SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Recent Changes to the 20 Critical Controls:
Updates and Philosophies (v.3)

James Tarala, Enclave Security
Information Security Standards
• Presently there are a number of information
  security standards available
• But, there are too many to choose from:
  – Individual Corporate / Agency Standards
  – NIST 800-53 / 800-53 A
  – FISMA / DIACAP
  – HIPAA / SOX / GLBA
  – PCI / NERC / CIP
  – 20 Critical Controls / Consensus Audit Guidelines



            The Consensus Audit Guidelines © Enclave Security 2010
One Option: 20 Critical Controls
• Developed at a tool for organizations
  responsible for NIST 800-53
• Priorities for which controls will make the
  most impact to stop dedicated attackers
• Written in response to compromised US
  government agencies & contractors
• Collaborative effort by over 100 different
  government, military, & civilian experts


            The Consensus Audit Guidelines © Enclave Security 2010
CSIS & The SANS Institute
• The controls are a collaboration between the Center
  for Strategic & International Studies, the SANS
  Institute & other entities
• CSIS began engaging cyber security issues at the
  beginning of the Obama administration
• Updates to the controls are a collaboration between
  individuals at each of these groups




          Recent Changes to the 20 Critical Controls © Enclave Security 2011
Project Guiding Principles
• Defenses should focus on
  addressing the most common
  and damaging attack activities
  occurring today, and those
  anticipated in the near future.
• Enterprise environments must
  ensure consistent controls across
  an enterprise to effectively
  negate attacks.



            The Consensus Audit Guidelines © Enclave Security 2010
Project Guiding Principles (2)
           • Defenses should be automated
             where possible, and periodically or
             continuously measured using
             automated measurement techniques
             where feasible.
           • To address current attacks occurring
             on a frequent basis against numerous
             organizations, a variety of specific
             technical activities should be
             undertaken to produce a more
             consistent defense.



      The Consensus Audit Guidelines © Enclave Security 2010
Project Guiding Principles (3)
• Root cause problems must be
  fixed in order to ensure the
  prevention or timely detection of
  attacks.
• Metrics should be established
  that facilitate common ground
  for measuring the effectiveness
  of security measures, providing a
  common language to
  communicate about risk.

            The Consensus Audit Guidelines © Enclave Security 2010
Why are the Controls Important?
• Cyber security is complex and becoming even
  more complicated every day
• Organizations are being compromised, even after
  spending large portions of their budget on
  infosec
• CIOs & CISOs need prioritized controls to get the
  most return from their investment
• More controls rarely hurt, but how do we decide
  which controls to start with?
• It’s critical that we have priorities!


            The Consensus Audit Guidelines © Enclave Security 2010
Why are the Controls Important? (2)
 • We need agreement between:
   – Inspector Generals (IGs – auditors)
   – Operations (sys-admins)
   – Security Engineers
 • We need metrics and measurements that
   everyone can agree to use
 • We need to stop people from violating
   systems & compromising the C-I-A of our data



             The Consensus Audit Guidelines © Enclave Security 2010
Categories of Sub-Controls
• Quick Wins (QW)
• Improved Visibility and
  Attribution (Vis/Attrib)
• Hardened Configuration
  and Improved Information
  Security Hygiene
  (Config/Hygiene)
• Advanced (Adv)


          The Consensus Audit Guidelines © Enclave Security 2010
Document Contributors
• Blue team members inside the Department of Defense
• Blue team members who provide services for non-DoD
  government agencies
• Red & blue teams at the US National Security Agency
• US-CERT and other non-military incident response
  teams
• DoD Cyber Crime Center (DC3)
• Military investigators who fight cyber crime
• The FBI and other police organizations
• US Department of Energy laboratories



            The Consensus Audit Guidelines © Enclave Security 2010
Document Contributors (2)
•   US Department of State
•   Army Research Laboratory
•   US Department of Homeland Security
•   DoD and private forensics experts
•   Red team members in DoD
•   The SANS Institute
•   Civilian penetration testers
•   Federal CIOs and CISOs
•   Plus over 100 other collaborators


