to encrypt mobile data. This Sub-Control can also be solved in a manual fashion
with the correct configuration options without much effort.
Guidance and Tools
Mobile data is often secured by default on mobile devices, but this is not always the case. For
each phone accessing enterprise email, the appropriate encryption setting must be selected. This
will look different on each type of phone, so it may be difficult to identify step-by-step instructions.
A vast majority of users will have phones from Samsung®, Google®, or Apple®, therefore
identifying and learning how to encrypt data on each of these platforms will often be sufficient. For
additional information on how to secure mobile devices, reference the CIS Mobile Companion
Guide. It was created with many of the industry’s leading experts and provides created detailed
guidance for how to secure mobile devices.
CIS Benchmarks: CIS provides detailed instructions for how to secure Google’s Android® and
Apple’s iOS mobile platforms. Instructions for encrypting the device can be found within these two
documents (https://www.cisecurity.org/benchmark/google_android).
(https://www.cisecurity.org/benchmark/apple_ios).
37
CIS Control 14.6: Protect Information Through Access Control Lists
Protect all information stored on systems with file system, network share, claims, application, or
database specific access control lists. These controls will enforce the principle that only
authorized individuals should have access to the information based on their need to access the
information as a part of their responsibilities.
Category
Technical
Purpose
Different types of employees will need varying levels of access within an enterprise. Users with
more sensitive roles and job responsibilities may need additional access, such as Human
Resources and Finances, whereas users with more simple workplace needs will necessitate
fewer permissions. This means that access to data, systems, and files should be provided
according to business needs. Administrative or super user access should not be provided to all
employees.
Users with large amount of system access can easily make accidental changes that affect
multiple users and systems. Sometimes these changes will not be easily recoverable, like
deleting an entire network drive. Another scenario worth considering is if a user with broad
privileges has their accounts compromised, the attacker would be able to access everything that
user is able to access.
Automation
User access can be accomplished through Windows Active Directory Group Policy. This
functionality can also be controlled through Windows Intune. Not all systems will be domain
joined – for instance firewalls will also need access control decisions made and enforced.
Ultimately access control decisions will need to be made by a human.
Guidance and Tools
Correctly configuring access control on a computer system can be a complex task.
● Qualys Browser Check: A tool to check if a browser is up-to-date with all its patches
(https://browsercheck.qualys.com).
● OpenVAS: A tool to scan systems to check security baselines (www.openvas.org).
CIS Benchmarks: CIS offers free PDFs with configuration guidelines for 140+ technologies, which
can be used to correctly configure users, applications, and other access control lists
(https://www.cisecurity.org/cis-benchmarks).
38
CIS Control 15.7: Leverage the Advanced Encryption Standard (AES) to
Encrypt Wireless Data
Leverage the Advanced Encryption Standard (AES) to encrypt wireless data in transit.
Category
Technical
Purpose
The Advanced Encryption Standard, or AES, is an algorithm used encrypt information
standardized by the United States Government in 2001. It is considered a modern, strong cipher
that has withstood attempts to break it for years. This purpose of this Sub-Control is to make sure
that an organization’s wireless traffic is strongly encrypted. AES is built into most wireless access
points, or wireless routers, that can be bought at major electronics stores. AES is utilized with
Wireless Protected Access version 2, or WPA2. Using Wireless Equivalent Privacy (WEP) or
Wireless Protected Access (WPA) version 1 does not meet this Sub-Control, as AES will not be
the algorithm used to encryption wireless information. Both WEP and WPA also have other
significant flaws and should not be used. It is easier for an attacker to sniff wireless
communications than wired communications, and by properly setting up AES, anyone on the
wireless network will not be able to understand the transmitted network traffic.
Automation
This Sub-Control is entirely automatable for many types of wireless traffic, including WiFi. Simply
selecting the proper configuration settings on a wireless access point will make sure AES is being
used for all devices that connect to the network.
Guidance and Tools
AES should be enabled for all wireless networks within an enterprise. This includes 2.4 Gigahertz
(GHz) and 5 GHz, as these are two completely separate wireless networks that must be properly
configured. It’s not possible to list all of the models of wireless routers, but the following links are
provided to show how to enable encryption on some of the most common wireless access points
from United States ISPs.
39
CIS Control 15.10: Create Separate Wireless Network for Personal and
Untrusted Devices
Create a separate wireless network for personal or untrusted devices. Enterprise access from this
network should be treated as untrusted and filtered and audited accordingly.
Category
Procedural
Purpose
Some computers, tablets and smartphones are more trustworthy than others. If a device is
bought, configured, and safely used by an employee or enterprise, it is likely more trustworthy
than a completely unknown device that an enterprise has never seen before. This level of trust
can be extended past enterprise devices and into a company’s networks. Devices that are trusted
and used only for company tasks should be kept on a completely separate network from personal
devices owned by employees or guests. This will keep devices that are misconfigured, infected
with malware, or insecurely built from being used to infect a network and its systems. These
devices may already harbor malware that could steal sensitive enterprise data or attack other
computers and devices on a network. One infected device can place every device within the
network in danger.
Automation
Making a clearly identified guest network available for personal and guest devices helps
employees and guests know which networks are for enterprise use and which are not. There is
no easy way to automate this Sub-Control. Separate networks will need to be created and
properly configured at each wireless access point. Many popular wireless access points come
with the ability to broadcast a guest network built right in.
Guidance and Tools
The following resources show how to create guest networks on some of the most common
wireless access points from United States ISPs.
40
CIS Control 16.8: Disable Any Unassociated Accounts
Disable any account that cannot be associated with a business process or business owner.
Category
Technical
Purpose
Extraneous accounts can be used to attack the system they are associated with, but also to
compromise other nodes on a network. These accounts can be created on accident, for testing
purposes, or be leftover accounts from contractors or employees no longer employed at an
organization. Attackers often find and exploit legitimate, but inactive user accounts, and use them
to impersonate legitimate users. When this occurs, it makes tracking the activities of attacker
behavior quite difficult for those responding to a breach or performing forensic analysis. This Sub-
Control states the need for disabling unassociated accounts but not deleting them. Deletion is not
recommended as this will not preserve the audit trail and hamper any future computer incident
investigations.
Unassociated accounts are often known as “stale” or “ghost” accounts on a system, and are a
weak link for attackers. Accounts that have not been used by an employee are valuable accounts
for an attacker to overtake. This is due in large part since the original account owners are not
actively using the account, so it is difficult for an enterprise to notice if the account is being used
maliciously.
