Identification includes
- Inventory and control of hardware assets
- Inventory and control of software assets
- Continuous vulnerability management
- Controlled use of administrative privileges
- Secure configuration for hardware and software on mobile devices, laptops, workstations, and servers
- Maintenance, monitoring, and analysis of audit logs
- Email and web browser protections
- Malware defenses
- Limitation and control of network ports, protocols, and services
- Data recovery capabilities
- Secure configuration for network devices, such as firewalls, routers, and switches
- Boundary defense
- Data protection
- Controlled access based on the need to know
- Wireless access control
- Account monitoring and control
- Implement a security awareness and training program
- Application software security
- Incident response and management
- Penetration tests and red team exercises
Process/Skill Questions:
- What benefit do these controls offer to cybersecurity as it relates to PA?
- Why is it important to identify hardware assets in the network?
- Why is it important to limit the use of administrative logins to a system?
- Who is responsible for training a small agribusiness owner to understand, characterize, interpret, and apply the CIS critical security controls?