             The Consensus Audit Guidelines © Enclave Security 2010
Revision History
• Version 1.0 – Original rough draft of controls
• Version 2.0 – Major revision of sub controls
  based on community & agency feedback
• Version 2.1 – Minor revision of sub controls
  based on community & agency feedback
• Version 2.3 – Addition of metrics & core
  evaluation methodologies
• Version 3.0 – Minor revision of sub controls &
  addition of standards mappings & sensors
• Version 3.1 – Reordering of controls based on
  priority of controls


          Recent Changes to the 20 Critical Controls © Enclave Security 2011
Updates to Version 3.0
In this version the following updates were
performed:
  – Minor updates to sub controls based on threat
    assessments & feedback
  – Re-classification of controls
  – Addition of mappings to additional standards
    (Australian DSD, NSA MNP & ISO 27000)
  – Addition of sensors for automated data collection




         Recent Changes to the 20 Critical Controls © Enclave Security 2011
Edits to Sub Controls
• A number of controls were either added or
  removed from the controls based on current
  threats
• For example:
  – “All remote administration of servers, workstation,
    network devices, and similar equipment shall be
    done over secure channels (control 3).”
  – “Network-based IPS devices should be deployed
    to compliment IDS by blocking known bad
    signature or behavior of attacks (control 5).”



         Recent Changes to the 20 Critical Controls © Enclave Security 2011
Re-Classification of Controls
• In addition to new or edited sub controls,
  many of the controls were re-classified
• In most cases controls were lowered from
  “Advanced” to “Config-Hygiene” or “Vis-
  Attrib”
• For example in Control 6:
  – “Organizations should deploy a SEIM system tool
    for log aggregation and consolidation from
    multiple machines and for log correlation and
    analysis.”


         Recent Changes to the 20 Critical Controls © Enclave Security 2011
Addition of “Sensors”
• Sensors = Tools to measure the effectiveness of
  the implementation of a control
• For example in Control 3:
  – Sensor: File integrity software
  – Measurement: File integrity monitoring software is
    deployed on servers as a part of the base
    configuration. Centralized solutions are preferred over
    stand-alone solutions.
  – Score: 50 percent awarded for using a solution with a
    central monitoring/reporting component. The
    remaining 50 percent is based on the percentage of
    servers on which the solution is deployed.



          Recent Changes to the 20 Critical Controls © Enclave Security 2011
US Dept of State iPost
• Used to protect OpenNet, the DoS Sensitive But
  Unclassified (SBU) network
• Consists of 5,000 routers and switches, and more
  than 40,000 hosts
• The Risk Scoring program at DoS evolved in three
  separate stages.
  – Deployment of Enterprise management tools
  – Delivery of operational data to the field in an
    integrated application, iPost
  – Establishment of a risk scoring program



             The Consensus Audit Guidelines © Enclave Security 2010
Sample iPost Reporting




 Recent Changes to the 20 Critical Controls © Enclave Security 2011
iPost Data Feeds




Recent Changes to the 20 Critical Controls © Enclave Security 2011
Additional Standards Mapping
• In version 3.0 and later additional mappings
  were added between the 20 CC and other
  industry or government standards
• Specifically now the control are mapped to:
  – NIST 800-53
  – US NSA Manageable Network Plan (MNP)
  – Australian DSD Top 35 Mitigation Strategies
  – ISO 27000 Series



         Recent Changes to the 20 Critical Controls © Enclave Security 2011
Updates to Version 3.1
• In this version the following updates were
  performed:
  – A great deal of feedback on the controls was
    gathered on the experiences of the Australian DSD
  – The 20 Controls were reordered based on
    priorities, value of each control & risk levels