Automation
This Sub-Control is not entirely automatable. Products and scripts can be written to highlight
suspect accounts, but the ultimate decision on whether accounts should be disabled may need to
be made by a human.
Guidance and Tools
Regardless of the edition of Windows 10 that is in use, all local and remote accounts on
enterprise computer systems should be regularly checked and audited. This also extends to
smartphones, network appliances, and any system that enterprise utilize accounts for user
access.
41
CIS Control 16.9: Disable Dormant Accounts
Automatically disable dormant accounts after a set period of inactivity.
Category
Technical, Procedural
Purpose
System and user accounts establish identity and access on information systems. Operating
system privileges and granular file permissions can be assigned to individual users and groups of
users (i.e., roles). When an organization is using Active Directory and domain controllers, each
employee is generally assigned an account and assigned roles for what they are allowed to do
within an organization’s entire network architecture. Local accounts unique to a system are often
also utilized. When employees leave an organization, or even change organizational units, their
privileges are removed. Yet it is possible to go a step further and automatically disable accounts
after a predetermined period of time. Deleting accounts is not always recommended as this may
disturb user, system, or application logs, or other information that may be needed to audit user
activity in case an incident is discovered in the future.
Dormant accounts are often known as “stale” or “ghost” accounts on a system, and are a weak
link for attackers. Accounts that have not been used by an employee are valuable accounts for an
attacker to overtake. This is due in large part since the original account owners are not actively
using the account, so it is difficult for an enterprise to notice if the account is being used
maliciously.
Automation
Products and scripts can be written to highlight suspect accounts, but the ultimate decision on the
length of time before an account should be disabled will need to be made by a human.
Guidance and Tools
There is no standard for the time interval before inactive accounts should be disabled. The length
of time is sometimes 15 – 30 days, whereas others recommend 90 days. Enterprises requiring a
higher level of security should utilize shorter timeframes.
42
CIS Control 16.11: Lock Workstation Sessions After Inactivity
Automatically lock workstation sessions after a standard period of inactivity.
Category
Technical
Purpose
Using a password to regularly log into a computer can cause trouble for a user, especially if a
computer quickly locks. Yet too often computers are left unattended without being locked.
Unlocked computers allow anyone to access the information and applications open on a system.
A point of sale (POS) system, tax information, and even an employee’s personal information will
be available to anyone who walks up to an unattended enterprise workstation. This Sub-Control
applies to more than just a computer system since smartphones and tablets can also be left
unlocked.
This Sub-Control is important because it protects from very basic, low-effort, and easy to do
attacks. People with very little technical skill can walk up to a computer and access a company’s
information if there is no lock on the system. If someone with technical knowledge accessed a
system without a lock screen, depending on how the computer is setup, they can install malware
and potentially access passwords used by employees. In a worst-case scenario, they can
potentially bring enterprise computer systems and networks down if passwords are reused, or if
the computer they are on is setup to manage other devices.
Automation
This type of policy can be controlled and monitored automatically if you have your systems joined
to a domain. This is a fairly basic configuration setting that can be completely accomplished
automatically.
Guidance and Tools
There is no universally agreed upon time frame for how quickly a computer should lock. Locking
after one or two minutes of inactivity may be too quick, and cause frustration while trying to read
emails, articles, and spreadsheets. Many organizations recommend 5 minutes as a balance
between security and usability. With that said, the following should be kept in mind:
● All computers, phones, and tablets should have their settings changed to lock after a
predetermined time. Although you may not be able to enforce it, at least asking
employees who use their phones to access work emails to put a password or lock on
their personal phones and tablets.
● Employees should be regularly reminded of the dangers of leaving their computer
systems unlocked.
43
CIS Control 17.3: Implement a Security Awareness Program
Create a security awareness program for all workforce members to complete on a regular basis
to ensure they understand and exhibit the necessary behaviors and skills to help ensure the
security of the organization. The organization’s security awareness program should be
communicated in a continuous and engaging manner.
Category
Procedural
Purpose
Employees are the first line of defense in any good security program. In some sense, the phrase
“you are only as strong as your weakest link” is very true in security. Sometimes all it takes is one
employee to unknowingly install a malicious program on their computer to lead to a security
breach. This is why it is important that all employees know practice a basic awareness of how to
keep themselves and the company secure. This starts with a security awareness program.
Many of the top security threats taking advantage of the human factor of security. These include
social engineering type attacks such as phishing, spear phishing, vishing, pretexting, baiting, and
others. Many threats take advantage of human tendency or emotion. They look to trick
employees who are not paying attention to detail or who get caught believing an emotional story.
Automation
There are third-party training platforms available which can reduce the overhead of implementing
a security awareness program. Third-party training platforms are engaging and up-to-date but
may be too costly for small organizations.
● Acceptable use policy: This policy should be in place to lay out the expectations an
organization has around its security. This should explain to the employee that they have
responsibilities for security in their everyday work.
● New employee onboarding training: New employees need to know organizational
expectations for security. This training can be formal training provided by third-parties, or
may be informal training provided by their supervisor.
● Management awareness: Employees need to hear and feel that management takes
security seriously and is counting on them to do their part. This can be accomplished by
dedicating a moment to security in corporate wide meetings or announcements.
● Posters and spotlights: Hanging security awareness posted, like those from SANS
(https://www.sans.org/security-resources/posters), or sending out Security Spotlight
emails on a regular basis are a good way to continually emphasis security to employees.
44
● Annual refresher training: Employees should be asked to go through a security
awareness refresher once a year.
45
CIS Control 17.5: Train Workforce on Secure Authentication
Train workforce members on the importance of enabling and utilizing secure authentication.
Category
Procedural
Purpose
Especially with the move to a cloud-first and mobile-first world, employees now more than ever
need to be trained to properly manage their user accounts. In many cases, their user account is
the only line of defense to prevent an attacker from infiltrating an organization’s enterprise
infrastructure. Employee user account security is important even if an enterprise company has a
local network. Storing passwords on sticky notes, sharing password with co-workers, or using the
same password for all accounts are all examples of poor practices which can be exploited by
attackers leading to significant harm for a company.
Account takeovers are a common approach for attackers to gain a foothold within an organization
and begin taking data or control. With access to a legitimate account, attackers will often attempt
to move horizontally to take over other accounts, launch phishing campaigns which appear
legitimate, and look to obtain sensitive. Additionally, it can be very difficult to detect and track an
attacker who has taken over a legitimate account. Finally, users may share personal passwords
with enterprise accounts. Personal accounts may be a victim of a breach, and the username and
password for the enterprise account is no always changed.
