

Minimizing and controlling these accounts will help protect your data and network from unauthorized access. Why is this critical? Privileged and unused accounts provide an avenue for attackers to target your network. Create and maintain an inventory of service accounts.

Disable accounts that haven’t been used for 45 days.Create and maintain an inventory of all accounts.Control 5 includes six steps for avoiding security problems caused by vulnerable accounts: Securely managing user, administrator and service accounts is vital to preventing their exploitation by attackers. Account ManagementĪccount management was Control 16 in CIS Controls version 7.
#SANS ULTIMATE PEN TEST POSTER PDF SOFTWARE#
Using automated software simplifies the process of hardening and monitoring your IT assets for example, Netwrix Change Tracker provides CIS-certified build templates that help you quickly establish strong baseline configurations and alerts you to unexpected changes in real time so you can promptly take action to minimize risk.

Why is this critical? Even one configuration error can open up security risks and disrupt business operations. It details best practices to establish and maintain secure configurations on hardware and software assets. This safeguard merges controls 5 and 11 of version 7. Secure Configuration of Enterprise Assets and Software Solutions that detect data exfiltration can minimize these risks and mitigate the effects of data compromise. Why is this critical? Although many data leaks are the result of deliberate theft, data loss and damage can also occur because of human error or poor security practices.

CIS Control 3 outlines a method of protecting your data by detailing processes and technical controls to identify, classify, securely handle, retain and dispose of data. Your data is one of your company’s most valuable assets. In version 7 of the CIS Controls, data protection was Control 13. This is particularly critical for software that contains open-source components since their vulnerabilities are public knowledge. A comprehensive software inventory helps you ensure that all of your software is updated and any known vulnerabilities have been patched or mitigated. Why is this critical? Unpatched software continues to be a primary vector for ransomware attacks.
#SANS ULTIMATE PEN TEST POSTER PDF PORTABLE#
Portable user devices will periodically join a network and then disappear, making the inventory of currently available assets very dynamic. This includes establishing and maintaining an accurate, updated and detailed list of all hardware connected to your infrastructure, including assets that aren’t under your control, such as employees’ personal cell phones. The first step in developing and implementing a comprehensive cybersecurity strategy is to understand your company’s assets, who controls them and the roles they play. Inventory and Control of Enterprise Assets This article details the 18 controls in CIS version 8. These guidelines take into account the rise of remote work and the resulting increase in access points and need for perimeter-less security. Implementing the CIS Controls provides a sound foundation for effective defense against cyber threatsįirst developed in 2008, the CIS Controls are updated periodically in response to the evolution of both technologies and the threat landscape. The controls are based on the latest information about common attacks and reflect the combined knowledge of commercial forensics experts, individual penetration testers and contributors from U.S. With the cost of a data breach at an all-time high of $4.35 million and regulations worldwide imposing steeper penalties for compliance failures, organizations must ensure that they have all necessary security controls in place to keep their data safe.
