There’s Even More Reason to Leverage the CIS Controls for Security

cyber security

Written by Dan Callahan

I'm the VP of Global Services at CGNET. I manage our Cybersecurity and Cloud Services businesses. I also provide consulting and handle a lot of project management. I wear a lot of hats. Professionally, I'm a builder of businesses. Outside of work, I'm a hobby farmer, chef, skier, dog walker, jokester, woodworker, structuralist, husband and father.

August 6, 2020

cyber security

Written by Dan Callahan

I'm the VP of Global Services at CGNET. I manage our Cybersecurity and Cloud Services businesses. I also provide consulting and handle a lot of project management. I wear a lot of hats. Professionally, I'm a builder of businesses. Outside of work, I'm a hobby farmer, chef, skier, dog walker, jokester, woodworker, structuralist, husband and father.

August 6, 2020

Here at CGNET we’re big fans of the Center for Internet Security (CIS) and their CIS Controls. As we wrote here, organizations can leverage the CIS Controls to construct a right-sized security program. But wait! There’s more! (as they say in the infomercials). Organizations that leverage the CIS Controls that CIS considers “basic cyber hygiene”

  1. Provide defense against 62% of the techniques identified in the MITRE ATT&CK Framework
  2. Provide defense against the top five attack patterns identified in the Verizon 2019 Data Breach Incident Report

Don’t take my word for it. CIS said this in a blog post. In other words, if you leverage the CIS Controls, even at just the basic level, you’ve set up a pretty solid security posture for your organization. OK. So how do you do it? Grab some popcorn and read on. (Side note: you’ll have to make your own. Free popcorn has been killed by the coronavirus pandemic.)

CIS Controls Start with Questions. Lots of Questions.

At CGNET, we start the process of leveraging the CIS Controls with a questionnaire. It’s a l o n g document; over a hundred questions. And not all the questions are of the “yes/no” variety. Here are some sample questions, from a section on application development.

  • What secure coding practices do your developers employ?
  • What explicit error checking is performed and documented?
  • Do you ensure that all acquired software is still supported?

We tailor the questions to the customer’s situation. Once that is done, we get together with the customer to fill in the answers. Some questions are easy to answer. But others prompt other questions. So, we find it’s best to complete the questionnaire together with the customer.

Next Comes the Analysis

Once we have gathered the answers, we get to analyze the responses. Sometimes it’s easy. If the question is “do you have…” and you don’t, then the way to leverage the CIS Controls is to go get … With other answers, we must look at the context of the answer. For instance, one customer told us they didn’t want to tell their design agency what secure coding practices to employ. Rather, the customer said they wanted to specify an outcome (secure software) and leave it to the design agency to deliver. Makes sense to me.

Don’t Plan to Leverage the CIS Controls Completely

As someone said on a recent security panel, “security is a journey, not a destination”. What does this mean?

  • You don’t live in a quantum state of either security or insecurity. You live in a state of more (or less) security.
  • Whatever destination you set for yourself will only be temporary. You don’t arrive at “secure!” and then get to forget about security.
  • You ultimately make security decisions based on relative cost and benefit. Do I need to spend that next $10,000 so I can achieve 4% more security? At some point, you decide that the organization is sufficiently secure.

With these points in mind, we look at the list of recommended actions and adapt it for the organization. Before we can leverage the CIS Controls, we must assign the customer to a CIS “Implementation Group”. CIS defines three of these.

  • Implementation Group 1 is considered “basic cyber hygiene”. Organizations in this group have “limited resources and cybersecurity expertise”.
  • Implementation Group 2 organizations have “moderate resources and cybersecurity expertise”.
  • Implementation Group 2 organizations have “extensive resources and cybersecurity expertise”.

It’s OK to mix and match recommendations applicable to different Implementation Groups.

Now We’re Ready to Leverage the CIS Controls

We now have recommended actions that are sized to match the resources of the organization. From here, we put together a roadmap for the actions. We like to prioritize them based on estimated impact and implementation complexity. The idea is to first leverage the CIS Controls that provide the greatest benefit for the lowest investment. We typically spread these roadmaps out over two or three years. You can read another post about our process here.

This Road will Take You There

(With apologies to the Staple Sisters). You know the saying: “if you don’t know where you’re going, any road will take you there”. Well, this work to leverage the CIS Controls shows you the road you want to take. You may have substantial work still ahead of you as you leverage the CIS Controls. But at least you know you’re headed in the right direction.

You May Also Like…

Leverage the Cloud for Security 

Leverage the Cloud for Security 

We had it all wrong. When Salesforce and other SaaS (software as a service) services hit the market, we pundits talked...

You May Also Like…

Leverage the Cloud for Security 

Leverage the Cloud for Security 

We had it all wrong. When Salesforce and other SaaS (software as a service) services hit the market, we pundits talked...

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

Translate »
Share This
Subscribe