Automation
There are third-party training platforms available which can provide up-to-date information on
secure workforce authentication, but these may be too costly for small organizations. Many
platforms and services provide the ability to setup two factor authentication (2FA).
Here are a few keys points all employees should know about their accounts:
● Use strong, unique passwords: Create passwords which are 14 characters or more.
● Setup 2FA on all possible accounts: This adds an additional and critical step to a
website’s login process. 2FA uses a smartphone or hardware device to identify someone
to a website. Visit twofactorauth.org for instructions on setting up 2FA on popular
websites.
● Do not share passwords: It is not possible to track who performed what action when
multiple users have the same password.
46
● Do not use the same password for all accounts: The best practice is to use unique
passwords for every account. At a minimum, do not use passwords used for personal use
for business use.
● Do not use any personally identifiable information in your passwords: Names, birthdays,
and street addresses may be easy to remember but they are also easily found online and
should always be avoided in passwords to ensure the greatest strength.
● Avoid using similar passwords that change only a single word or character: This practice
weakens account security across multiple sites.
47
CIS Control 17.6: Train Workforce on Identifying Social Engineering
Attacks
Train the workforce on how to identify different forms of social engineering attacks, such as
phishing, phone scams, and impersonation calls.
Category
Procedural
Purpose
Social engineering attacks are one of the more common and successful types of attacks. This is
because they prey upon human tendencies and emotions. Even if not always successful, any
successfully social engineering attack can have a tremendous impact on an organization. While
these types of attacks are often preventable, they are getting more and more sophisticated and
harder to spot. This is why is important for employees to know what to look for and how to spot
suspicious activity in their email, over the phone, and even in person.
Social engineering attacks include phishing, spear phishing, vishing, pretexting, baiting, tailgating,
and quid pro quo. Phishing is the most common type of social engineering attack, and occurs
when an attacker is able to get a victim to perform some action such as disclosing sensitive
information like an enterprise password. Another form of phishing will trick the user to navigating
to a website that downloads malicious software and subsequently installs it on an enterprise
system.
Automation
There are third-party training platforms available which can reduce the overhead of implementing
a security awareness program for identifying social engineering attempts. Third-party training
platforms are engaging and up to date but may be too costly for small organizations.
Guidance and Tools
Social engineering attacks are best defeated by an aware and skeptical employee base.
Employees need to be aware of their tendencies and maintain a healthy skepticism of anyone or
any communication which is not from a trusted, known party. Holding regular social engineering
awareness trainings along with regular corporate communications which show examples of social
engineering attacks are good exercises. Conducting role-playing training for employees to be
exposed to this type of tactic will help employees respond appropriately in real world scenarios.
• Google: This high-quality video can be used to train employees on how to Stay Safe
from Phishing and Scams.
• NIST: This high-quality video can be used to train employees on how to identify
social engineering attack titled You’ve been Phished.
• Much of the guidance provides in 17.5 can be useful for this Sub-Control.
48
CIS Control 17.7: Train Workforce on Sensitive Data Handling
Train workforce members on how to identify and properly store, transfer, archive, and destroy
sensitive information.
Category
Procedural
Purpose
The act of labeling data according to its sensitivity is a type of data classification. It often involves
placing a “PROPRIETARY”, “SENSITIVIE”, OR “CONFIDENTIAL” mark on a document. These
markings allow organizations to more easily make the appropriate security decisions to govern
their own data. This often involves allocating additional resources and developing policies to
protect sensitive company information. For instance, placing trade secrets on a cloud platform
may not be wise if their secrecy is pivotal to the business continuing normal operation. If an
organization does not perform data classification, it is more likely that unintentional data loss may
occur. Therefore, clearly labeling data prevents intentional and unintentional data breaches.
Automation
This Sub-Control is generally not automatable. Third-party organizations offer platforms that can
help to train users in the proper way to handle sensitive information.
49
CIS Control 17.8: Train Workforce on Causes of Unintentional Data
Exposure
Train workforce members to be aware of causes for unintentional data exposures, such as losing
their mobile devices or emailing the wrong person due to autocomplete in email.
Category
Procedural
Purpose
People play a huge role in preventing data breaches, often more critical than any technological
solution. Employees must be regularly exposed to, and reminded of, causes of data exposure
and data breaches. The following is a non-exhaustive list:
Automation
This Sub-Control is generally not automatable. Network appliances can be put into place such as
a firewall, data loss prevention, intrusion detection system, or an endpoint protection suite (e.g.,
antivirus), to prevent data exposure. Third-party organizations offer platforms that can help to
train users to recognize the symptoms of accidental and unintentional ways to affect the security
of an organization.
50
CIS Control 17.9: Train Workforce Members on Identifying and Reporting
Incidents
Train workforce members to be able to identify the most common indicators of an incident and be
able to report such an incident.
Category
Procedural
Purpose
As with most incidents, the earlier a security incident is identified and a response is initiated, the
less severe the incident will likely become. It is also true that earlier detection often leads to more
information being available about the incident. This information may be key to stopping an
ongoing attack and to understanding certain details such as how the attack was conducted and
what impact it caused. One of the key details required in many states laws is information on how
the breach occurred, how many people were impacted, and what was done to remedy the attack.
Reducing the impact and understanding the details of the breach are both much more achievable
with earlier detection and response. Employees are key to this early detection. Employees should
be trained on the types of things to look for and how to report suspicious behavior or events.
Automation
This Sub-Control is generally not automatable. Network appliances can be put into place such as
a firewall, intrusion detection and prevention system, or an endpoint protection suite (e.g.,
antivirus) to stop incidents from occurring in the first place. Third-party organizations offer
platforms that can help to train users to recognize the symptoms of an incident.
● Emails asking for sensitive information that are out of context or from unknown senders.
● Emails from an unknown sender who is asking the person to click a link.
● Phone calls from unknown, unverifiable source asking for sensitive information or to
make changes to their account.
● Unknown people in areas of the office designated for employees only.
● Sensitive data is observed in a non-secure physical or digital location.
● Removable media that is not labeled and not claimed by an employee.
● Evidence of unknown programs running on their computer, such as a Windows User
Account Control (UAC) prompt for an unrecognizable program.
51
CIS Control 19.1: Document Incident Response Procedures
Ensure that there are written incident response plans that define roles of personnel as well as
phases of incident handling/management.