         Recent Changes to the 20 Critical Controls © Enclave Security 2011
Australian Top 35
• Australian Top 35 Mitigation Strategies, Australian
  Department of Defence
• Defensive controls to block over 85% of attacks
  directed against their systems
• The Top 35 Mitigation Strategies are ranked in order
  of overall effectiveness
• Rankings are based on DSD’s analysis of reported
  security incidents and vulnerabilities detected by
  DSD
 http://www.dsd.gov.au/infosec/top35mitigationstrategies.htm


           Recent Changes to the 20 Critical Controls © Enclave Security 2011
New Prioritized Control Order
1. Inventory of Authorized                    6. Application Software
   and Unauthorized Devices                       Security
2. Inventory of Authorized                    7. Wireless Device Control
   and Unauthorized                           8. Data Recovery Capability
   Software                                       (validated manually)
3. Secure Configurations for                  9. Security Skills Assessment
   Hardware and Software on                       and Appropriate Training
   Laptops, Workstations,                         to Fill Gaps (validated
   and Servers                                    manually)
4. Continuous Vulnerability                   10. Secure Configurations for
   Assessment and                                 Network Devices such as
   Remediation                                    Firewalls, Routers, and
5. Malware Defenses                               Switches



           Recent Changes to the 20 Critical Controls © Enclave Security 2011
New Prioritized Control Order (2)
11. Limitation and Control of                  16. Account Monitoring and
    Network Ports, Protocols,                      Control
    and Services                               17. Data Loss Prevention
12. Controlled Use of                          18. Incident Response
    Administrative Privileges                      Capability (validated
13. Boundary Defense                               manually)
14. Maintenance, Monitoring,                   19. Secure Network
    and Analysis of Security                       Engineering (validated
    Audit Logs                                     manually)
15. Controlled Access Based on                 20. Penetration Tests and Red
    the Need to Know                               Team Exercises (validated
                                                   manually)


            Recent Changes to the 20 Critical Controls © Enclave Security 2011
Other Projects to Watch
• Security Content Automation Protocol (SCAP)
• Continuous Monitoring Efforts
  – NASA
  – CyberScope & FISMA Reporting
  – US Office of Management & Budget (OMB)
• International Government Efforts
  – United Arab Emirates (UAE)
  – European Union
  – Australian Department of Defence



         Recent Changes to the 20 Critical Controls © Enclave Security 2011
In Summary
• There have been numerous changes to the controls,
  but the philosophies remain the same
• Regardless if you follow the 20 CC, each organization
  needs a strategy for defense
• Be aware of the changing threat landscape and have
  a plan for preventing future attacks
• Organizations need to set priorities for system and
  data defense, this is one good option
• Watch for more changes to come



           Recent Changes to the 20 Critical Controls © Enclave Security 2011
Further Questions
• James Tarala
   – E-mail: james.tarala@enclavesecurity.com
   – Twitter: @isaudit, @jamestarala
   – Blog:    http://www.enclavesecurity.com/blogs/

• Resources for further study:
   – The 20 Critical Controls:
       (http://www.sans.org/critical-security-controls/)
   – SANS Security 566: Implementing and Auditing the Twenty
     Critical Security Controls - In-Depth



            Recent Changes to the 20 Critical Controls © Enclave Security 2011

Weitere ähnliche Inhalte

Was ist angesagt?

Effective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security ControlsEffective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security ControlsBSides Delhi
 
Practical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device securityPractical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device securityEnclaveSecurity
 
Information Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to MeasurementInformation Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to MeasurementEnclaveSecurity
 
Top 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure InfrastructureTop 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure InfrastructureInfosec
 
Extending the 20 critical security controls to gap assessments and security m...
Extending the 20 critical security controls to gap assessments and security m...Extending the 20 critical security controls to gap assessments and security m...
Extending the 20 critical security controls to gap assessments and security m...John M. Willis
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3Lisa Niles
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1Lisa Niles
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2Lisa Niles
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSFDigital Bond
 
20 Critical Controls for Effective Cyber Defense (A must read for security pr...
20 Critical Controls for Effective Cyber Defense (A must read for security pr...20 Critical Controls for Effective Cyber Defense (A must read for security pr...
20 Critical Controls for Effective Cyber Defense (A must read for security pr...Tahir Abbas
 
