S1 M3 Flashcards
5 CIS design principles
Align
Measurable
Offense informs defense
Focused
Feasible
What are CIS
Recommendations of a set of actions, processes, and best practices which can be implemented to strengthen their cybersecurity defenses
CIS Control 1 - Inventory and Control of Enterprise Assets
Maintaining an asset inventory list showing totality of assets so you know what you needs to be monitored and protected
CIS Control 2 - Inventory and Control of Software Assets
Organizations are to track and actively monitor what software they have so only authorized software may be installed and unauthorized software is deleted
CIS Control 3 - data protection
helps organizations securely manage the entire life cycle of their data
CIS Control 4 - Secure configuration of Enterprise Assets and Software
Helps organizations establish and maintain a secure baseline
CIS Control 5 - Account Management
Helps organizations manage credentials and authorization for user accounts
CIS Control 6 - Access Control Management
Individuals should only have access to privileges required for their role.
Control involves deleting out accounts based on least privilege, granting and revoking access
CIS Control 7 - Continuous Vulnerability Management
Continuously tracking your vulnerabilities so you can identify and eliminate weak points or windows of opportunity
CIS Control 8 - Audit log management
Keeping a log of events so you can be alerted to and recover from cyber attacks
CIS Control 9 - Email and web browser protection
Control provides recommendations on how to detect and protect against cybercrime attempted through email or the internet
Enforce URL filtering
block certain file types
Restrict ability to install add-ons