Category
Procedural
Purpose
If an organization continuously operates for a long enough period of time, it is likely that they will
suffer a cyber breach. Even if a breach never occurs, it is best to plan for the possibility, even if
just from a legal liability standpoint. When a data breach occurs, it can feel like multiple extremely
important events are all taking place at the same time. Important processes, procedures, and
security critical tasks can be forgotten during this time frame. That is in part why a series of
written procedure for how to handle a cyber incident before it occurs is needed.
The threats surrounding this Sub-Control mostly revolve around the inappropriate handling of a
cyber incident while it is active. This means accidents from internal employees tasked with
responding to the breach. This is especially true if the breach is the first one an organization has
experienced. Improper data breach handling can lead to the breach getting worse, for instance
malware getting deeper into a network and having additional access to sensitive data.
Automation
There is no way to automate this this Sub-Control. Yet this does not mean that an incident
response plan and associated response procedures must be made from scratch. Incident
response procedures can be procured from other similar organizations that already have them in
place. These procedures can be modified to fit most organizations’ needs.
Guidance and Tools
Many organizations offer useful incident response guidance.
● Open Trust Alliance: This guidance contains checklists of considerations for developing a
response plan and provides templates that can be incorporated
(https://otalliance.org/system/files/files/initiative/documents/2017_cyber_incident_breach_
response_guide.pdf).
● Carnegie Mellon: The university makes their Incident Response Plan available, can be
used as a resource for others
(https://www.cmu.edu/iso/governance/procedures/docs/incidentresponseplan1.0.pdf).
● State of Oregon: The Oregon State Government provides a template for an Incident
Response plan
(https://www.oregon.gov/das/oscio/documents/incidentresponseplantemplate.pdf).
52
CIS Control 19.3: Designate Management Personnel to Support Incident
Handling
Designate management personnel, as well as backups, who will support the incident handling
process by acting in key decision-making roles.
Category
Procedural
Purpose
During an incident, many important decisions will need to be made in a short timeframe. For this
reason, it is necessary for management personnel with the authority to make those decisions to
be involved in the incident handling process. Designated management personnel should have a
clear understanding of their role in the process ahead of time, before incidents occur. Backup
personnel should also be designated in case the corresponding primary personnel are
unavailable when an incident arises.
Automation
There is no way to automate this this Sub-Control. Yet this does not mean that an incident
response plan and associated response procedures must be made from scratch. It is possible to
obtain incident response procedures from other similar organizations that already have them in
place. These procedures likely nominate management and technical roles for certain response
positions, and these can be can be modified to fit an organization’s needs.
Guidance and Tools
Many organizations offer useful incident response guidance.
● Open Trust Alliance: This guidance contains checklists of considerations for developing a
response plan and provides templates that can be incorporated
(https://otalliance.org/system/files/files/initiative/documents/2017_cyber_incident_breach_
response_guide.pdf).
● Carnegie Mellon: The university makes their Incident Response Plan available, can be
used as a resource for others
(https://www.cmu.edu/iso/governance/procedures/docs/incidentresponseplan1.0.pdf).
● State of Oregon: The Oregon State Government provides a template for an Incident
Response plan
(https://www.oregon.gov/das/oscio/documents/incidentresponseplantemplate.pdf).
53
CIS Control 19.5: Maintain Contact Information for Reporting Security
Incidents
Assemble and maintain information on third-party contact information to be used to report a
security incident, such as Law Enforcement, relevant government departments, vendors, and
Information Sharing and Analysis Center (ISAC) partners.
Category
Procedural
Purpose
Incidents often necessitate the involvement or notification of multiple third-party organizations.
Depending on the nature of the incident, it may be necessary to contact law enforcement, other
government agencies, vendors and business partners, or Information Sharing and Analysis
Center (ISAC) partners. It is best to have the contact information for these organizations
consolidated, up-to-date, and easily accessible, as it may be difficult and time-consuming to try to
look up all of this information while an incident is taking place. Keep in mind that some cyber
incidents may result in limited access to networks and files during incident response, so having
this information available in varied locations or formats (including a hardcopy) can also be helpful.
Automation
There is no way to automate this this Sub-Control. Yet this does not mean that an incident
response plan and associated response procedures must be made from scratch. It is possible to
obtain incident response procedures from other similar organizations that already have them in
place. These procedures likely nominate management and technical roles for certain response
positions, and these can be modified to fit an organization’s needs.
Guidance and Tools
Many organizations offer useful incident response guidance.
● Open Trust Alliance: This guidance contains checklists of considerations for developing a
response plan and provides templates that can be incorporated
(https://otalliance.org/system/files/files/initiative/documents/2017_cyber_incident_breach_
response_guide.pdf).
● Carnegie Mellon: The university makes their Incident Response Plan available, can be
used as a resource for others
(https://www.cmu.edu/iso/governance/procedures/docs/incidentresponseplan1.0.pdf).
● State of Oregon: The Oregon State Government provides a template for an Incident
Response plan
(https://www.oregon.gov/das/oscio/documents/incidentresponseplantemplate.pdf).
54
CIS Control 19.6: Publish Information Regarding Reporting Computer
Anomalies and Incidents
Publish information for all workforce members, regarding reporting computer anomalies and
incidents, to the incident handling team. Such information should be included in routine employee
awareness activities.
Category
Procedural
Purpose
The types of computer incidents regularly affecting a company can be useful when devising
training activities. Each incident is an opportunity for learning, and then using those lessons to
improve the process that is already in place. Besides feeding back into computer incident
response activities, this information can also be communicated to contractors and employees of
an organization as part of the regular user education process for cybersecurity. Understanding
the general threats a company faces can help employees to make better decisions the next time
around, responding more appropriately, and ultimately mitigating the impact of an incident.
Publishing information about previous computer incidents helps personnel prevent improper
handling of an incident. Improper incident handling can lead to malware accessing your sensitive
enterprise data for longer periods of time as it may not be properly removed. Another issue of
significance is that improper incident handling may violate local and federal laws about the
privacy of data and breach notifications.
Automation
This Sub-Control generally cannot be automated. Yet this does not mean that an incident
response plan and associated response procedures must be made from scratch. You can obtain
incident response procedures can be procured from other similar organizations that already have
them in place. These procedures can be modified to fit your needs.
Guidance and Tools
The following can be useful when looking to report computer anomalies and incidents:
● NIST: The Computer Security Incident Handling Guide from NIST provides detailed
information for how to handle a computer incident
(https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-61r2.pdf).
● US Department of Justice: The US DoJ provides guidance on how to report a
cybersecurity incident
(https://www.justice.gov/sites/default/files/opa/speeches/attachments/2015/04/29/criminal
_division_guidance_on_best_practices_for_victim_response_and_reporting_cyber_incide
nts2.pdf).