20 Security Controls for the Cloud
20 Security Controls for the Cloud20 Security Controls for the Cloud
20 Security Controls for the CloudNetStandard
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #4
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #4SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #4
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #4Lisa Niles
 
Ebook: Splunk SANS - CIS Top 20 Critical Security Controls
Ebook: Splunk SANS - CIS Top 20 Critical Security ControlsEbook: Splunk SANS - CIS Top 20 Critical Security Controls
Ebook: Splunk SANS - CIS Top 20 Critical Security ControlsDominique Dessy
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5Lisa Niles
 
Federal Cybersecurity: The latest challenges, initiatives and best practices
Federal Cybersecurity: The latest challenges, initiatives and best practicesFederal Cybersecurity: The latest challenges, initiatives and best practices
Federal Cybersecurity: The latest challenges, initiatives and best practicesJohn Gilligan
 
Solving the CIO’s Cybersecurity Dilemma
Solving the CIO’s Cybersecurity DilemmaSolving the CIO’s Cybersecurity Dilemma
Solving the CIO’s Cybersecurity DilemmaJohn Gilligan
 
A Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachA Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachAnchises Moraes
 
Happiest Minds NIST CSF compliance Brochure
Happiest Minds NIST  CSF compliance BrochureHappiest Minds NIST  CSF compliance Brochure
Happiest Minds NIST CSF compliance BrochureSuresh Kanniappan
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2newbie2019
 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Phil Agcaoili
 

Was ist angesagt? (20)

Effective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security ControlsEffective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security Controls
 
Practical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device securityPractical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device security
 
Information Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to MeasurementInformation Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to Measurement
 
Top 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure InfrastructureTop 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure Infrastructure
 
Extending the 20 critical security controls to gap assessments and security m...
Extending the 20 critical security controls to gap assessments and security m...Extending the 20 critical security controls to gap assessments and security m...
Extending the 20 critical security controls to gap assessments and security m...
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSF
 
20 Critical Controls for Effective Cyber Defense (A must read for security pr...
20 Critical Controls for Effective Cyber Defense (A must read for security pr...20 Critical Controls for Effective Cyber Defense (A must read for security pr...
20 Critical Controls for Effective Cyber Defense (A must read for security pr...
 
20 Security Controls for the Cloud
20 Security Controls for the Cloud20 Security Controls for the Cloud
20 Security Controls for the Cloud
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #4
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #4SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #4
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #4
 
Ebook: Splunk SANS - CIS Top 20 Critical Security Controls
Ebook: Splunk SANS - CIS Top 20 Critical Security ControlsEbook: Splunk SANS - CIS Top 20 Critical Security Controls
Ebook: Splunk SANS - CIS Top 20 Critical Security Controls
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
 
Federal Cybersecurity: The latest challenges, initiatives and best practices
Federal Cybersecurity: The latest challenges, initiatives and best practicesFederal Cybersecurity: The latest challenges, initiatives and best practices
Federal Cybersecurity: The latest challenges, initiatives and best practices
 
Solving the CIO’s Cybersecurity Dilemma
Solving the CIO’s Cybersecurity DilemmaSolving the CIO’s Cybersecurity Dilemma
Solving the CIO’s Cybersecurity Dilemma
 
A Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachA Case Study of the Capital One Data Breach
A Case Study of the Capital One Data Breach
 
Happiest Minds NIST CSF compliance Brochure
Happiest Minds NIST  CSF compliance BrochureHappiest Minds NIST  CSF compliance Brochure
Happiest Minds NIST CSF compliance Brochure
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6
 

Ähnlich wie Recent changes to the 20 critical controls

Prioritized Approach Twenty Critical Controls 2008
Prioritized Approach Twenty Critical Controls 2008Prioritized Approach Twenty Critical Controls 2008
Prioritized Approach Twenty Critical Controls 2008Donald E. Hester
 
