What Are the 20 CIS Critical Security Controls®?
Most cybersecurity frameworks are excellent for showing compliance but not well suited for prioritizing, measuring and implementing practical IT-security initiatives. To that end, you will need a consensus-based framework - such as the CIS 20 Critical Security Controls® (CIS Compliance) which include detailed practical and prioritized advice exactly on how to implement Cyber Security. The CIS® controls include detailed instructions on what to do, how to measure, how to prioritize and how to audit your Cybersecurity posture.
How Lansweeper Supports CIS® Compliance.
A well-maintained Asset Inventory Database is key in building a more comprehensive security program based on the CIS Critical Security Controls®. The first two controls, Inventory of Hardware Software Assets rely heavily on the Asset Inventory Database. As the CIS® Controls are prioritized, your efforts should be focused on the first 6 controls - also named the Cyber Hygiene Controls or Basic Controls. Lansweeper can be used to support additional controls but as the controls are most effective when implemented in order, so your initial focus should be on the first 6 controls.
CIS® Control #1: Inventory & Control of Hardware Assets
- Incorporate an Active Discovery Solution to identify devices connected to the network and update the Hardware Asset Inventory.
- Maintain an accurate & up-to-date inventory of all technology assets, including all Hardware Assets, whether connected to the network or not.
CIS® Control #2: Inventory & Control of Software Assets
- Incorporate a Software Inventory Solution throughout the organization to automate the documentation of all software on business systems.
- Utilize Application White Listing Technology to ensure that only authorized software is installed on networked assets.
The discovery of hard- and software data plays a critical role in maintaining an up-to-date synopsis of your entire IT estate to protect yourself against cybersecurity attacks. Leveraging that collected network data is a fundamental starting point for implementing security measures across your organization. Besides tackling the first basic controls, Lansweeper also enables you to tackle the remaining 4 Cyber Hygiene Controls (CIS Compliance).
- CIS® Control #3: Continuous Vulnerability Management
- CIS® Control #4: Controlled Use of Administrative Privileges
- CIS® Control #5: Secure Configurations for Hard- and Software
- CIS® Control #6: Maintenance, Monitoring, and Analytics of Audit Logs