55
Acronyms and Abbreviations
2FA Two Factor Authentication
GHz Gigahertz
IG Implementation Group
IP Internet Protocol
IT Information Technology
56
NTP Network Time Protocol
OS Operating System
SP Special Publication
57
Links and Resources
• CIS Controls: https://www.cisecurity.org/controls/
• SANS Institute: https://www.sans.org/findtraining/
• Microsoft Windows 10 Versions: https://www.microsoft.com/en-us/windows/compare
• Daniel Miessler Blog: https://danielmiessler.com/blog/continuous-asset-management-security
• Nmap: https://nmap.org
• Spiceworks: https://www.spiceworks.com
• Zenmap: https://nmap.org/zenmap
• Netwrix: https://www.netwrix.com
• Open Audit: http://www.open-audit.org
• 10apps Manager: https://www.thewindowsclub.com/10appsmanager-windows-10
• Itarian: https://us.itarian.com/patch-management/free-windows-patch-management-
software.php
• Opsi: https://www.opsi.org
• CIS Benchmarks: https://www.cisecurity.org/cis-benchmarks
• PDQ: https://www.pdq.com
• Automatic Updates for Windows 10: https://support.microsoft.com/en-
us/help/15081/windows-turn-on-automatic-app-updates
• Keepass: https://keepass.info
• Lasspass: https://www.lastpass.com/password-manager
• OpenVAS: www.openvas.org
• DISA STIGs: https://iase.disa.mil/stigs/Pages/index.aspx
• US CERT – Securing Your Web Browser: https://www.us-cert.gov/publications/securing-your-
web-browser
• OpenDNS: https://support.opendns.com/hc/en-us/articles/228007207-Windows-10-
Configuration
• Quad9: https://www.quad9.net/microsoft
• Windows Defender Security Center: https://docs.microsoft.com/en-
us/windows/security/threat-protection/windows-defender-security-center/windows-defender-
security-center
• Elie Bursztein: https://elie.net/blog/security/concerns-about-usb-security-are-real-48-percent-
of-people-do-plug-in-usb-drives-found-in-parking-lots
• Microsoft Windows Firewall: https://docs.microsoft.com/en-us/windows/security/threat-
protection/windows-firewall/windows-firewall-with-advanced-security
• ZoneAlarm: https://www.zonealarm.com/software/free-firewall
• Microsoft Windows Backup and Restore: https://support.microsoft.com/en-
us/help/17127/windows-back-up-restore
• Amanda: http://www.amanda.org
• Bacula: http://blog.bacula.org
• Easeus: https://www.easeus.com/backup-software/tb-free.html
• Veracrypt: https://www.veracrypt.fr/en/How%20to%20Back%20Up%20Securely.html
58
• US CERT Ransomware Notice: https://www.us-
cert.gov/sites/default/files/publications/Ransomware_Executive_One-
Pager_and_Technical_Document-FINAL.pdf
• NCSC Mitigating Malware: https://www.ncsc.gov.uk/guidance/mitigating-malware
• NIST SP 1800-11: https://www.nccoe.nist.gov/sites/default/files/library/sp1800/di-nist-sp1800-
11-draft.pdf
• Xfinity Using Your Own Modem: https://www.xfinity.com/support/articles/using-your-own-
modem-with-new-speeds
• Verizon Routers: https://www.verizon.com/support/residential/internet/equipment/routers
• AT&T U Verse Setup: https://www.att.com/esupport/article.html#!/u-verse-high-speed-
internet/KM1175558?gsi=Lb27wrtt
• Xfinity Wireless Gateway Features: https://www.xfinity.com/support/articles/advanced-xfinity-
wireless-gateway-features
• Verizon Home Network Security:
https://www.verizon.com/support/residential/internet/security/home-network
• AT&T SMB Support: https://www.att.com/esupport/article.html#!/smb-
internet/KM1188420?gsi=xDPL7tW0
• CIS Mobile Companion Guide: https://www.cisecurity.org/white-papers/cis-controls-mobile-
companion-guide-2/
• CIS Google Android Benchmark: https://www.cisecurity.org/benchmark/google_android
• CIS Apple iOS Benchmark: https://www.cisecurity.org/benchmark/apple_ios
• Qualys Browsercheck : https://browsercheck.qualys.com
• Xfinity Change WiFi Security Mode: https://www.xfinity.com/support/articles/change-wifi-
security-mode
• Verizon Network Setup: http://www.verizon.com/support/smallbusiness/internet/fiosinternet/
networking/setup/zyxeladapters/128755.htm
• AT&T U Verse Setup: https://www.att.com/esupport/article.html#!/u-verse-high-speed-
internet/KM1049997?gsi=1ysnu3
• Verizon Guest WiFi Setup: https://www.verizon.com/cs/groups/public/documents/adacct/
guest-wifisetupguide-smb.pdf
• Xfinity Help Guests Get Online: https://www.xfinity.com/support/internet/help-guests-get-
online/
• HHS Security Awareness Training: https://www.hhs.gov/sites/default/files/fy18-
cybersecurityawarenesstraining.pdf
• MSISAC Subscription: https://learn.cisecurity.org/ms-isac-subscription
• Two Factor Auth: http://twofactorauth.org/
• Google Stay Safe from Phishing Scams: https://www.youtube.com/watch?v=R12_y2BhKbE
• NIST You’ve Been Phished: https://www.nist.gov/video/youve-been-phished
• OTA Alliance Cyber Incident Breach Response Guide: https://otalliance.org/system/files/files/
initiative/documents/2017_cyber_incident_breach_response_guide.pdf
• CMU Incident Response Plan: https://www.cmu.edu/iso/governance/procedures/
docs/incidentresponseplan1.0.pdf
• Oregon Incident Response Plan: https://www.oregon.gov/das/oscio/documents/
incidentresponseplantemplate.pdf
59
• DoJ Best Practices Victim Response and Reporting Cyber Incidents:
https://www.justice.gov/sites/default/files/opa/speeches/attachments/2015/04/29/criminal_divi
sion_guidance_on_best_practices_for_victim_response_and_reporting_cyber_incidents2.pdf
• NIST SP 800-61: https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-61r2.pdf
60
Appendix A: Example Asset and Information Tracking
Spreadsheets
Sample Hardware Asset Tracking Spreadsheet
Elements of a Hardware Asset Tracking Spreadsheet can include the following:
61
Sample Software Asset Tracking Spreadsheet
Elements of a Sensitive Information Tracking Spreadsheet can include the following:
62
Sample Sensitive Information Tracking Spreadsheet
Elements of a Sensitive Information Tracking Spreadsheet can include the following:
63
Appendix B: Step-by-Step Instructions to Implement Sub-Controls
Uninstalling Software
This process relates to CIS Control 2.6: Address Unapproved Software. Follow these steps to
uninstall unapproved software:
1. Click the Windows Start button. The Windows Start menu displays with the search bar.
2. Enter “settings” in the search field.
3. Click the search icon. Windows displays Settings options for the computer.
64
4. Select the Windows Settings app. The Windows Settings Home Screen displays.
65
5. Click Apps. The Apps and Features window opens with a list of installed applications. All
installed applications on the Windows 10 machine are available here. Select the
application that should be uninstalled. Note that some of the listed apps cannot be
uninstalled.