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 Tripwire
 
Cybersecurity: Challenges, Initiatives, and Best Practices
Cybersecurity: Challenges, Initiatives, and Best PracticesCybersecurity: Challenges, Initiatives, and Best Practices
Cybersecurity: Challenges, Initiatives, and Best PracticesJohn Gilligan
 
Leveraging Change Control for Security
Leveraging Change Control for SecurityLeveraging Change Control for Security
Leveraging Change Control for SecurityTripwire
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingBlack Duck by Synopsys
 
Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Skybox Security
 
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...John Gilligan
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Decisions
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixHCLSoftware
 
Performing One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust PrinciplesPerforming One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust PrinciplesControlCase
 
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...SolarWinds
 
Taking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changesTaking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changesAlgoSec
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilitiesNirmal Thaliyil
 
Improving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWindsImproving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWindsSolarWinds
 
Comp8 unit6b lecture_slides
Comp8 unit6b lecture_slidesComp8 unit6b lecture_slides
Comp8 unit6b lecture_slidesCMDLMS
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of VulnerabilitySkybox Security
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsEnergySec
 
Implementing Continuous Monitoring
Implementing Continuous MonitoringImplementing Continuous Monitoring
Implementing Continuous MonitoringJohn Gilligan
 

Ähnlich wie Recent changes to the 20 critical controls (20)

Prioritized Approach Twenty Critical Controls 2008
Prioritized Approach Twenty Critical Controls 2008Prioritized Approach Twenty Critical Controls 2008
Prioritized Approach Twenty Critical Controls 2008
 
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
 
Cybersecurity: Challenges, Initiatives, and Best Practices
Cybersecurity: Challenges, Initiatives, and Best PracticesCybersecurity: Challenges, Initiatives, and Best Practices
Cybersecurity: Challenges, Initiatives, and Best Practices
 
Leveraging Change Control for Security
Leveraging Change Control for SecurityLeveraging Change Control for Security
Leveraging Change Control for Security
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s Missing
 
System Security Plans 101
System Security Plans 101System Security Plans 101
System Security Plans 101
 
Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11
 
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFix
 
Performing One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust PrinciplesPerforming One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust Principles
 
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
 
Taking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changesTaking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changes
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
 
Improving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWindsImproving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWinds
 
Comp8 unit6b lecture_slides
Comp8 unit6b lecture_slidesComp8 unit6b lecture_slides
Comp8 unit6b lecture_slides
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWs
 
Implementing Continuous Monitoring
Implementing Continuous MonitoringImplementing Continuous Monitoring
Implementing Continuous Monitoring
 
Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reaction
 

Mehr von EnclaveSecurity

Automating Post Exploitation with PowerShell
Automating Post Exploitation with PowerShellAutomating Post Exploitation with PowerShell
Automating Post Exploitation with PowerShellEnclaveSecurity
 
Enterprise PowerShell for Remote Security Assessments
Enterprise PowerShell for Remote Security AssessmentsEnterprise PowerShell for Remote Security Assessments
Enterprise PowerShell for Remote Security AssessmentsEnclaveSecurity
 
An Introduction to PowerShell for Security Assessments
An Introduction to PowerShell for Security AssessmentsAn Introduction to PowerShell for Security Assessments
An Introduction to PowerShell for Security AssessmentsEnclaveSecurity
 
An Introduction to PowerShell for Security Assessments
An Introduction to PowerShell for Security AssessmentsAn Introduction to PowerShell for Security Assessments
An Introduction to PowerShell for Security AssessmentsEnclaveSecurity
 
Governance fail security fail
Governance fail security failGovernance fail security fail
Governance fail security failEnclaveSecurity
 
The intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionThe intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionEnclaveSecurity
 
Its time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerIts time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerEnclaveSecurity
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usualEnclaveSecurity
 
Benefits of web application firewalls
Benefits of web application firewallsBenefits of web application firewalls
Benefits of web application firewallsEnclaveSecurity
 

