CIS Critical Security Controls Flashcards
I1 M3
Actively track & manage all IT assets connected to a company’s IT infrastructure physically or virtually
(1) Inventory & Control of Enterprise Assets
Actively manage all software on the network to ensure only authorized software is installed & can execute on company devices
(2) Inventory & Control of Software Assets
Securely manage the life cycle of data; Identify, classify, securely handle, retain, & dispose of data to prevent data loss & unauthorized access
(3) Data Protection
Establish & maintain secure configurations for hardware & software to reduce vulnerability
(4) Secure Configuration of Enterprise Assets & Software
Manage credentials & authorization for user accounts, privileged user accounts, & service accounts for company hardware & software applications
(5) Account Management
Limit access to assets & data based on role & need-to-know to enforce least privelege
(6) Access Control Management
Continuously identify & remediate vulnerabilities to reduce the risk of exploitation
(7) Continuous Vulnerability Management
Collect, manage, & review audit logs to detect & investigate suspicious activity
(8) Audit Log Management
Implement controls to protect against threats delivered via email & web browsers
(9) Email & Web Browser Protections
Preventing the installation & propagation of malware onto company assets & its network
(10) Malware Defense
Established data backup, testing, & restoration process that allow organizations to effectively recover company assets to a pre-incident state
(11) Data Recovery
Establishes procedures & tools for managing & securing a company’s network infrastructure
(12) Network Infrastructure Management
Monitor the network for unusual or malicious activity & respond to thread in real-time
(13) Network Monitoring & Defense
Provide ongoing training to develop security skills & awareness for all personnel
(14) Security Awareness & Skills Training
Evaluate & manage risks associated with third-party service providers & ensure they meet security requirements
(15) Service Provider Management
Establish safeguards that manage the entire life cycle of the software that is acquired, hosted, or developed in-house to detect, deter, & resolve cybersecurity weaknesses before they are exploited
(16) Application Software Security
Develop & maintain an incident response plan to detect, respond to, & recover from cybersecurity incidents
(17) Incident Response Management
Regularly test systems through simulated attacks to identify weaknesses in controls & improve security posture
(18) Penetration Testing