66
6. Select the app to remove. The item expands with “Move” and “Uninstall” buttons.
7. Select Uninstall. A confirmation dialog box opens with “This app and its related info will
be uninstalled”, and an “Uninstall” button.
67
8. Select Uninstall another time to confirm. Windows uninstalls the application.
68
Configuring Automated Operating System Patch Management Tools via
Windows Settings
This process relates to CIS Control 3.4: Deploy Automated Operating System Patch Management
Tools. Follow these steps to configure automated operating systems patch management tools.
Note: The local group policy method used in the next section is the preferred way of
implementing this Sub-Control.
1. Click the Windows Start button. The Windows Start menu displays with the search bar.
2. Enter “windows update” in the search bar. The Start Menu populates with Windows
update options.
69
3. Select Windows Update Settings. The Windows Update panel displays. This screen
shows the status of updates for the computer. If there are updates, they will be listed.
70
4. Select Check for updates to see if updates are available. Selecting Advanced options will
provide additional system update settings.
5. Select Advanced options. Ensure that Pause Updates is set to Off.
71
Configuring Automated Operating System Patch Management Tools via
LGPE
This control applies to CIS Control 3.4: Deploy Automated Operating System Patch Management
Tools.
Note: The LGPE can be used to configure device settings for patching Windows 10 Pro.
1. Click Start. The Windows Start menu displays with the search bar.
2. Enter “local group” in the search bar. Figure 13 illustrates the LGPE search.
72
3. Select the Local Group Policy Editor option in the search list. The Local Group Policy
Editor Home Screen displays. See Figure 14.
73
4. Select Computer Configurations, then select Administrative Templates, and then
Windows Components. The Windows Components folder displays with its subfolders.
74
5. Select Windows Update and double click Configure Automatic Updates.
75
6. Ensure that Enabled is selected.
7. Ensure Configure automatic updating is set to 4 – Auto download and schedule the
install. Select OK.
76
Automatic Application Updates via the Microsoft Application Store
This control applies to CIS Control 3.5: Deploy Automated Software Patch Management Tools.
Follow these steps to apply automatic application updates.
1. Click Start. The Windows Start menu displays with the search bar.
2. Enter “Microsoft Store” in the search field.
3. Select the Microsoft Store app in the search results. The Microsoft Store Home Screen
displays.
77
4. Select the three dots (. . .) in the top right under the “x”. The Settings drop-down list
displays.
78
5. Select Settings. The Settings screen displays.
79
6. Ensure that Update apps automatically is set to On.
80
Note: More steps are required to partially fulfill this Sub-Control.
1. Click Start. The Windows Start menu displays with the search bar.
2. Enter “windows update” in the Search field.
81
3. Select Windows Update settings. The Windows Update panel displays. This screen
shows the status of updates.
4. Select Advanced options. The Advanced options screen opens with additional system
update settings shown in Figure 24.
82
Figure 25 - Windows Update Advanced Options
83
5. Select Give me updates for other Microsoft products when I update Windows to
automatically download updates for applications like Microsoft Word or Microsoft Excel.
Refer to Figure 25.
84
Changing the Default Password
This control applies to CIS Control 4.2: Change Default Passwords. Follow these steps to change
default passwords.
Note: The best method of achieving this Sub-Control is via local group policy in the next section.
1. Click the Windows Start button. The Windows Start menu displays with the search bar.
2. Enter “settings” in the search bar.
3. Click the search icon. Windows displays settings options for the computer.
85
4. Select the Settings app. The Windows Settings Home Screen displays.
5. Select Accounts. The Your info screen displays.
8. Enter the current password in the “Current password” text field. Select the “Next” button
to continue. (An image for this step was intentionally not provided.)
9. Enter the new password into the password field. Ensure the password is not a commonly
used one or one that has been used before.
Note: The Local Group Policy Editor can be used to enforce a minimum password length. The
CIS Windows 10 Benchmark recommends a 14-character password.
1. Click the Windows Start button. The Windows Start menu displays with the search bar.
2. Enter “local group” to open the Local Group Policy Editor. Figure 31 illustrates the Local
Group Policy Editor search.
88
3. Select “Edit group policy” in the search list. The Local Group Policy Editor Home Screen displays.
4. Under Computer Configuration, expand Windows Settings, then select and expand
Security Settings. The subfolders of Security Settings display.
6. Enter “14” as the minimum password length. Select Apply. The minimum password
length is set to 14 characters.
Note: Setting a required minimum password length will not automatically make users change
their current password to meet policy. Users will need to manually update their password to meet
the requirement, but Windows will ensure that future passwords are at least 14 characters long.
1. Click Start. The Windows Start menu displays with the search bar.
2. Enter “settings” in the search field.
3. Click the search icon. Windows displays settings options for the computer.
4. Select the Settings app. The Windows Settings window opens.
91
5. Select Accounts. The Your info screen opens.
6. Accounts that have administrative access will indicate “Administrator” under the
username.
Note: Enabling system logs on a Windows 10 system can be a complex task. There are
hundreds of different types of logs that can all be enabled differently. This guide shows one of
many possible methods for enabling system event audit logs. For organizations looking for a
simple solution, CIS recommends organizations enable the following logs from the Microsoft
Windows basic audit policy located at this link: https://docs.microsoft.com/en-us/windows-
server/identity/ad-ds/plan/security-best-practices/audit-policy-recommendations
1. Click the Windows Start button. The Windows Start menu displays with the search bar.
2. Enter “local group” in the Search field. The search results populate.
93
3. Select “Edit group policy” in the search list. The Local Group Policy Editor Home Screen
displays.