Mehr von EnclaveSecurity (9)

Automating Post Exploitation with PowerShell
Automating Post Exploitation with PowerShellAutomating Post Exploitation with PowerShell
Automating Post Exploitation with PowerShell
 
Enterprise PowerShell for Remote Security Assessments
Enterprise PowerShell for Remote Security AssessmentsEnterprise PowerShell for Remote Security Assessments
Enterprise PowerShell for Remote Security Assessments
 
An Introduction to PowerShell for Security Assessments
An Introduction to PowerShell for Security AssessmentsAn Introduction to PowerShell for Security Assessments
An Introduction to PowerShell for Security Assessments
 
An Introduction to PowerShell for Security Assessments
An Introduction to PowerShell for Security AssessmentsAn Introduction to PowerShell for Security Assessments
An Introduction to PowerShell for Security Assessments
 
Governance fail security fail
Governance fail security failGovernance fail security fail
Governance fail security fail
 
The intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionThe intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protection
 
Its time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerIts time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primer
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usual
 
Benefits of web application firewalls
Benefits of web application firewallsBenefits of web application firewalls
Benefits of web application firewalls
 

Kürzlich hochgeladen

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Kürzlich hochgeladen (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Recent changes to the 20 critical controls

  • 1. Recent Changes to the 20 Critical Controls: Updates and Philosophies (v.3) James Tarala, Enclave Security
  • 2. Information Security Standards • Presently there are a number of information security standards available • But, there are too many to choose from: – Individual Corporate / Agency Standards – NIST 800-53 / 800-53 A – FISMA / DIACAP – HIPAA / SOX / GLBA – PCI / NERC / CIP – 20 Critical Controls / Consensus Audit Guidelines The Consensus Audit Guidelines © Enclave Security 2010
  • 3. One Option: 20 Critical Controls • Developed at a tool for organizations responsible for NIST 800-53 • Priorities for which controls will make the most impact to stop dedicated attackers • Written in response to compromised US government agencies & contractors • Collaborative effort by over 100 different government, military, & civilian experts The Consensus Audit Guidelines © Enclave Security 2010
  • 4. CSIS & The SANS Institute • The controls are a collaboration between the Center for Strategic & International Studies, the SANS Institute & other entities • CSIS began engaging cyber security issues at the beginning of the Obama administration • Updates to the controls are a collaboration between individuals at each of these groups Recent Changes to the 20 Critical Controls © Enclave Security 2011
  • 5. Project Guiding Principles • Defenses should focus on addressing the most common and damaging attack activities occurring today, and those anticipated in the near future. • Enterprise environments must ensure consistent controls across an enterprise to effectively negate attacks. The Consensus Audit Guidelines © Enclave Security 2010
  • 6. Project Guiding Principles (2) • Defenses should be automated where possible, and periodically or continuously measured using automated measurement techniques where feasible. • To address current attacks occurring on a frequent basis against numerous organizations, a variety of specific technical activities should be undertaken to produce a more consistent defense. The Consensus Audit Guidelines © Enclave Security 2010
  • 7. Project Guiding Principles (3) • Root cause problems must be fixed in order to ensure the prevention or timely detection of attacks. • Metrics should be established that facilitate common ground for measuring the effectiveness of security measures, providing a common language to communicate about risk. The Consensus Audit Guidelines © Enclave Security 2010
  • 8. Why are the Controls Important? • Cyber security is complex and becoming even more complicated every day • Organizations are being compromised, even after spending large portions of their budget on infosec • CIOs & CISOs need prioritized controls to get the most return from their investment • More controls rarely hurt, but how do we decide which controls to start with? • It’s critical that we have priorities! The Consensus Audit Guidelines © Enclave Security 2010
  • 9. Why are the Controls Important? (2) • We need agreement between: – Inspector Generals (IGs – auditors) – Operations (sys-admins) – Security Engineers • We need metrics and measurements that everyone can agree to use • We need to stop people from violating systems & compromising the C-I-A of our data The Consensus Audit Guidelines © Enclave Security 2010
  • 10. Categories of Sub-Controls • Quick Wins (QW) • Improved Visibility and Attribution (Vis/Attrib) • Hardened Configuration and Improved Information Security Hygiene (Config/Hygiene) • Advanced (Adv) The Consensus Audit Guidelines © Enclave Security 2010
  • 11. Document Contributors • Blue team members inside the Department of Defense • Blue team members who provide services for non-DoD government agencies • Red & blue teams at the US National Security Agency • US-CERT and other non-military incident response teams • DoD Cyber Crime Center (DC3) • Military investigators who fight cyber crime • The FBI and other police organizations • US Department of Energy laboratories The Consensus Audit Guidelines © Enclave Security 2010
  • 12. Document Contributors (2) • US Department of State • Army Research Laboratory • US Department of Homeland Security • DoD and private forensics experts • Red team members in DoD • The SANS Institute • Civilian penetration testers • Federal CIOs and CISOs • Plus over 100 other collaborators The Consensus Audit Guidelines © Enclave Security 2010
  • 13. Revision History • Version 1.0 – Original rough draft of controls • Version 2.0 – Major revision of sub controls based on community & agency feedback • Version 2.1 – Minor revision of sub controls based on community & agency feedback • Version 2.3 – Addition of metrics & core evaluation methodologies • Version 3.0 – Minor revision of sub controls & addition of standards mappings & sensors • Version 3.1 – Reordering of controls based on priority of controls Recent Changes to the 20 Critical Controls © Enclave Security 2011
  • 14. Updates to Version 3.0 In this version the following updates were performed: – Minor updates to sub controls based on threat assessments & feedback – Re-classification of controls – Addition of mappings to additional standards (Australian DSD, NSA MNP & ISO 27000) – Addition of sensors for automated data collection Recent Changes to the 20 Critical Controls © Enclave Security 2011
  • 15. Edits to Sub Controls • A number of controls were either added or removed from the controls based on current threats • For example: – “All remote administration of servers, workstation, network devices, and similar equipment shall be done over secure channels (control 3).” – “Network-based IPS devices should be deployed to compliment IDS by blocking known bad signature or behavior of attacks (control 5).” Recent Changes to the 20 Critical Controls © Enclave Security 2011
  • 16. Re-Classification of Controls • In addition to new or edited sub controls, many of the controls were re-classified • In most cases controls were lowered from “Advanced” to “Config-Hygiene” or “Vis- Attrib” • For example in Control 6: – “Organizations should deploy a SEIM system tool for log aggregation and consolidation from multiple machines and for log correlation and analysis.” Recent Changes to the 20 Critical Controls © Enclave Security 2011
  • 17. Addition of “Sensors” • Sensors = Tools to measure the effectiveness of the implementation of a control • For example in Control 3: – Sensor: File integrity software – Measurement: File integrity monitoring software is deployed on servers as a part of the base configuration. Centralized solutions are preferred over stand-alone solutions. – Score: 50 percent awarded for using a solution with a central monitoring/reporting component. The remaining 50 percent is based on the percentage of servers on which the solution is deployed. Recent Changes to the 20 Critical Controls © Enclave Security 2011
  • 18. US Dept of State iPost • Used to protect OpenNet, the DoS Sensitive But Unclassified (SBU) network • Consists of 5,000 routers and switches, and more than 40,000 hosts • The Risk Scoring program at DoS evolved in three separate stages. – Deployment of Enterprise management tools – Delivery of operational data to the field in an integrated application, iPost – Establishment of a risk scoring program The Consensus Audit Guidelines © Enclave Security 2010
  • 19. Sample iPost Reporting Recent Changes to the 20 Critical Controls © Enclave Security 2011