4. Under Computer Configurations, select Security Settings, and then Advanced Audit
Policy Configuration.
94
5. Expand Advanced Audit Policy Configuration to show System Audit Policies - Local
Group Policy Object.
95
6. Expand Advanced Audit Policy Configuration once more. The system audit policies
display.
7. Under *Account Logon*, select *Audit Credential Validation*. Ensure that *Configure the
following audit events* is checked, and that *Success* is checked.
96
8. Under *Account Management*, select *Audit Computer Account Management*. Ensure
that *Configure the following audit events* is checked, and that *Success* is checked.
97
10. Under *Account Management*, select *Audit Security Group Management*. Ensure that
*Configure the following audit events* is checked, and that *Success* is checked.
11. Under *Account Management*, select *Audit User Account Management*. Ensure that
*Configure the following audit events* is checked, and that *Success* is checked.
13. Under *Logon/Logoff*, select *Audit Logoff*. Ensure that *Configure the following audit
events* is checked, and that *Success* is checked.
99
14. Under *Logon/Logoff*, select *Audit Logon*. Ensure that *Configure the following audit
events* is checked, and that *Success* is checked. Also ensure that *Failure* is checked.
15. Under *Logon/Logoff*, select *Audit Special Logon*. Ensure that *Configure the following
audit events* is checked, and that *Success* is checked.
17. Under *Policy Change*, select *Audit Authentication Policy Change*. Ensure that
*Configure the following audit events* is checked, and that *Success* is checked.
19. Under *System*, select *Audit Security State Change*. Ensure that *Configure the
following audit events* is checked, *Success* is checked, and *Failure* is checked.
21. Under *System*, select *Audit System Integrity*. Ensure that *Configure the following
audit events* is checked, *Success* is checked, and *Failure* is checked.
In the Windows search bar with the magnifying glass icon, type local group to open the Local
Group Policy Editor.
104
Checking Windows Defender Security Center
This process applies to CIS Control 8.2: Ensure Anti-Malware Software and Signatures Are
Updated
Note: Windows Defender is enabled in Windows 10 by default. The following steps help to
ensure that Windows Defender is properly enabled and the defaults have not been changed. This
is not a substitute for configuring Windows Defender via the Windows LGPE. This is shown on
the next page of this document.
1. Click the Windows Start button. The Windows Start menu displays with the search bar.
2. Enter “windows defender” in the search field. Windows displays search results.
3. Select the Windows Defender App. The “Security at a Glance” window opens with status
for monitored areas.
105
4. Any items that need to be reviewed will have an exclamation point within a triangle under
the icon.
106
Enabling Windows Defender Security Center via LGPE
This control applies to CIS Control 8.2: Ensure Anti-Malware Software and Signatures Are
Updated
1. Click the Windows Start button. The Windows Start menu displays with the search bar.
2. Enter ‘local group” in the search field. Search options populate for “local group”.
107
3. Select “Edit group policy” in the search list. The Local Group Policy Editor Home Screen
displays.
108
5. Expand Windows Components and then Windows Defender Antivirus.
6. Double click Turn off Windows Defender Antivirus and ensure Disabled is selected.
Windows Defender Antivirus is enabled by default. This prevents it from being disabled
by a user.
109
Note: Additional actions are required.
7. Click the blue back arrow in the top left of the Local Group Policy Editor and select Real-
time Protection, followed by Turn off real-time protection.
110
8. Ensure that Turn off real-time protection is Disabled. This prevents the application from
being disabled.
111
Scanning Removable Devices via LGPE
This process applies to CIS Control 8.4: Configure Anti-Malware Scanning of Removable Media.
Use these steps to scan removable devices using LGPE.
1. Click the Windows Start button. The Windows Start menu displays with search bar.
2. Enter “local group” in the search bar. Search options populate for “local group”.
112
3. Select “Edit group policy” in the search list. The LGPE Home Screen displays.
113
5. Expand Windows Components and then select Windows Defender Antivirus.
6. Select Scan and double click Scan removable drives. The Scan Removable Drives folder
opens.
114
7. Ensure the scan removable drives setting is set to Enabled. Note that this will not
automatically scan any inserted device. Instead, if a Windows Defender Antivirus scan is
run while a removable drive is inserted, that drive will also be within scope of the scan.
115
Configuring AutoPlay via Windows Control Panel
This process applies to CIS Control 8.5: Configure Devices to Not Auto-Run Content.
1. Click the Windows Start button. The Windows Start menu displays with the search bar.
2. Enter “settings” in the search field.
3. Click the search icon. Windows search options for “settings”.
116
4. Select the Settings app. The Windows Settings window opens.
118
Configuring AutoPlay via LGPE
This process applies to CIS Control 8.5: Configure Devices to Not Auto-Run Content. Use these
steps to configure AutoPlay via LGPE.
Note: Alternatively, the Local Group Policy Editor can be used to configure the Windows 10
AutoPlay setting.
1. Click the Windows Start button. The Windows Search menu displays.
2. Enter “local group” in the search field. Search options populate for “local group”.
3. Select “Edit group policy” in the search list. The Local Group Policy Editor Home Screen
displays.
119
Figure 81 – LGPE Home Screen
120
5. Select Windows Components and AutoPlay Policies. The AutoPlay settings display.
121
6. Select Set the default behavior for AutoRun and set the value to Disabled.
122
7. Under AutoPlay Policies, Select Turn off Autoplay. The Turn off AutoPlay screen opens.
123
8. Set the value to Enabled.
124
Enabling Windows Defender Firewall
This process applies to CIS Control 9.4: Apply Host-Based Firewalls or Port-Filtering.
1. Click the Windows Start button. The Windows Start menu displays with the search bar.
2. Enter “windows defender” in the search bar. Search results for “windows defender”
display.
125
3. Select the Windows Defender App. The Security at a Glance window opens with status
for monitored areas.
4. Select Firewall & network protection. The Fire and network protection view opens.
126
5. Ensure that the Domain network, Private network, and Public network firewalls are set to
on.
6. If any of the three firewalls are not set to on, select that firewall to enable it.
1. Click the Windows Start button. The Windows Start menu displays with the search bar.
2. Enter “backup” in the Windows search bar. Search results display for “backup”.
128
3. Select “Backup settings”. The Backup screen displays.
4. Select Add a drive under Back up using File History. The Backup options home screen
displays.
Note: An external hard drive or removable media (e.g., USB drive, thumb drive) must be
connected to the computer to backup information onto.