  • 20. iPost Data Feeds Recent Changes to the 20 Critical Controls © Enclave Security 2011
  • 21. Additional Standards Mapping • In version 3.0 and later additional mappings were added between the 20 CC and other industry or government standards • Specifically now the control are mapped to: – NIST 800-53 – US NSA Manageable Network Plan (MNP) – Australian DSD Top 35 Mitigation Strategies – ISO 27000 Series Recent Changes to the 20 Critical Controls © Enclave Security 2011
  • 22. Updates to Version 3.1 • In this version the following updates were performed: – A great deal of feedback on the controls was gathered on the experiences of the Australian DSD – The 20 Controls were reordered based on priorities, value of each control & risk levels Recent Changes to the 20 Critical Controls © Enclave Security 2011
  • 23. Australian Top 35 • Australian Top 35 Mitigation Strategies, Australian Department of Defence • Defensive controls to block over 85% of attacks directed against their systems • The Top 35 Mitigation Strategies are ranked in order of overall effectiveness • Rankings are based on DSD’s analysis of reported security incidents and vulnerabilities detected by DSD http://www.dsd.gov.au/infosec/top35mitigationstrategies.htm Recent Changes to the 20 Critical Controls © Enclave Security 2011
  • 24. New Prioritized Control Order 1. Inventory of Authorized 6. Application Software and Unauthorized Devices Security 2. Inventory of Authorized 7. Wireless Device Control and Unauthorized 8. Data Recovery Capability Software (validated manually) 3. Secure Configurations for 9. Security Skills Assessment Hardware and Software on and Appropriate Training Laptops, Workstations, to Fill Gaps (validated and Servers manually) 4. Continuous Vulnerability 10. Secure Configurations for Assessment and Network Devices such as Remediation Firewalls, Routers, and 5. Malware Defenses Switches Recent Changes to the 20 Critical Controls © Enclave Security 2011
  • 25. New Prioritized Control Order (2) 11. Limitation and Control of 16. Account Monitoring and Network Ports, Protocols, Control and Services 17. Data Loss Prevention 12. Controlled Use of 18. Incident Response Administrative Privileges Capability (validated 13. Boundary Defense manually) 14. Maintenance, Monitoring, 19. Secure Network and Analysis of Security Engineering (validated Audit Logs manually) 15. Controlled Access Based on 20. Penetration Tests and Red the Need to Know Team Exercises (validated manually) Recent Changes to the 20 Critical Controls © Enclave Security 2011
  • 26. Other Projects to Watch • Security Content Automation Protocol (SCAP) • Continuous Monitoring Efforts – NASA – CyberScope & FISMA Reporting – US Office of Management & Budget (OMB) • International Government Efforts – United Arab Emirates (UAE) – European Union – Australian Department of Defence Recent Changes to the 20 Critical Controls © Enclave Security 2011
  • 27. In Summary • There have been numerous changes to the controls, but the philosophies remain the same • Regardless if you follow the 20 CC, each organization needs a strategy for defense • Be aware of the changing threat landscape and have a plan for preventing future attacks • Organizations need to set priorities for system and data defense, this is one good option • Watch for more changes to come Recent Changes to the 20 Critical Controls © Enclave Security 2011
  • 28. Further Questions • James Tarala – E-mail: james.tarala@enclavesecurity.com – Twitter: @isaudit, @jamestarala – Blog: http://www.enclavesecurity.com/blogs/ • Resources for further study: – The 20 Critical Controls: (http://www.sans.org/critical-security-controls/) – SANS Security 566: Implementing and Auditing the Twenty Critical Security Controls - In-Depth Recent Changes to the 20 Critical Controls © Enclave Security 2011

Hinweis der Redaktion

  1. The SANS Institute, in collaboration with the Center for Strategic and International Studies (CSIS) have recently released updates to the 20 Critical Controls / Consensus Audit Guidelines. These updates are based on industry changes and new attack signatures which have been collected over the previous 18 months from those directly involved on the front lines of stopping targeted cyber-attacks. This presentation will share details on the changes to the most recent version of the controls and share insights into the development of the controls, future evolutions, along with practical tips collected from organizations actively involved in implementing these controls.