129
5. Scroll down and select See advanced settings.
130
Creating System Images with Windows 10 Pro
This process applies to CIS Control 10.2: Perform Complete System Backups. Use these steps to
create system images with Windows 10 Pro.
1. Select the Windows Start button. The Windows Start menu displays with the search bar.
2. Enter “backup settings” in the search bar. Search results for “backup settings” display.
131
4. Select Go to Backup and Restore (Windows 7). The Backup and Restore (Windows 7)
screen displays.
8. Click Next. The What do you want to back up? view opens.
9. Select Let windows choose (recommended) to have Windows determine what files to
backup.
10. Click Next. The Review your backup settings view opens.
12. The backup begins. It may take a long time to successfully complete. While the backup is
in progress, a backup in progress bar displays.
1. Click the Windows Start button. The Windows Start menu displays with the search bar.
2. Enter “bitlocker” in the search bar. Search results related to “bitlocker” display.
3. Select “Manage Bitlocker” in the search results. The BitLocker Drive Encryption screen
displays.
135
4. Select Turn on BitLocker.
Note: An error may be displayed if the computer in question lacks a hardware encryption module
(e.g., Trusted Platform Module). TPMs are the preferred method to enable encryption on
Windows 10 but encryption can be used without it. The following error message may be
presented.
136
Set up a Trusted Platform Module
In order to solve this issue, the Windows Local Group Policy Editor can be used. Follow this path
to navigate to the correct LGPE settings:
137
2. Enable Configure use of hardware-based encryption for fixed data drives. Then select
Use BitLocker software-based encryption when hardware encryption is not available.
138
3. Under Computer Configuration, select Administrative Templates and then Windows
Components. The Windows Components subfolders display.
139
4. Select BitLocker Drive Encryption, followed by Operating System Drives, and then select
Require additional authentication at startup.
140
5. Enable Require additional authentication at startup and select Allow BitLocker without a
compatible TPM (requires a password or a startup key on a USB flash drive). This should
solve the error. If not, restart the steps in this section.
141
6. The system will check additional settings before enabling BitLocker. The Checking your
PC’s configuration screen opens.
7. The Bitlocker Drive Encryption setup screen displays. Select Next. The Preparing your
drive for Bitlocker screen displays.
142
8. Select Next after reviewing the warnings from Windows. The Preparing your drive for
BitLocker displays with a status of tasks.
143
10. The BitLocker Drive Encryption Setup screen with a Windows Recovery Warning
displays.
11. Select Next. The Choose how to unlock your drive at startup screen displays. This screen
allows the user the option for how to unlock the encrypted drive at startup. This guide will
use the “Enter a password” method.
144
12. Select Enter a password. The Create a Password to unlock this drive screen displays.
Note: A password is necessary to unlock BitLocker.
145
13. Enter the password in the Enter your password text field.
14. Enter the password again in the Reenter your password text field.
146
15. Click Next. The How do you want to back up your recovery key? screen displays. Note: A
recovery key should be stored elsewhere in case the BitLocker password is lost. Without
the recovery key, if the password is forgotten then the system will be completely
inaccessible.
16. Select how the recovery key will be saved. The Choose how much of your drive to
encrypt screen displays. This guide encourages average users to select the faster option
but for systems storing sensitive data, users are encouraged to encrypt the entire drive
(the second option).
147
Figure 1179 - Encryption Type Selection
17. Click Next. The Are you ready to encrypt this drive? screen displays.
18. Ensure Run BitLocker system check is selected.
19. Click Continue. The Choose which encryption mode to use screen displays.
148
20. Select New encryption mode (best for fixed drives on this device).
149
Identifying if a WiFi Connection is Using AES
This process applies to Sub-Control 15.7. Use these steps to identify if a Wifi connection is using
AES.
1. Click the Windows Start button. The Windows Start menu displays with the search bar.
2. Enter “network” in the search bar. Search results related to “network” display.
150
3. Select “Network status” from the search options. The Status screen displays.
4. Select Change connection properties. The network connection screen for the current
network displays.
151
5. If WPA2 is listed under Security type, then AES is being used to secure this wireless
connection.
152
Viewing Accounts on a Windows 10 System
This process applies to CIS Control 16.8: Disable Any Unassociated Accounts.
1. Click the Windows Start button. The Windows Start menu displays with the search bar.
2. Enter “settings” in the search bar.
3. Click the search icon. Search results related to “settings” display.
153
4. Select the Settings app. The Windows Settings window displays.
154
5. Select Accounts. The Your info screen opens.
155
6. Select Family & other people. The Family & other people screen opens. Other accounts
on the computer are sometimes viewable on this screen. If the user viewing this display is
not an administrator, they may not be able to see all the accounts on the system.
156
Automatically Locking a Workstation
This process applies to CIS Control 16.11: Lock Workstation Sessions After Inactivity. Use these
steps to automatically lock a workstation following a set period of inactivity.
1. Click the Windows Start button. The Windows Start menu displays with the search bar.
2. Enter “local group” in the search bar. Search results for “local group” display.
157
3. Select “Edit group policy: in the search list. The Local Group Policy Editor Home Screen
displays.
158
4. Select Computer Configurations and then Windows Settings. The Windows settings
display.
159
5. Select Security Settings and then Local Policies.
6. Select Security Options and then double click Interactive logon: Machine interactivity
limit. The Interactive logon: Machine inactivity limit Properties window displays.
8. Click OK.
161
About This Document
In this document, guidance is provided on how to apply the security best practices found in CIS Controls
Version 7.1 to Windows 10 Pro environments. As a non-profit driven by its volunteers, we are always in the
process of looking for new topics and assistance in creating cybersecurity guidance. If you are interested in
volunteering and/or have questions, comments, or have identified ways to improve this guide, please write
us at controlsinfo@cisecurity.org.
CIS is using an alternative format to host this document in order to keep up with the quick changes in the
cybersecurity space to that end, visit https://www.cisecurity.org/controls/ to find the most up to date
version of this document. Feel free to reach out to us at controlsinfo@cisecurity.org for any questions.
CIS Controls Microsoft Windows 10 Cyber Hygiene Guide is an independent publication and is neither
affiliated with, nor authorized, sponsored, or approved by, Microsoft Corporation.
Microsoft is the sole owner of their respective Marks. All other trademarks are the property of their
respective owners.
All references to tools or other products in this document are provided for informational purposes only, and
do not represent the endorsement by CIS of any particular company, product, or technology.
Contact Information
CIS
31 Tech Valley Drive
East Greenbush, NY 12061
518.266.3460
controlsinfo@cisecurity.org
162