Implementing and Auditing the Critical Controls

Slides:



Advertisements
Similar presentations
NERC Security Requirements – What Vendors Should Provide James W. Sample, CISSP, CISM Manager of Information Security California ISO.
Advertisements

David A. Brown Chief Information Security Officer State of Ohio
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 4 1 Chapter 12: Advanced Troubleshooting IT Essentials v5.0.
Solving the CIO’s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense John M. Gilligan National Summit on.
Information Technology Audit Process Business Practices Seminar Paul Toffenetti, CISA Internal Audit 29 February 2008.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
VULNERABILITY MANAGEMENT Moving Away from the Compliance Checkbox Towards Continuous Discovery.
Cyber Security for Smart Grid George Gamble Cyber Security Architect Black & Veatch.
Reconnaissance & Enumeration Baseline, Monitor, Detect, Analyze, Respond, & Recover Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009 Santiago,
Audit – Proof Information System Security Controls Wednesday, August 18, 2010 John R. Robles Tel:
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
Security Management prepared by Dean Hipwell, CISSP
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
E-Security: 10 Steps to Protect Your School’s Network NEN – the education network.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Continuous Monitoring: Diagnostics & Mitigation October 24, 2012.
Big Data Bijan Barikbin Denisa Teme Matthew Joseph.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Module 11: Designing Security for Network Perimeters.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Lecture 19 Page 1 CS 236 Online Securing Your System CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Project Success Factors when using System Development Life Cycle IT Symposium October 2015 By Edward M. Dennis.
Cybersecurity Presented by Charles Brookson OBE CEng FIET FRSA
Critical Security Controls & Effective Cyber Defense Hasain “The Wolf”
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Information Security tools for records managers Frank Rankin.
Applying the CIS Critical Security Controls to the Cloud
Best Cyber Security Practices for Counties An introduction to cybersecurity framework.
CompTIA Security+ Certification Exam SY COMPTIA SECURITY+SY0-401 Q&A is a straight forward,efficient,and effective method of preparing for the new.
Kevin Watson and Ammar Ammar IT Asset Visibility.
Common Network Penetration Testing Techniques Russel Van Tuyl.
WIRELESS GATEWAYS FOR HOME USE AND ENTERPRISE USE NOR HANANI BINTI SAHARUDIN TSK 1.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Douglas DiJulio Director – Enterprise Operations Application Support Cyber Security.
Defining your requirements for a successful security (and compliance
Brian Ventura SANS Community Instructor
Enhancing Network Security
Your Partner for Superior Cybersecurity
Your security risk is higher than ever.
The Cybersecurity Framework
Cybersecurity - What’s Next? June 2017
Critical Security Controls
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Security Standard: “reasonable security”
Secure Software Confidentiality Integrity Data Security Authentication
Putting It All Together
Putting It All Together
Leverage What’s Out There
Cyber Protections: First Step, Risk Assessment
Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009
NYBA 2017 Technology, Compliance &
5G Security Training
I have many checklists: how do I get started with cyber security?
Cybersecurity Presented by Charles Brookson OBE CEng FIET FRSA
IS4680 Security Auditing for Compliance
Shifting from “Incident” to “Continuous” Response
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
National Cyber Security
How to Mitigate the Consequences What are the Countermeasures?
Security week 1 Introductions Class website Syllabus review
Cybersecurity Threat Assessment
16. Account Monitoring and Control
November 30, 2017 By: Richard D. Condello NRECA Senior Director
6. Application Software Security
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

Implementing and Auditing the Critical Controls February 13, 2018 ISACA NTX / Fort Worth IIA Clay Risenhoover, CPA.CITP, CISA, CISM, CISSP

Copyright © 2018 Risenhoover Consulting, Inc. Agenda History of the Controls Philosophy Overview Grouping / Implementation Order Audit Techniques Additional Resources Copyright © 2018 Risenhoover Consulting, Inc.

History of the Critical Security Controls 2008/9 – NSA / SANS Institute (SANS Top 20/Consensus Audit Guideline) 2013 – Transferred to Council on Cyber Security 2014 – Version 5 2015 – Permanent (?) home at Center for Internet Security 2015 (Oct) – Version 6.0 2016 (Aug) – Version 6.1 – refinement of 6.0, same ordering 2018 – Version 7 – In draft for release soon (more later) Copyright © 2018 Risenhoover Consulting, Inc.

Philosophy Behind the Controls “Offense informs defense” – Analysis of real-world attacks “Prioritization” – Best bang for the buck “Metrics” – Common metrics for controls “Continuous diagnostics and mitigation” – Designed with continuous measurement in mind “Automation” – to enhance scalability Copyright © 2018 Risenhoover Consulting, Inc.

Overview of the Critical Security Controls Really a set of 20 control groups Listed in recommended implementation order May not always be 20 Three distinct groups; may allow for parallel implementation Copyright © 2018 Risenhoover Consulting, Inc.

Controls 1-10: Cyber Hygiene Inventory of Authorized and Unauthorized Devices Inventory of Authorized and Unauthorized Software Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers Continuous Vulnerability Assessment and Remediation Controlled Use of Administrative Privileges Copyright © 2018 Risenhoover Consulting, Inc.

Controls 1-10: Cyber Hygiene (2) Maintenance, Monitoring, and Analysis of Audit Logs Email and Web Browser Protections Malware Defenses Limitation and Control of Network Ports, Protocols, and Services Data Recovery Capability Copyright © 2018 Risenhoover Consulting, Inc.

Controls 11-16: Networking/Infrastructure Secure Configurations for Network Devices such as Firewalls, Routers, and Switches Boundary Defense Data Protection Controlled Access Based on the Need to Know Wireless Access Control Account Monitoring and Control Copyright © 2018 Risenhoover Consulting, Inc.

Copyright © 2018 Risenhoover Consulting, Inc. Observations Note the lack of verbs: “Inventory of Authorized and Unauthorized Devices” Sub-controls contain the finer details – and the verbs Each sub-control is marked as foundational or advanced: Foundational: Essential Less expensive Easier to implement Advanced: Newer technology More difficult More expensive Copyright © 2018 Risenhoover Consulting, Inc.

Why Foundational and Advanced? Copyright © 2018 Risenhoover Consulting, Inc.

Copyright © 2018 Risenhoover Consulting, Inc. Example – Control 1 Copyright © 2018 Risenhoover Consulting, Inc.

Copyright © 2018 Risenhoover Consulting, Inc. Example – Control 1 (2) Copyright © 2018 Risenhoover Consulting, Inc.

Copyright © 2018 Risenhoover Consulting, Inc. Example – Control 1 (3) Copyright © 2018 Risenhoover Consulting, Inc.

Entity Relationship Diagrams Copyright © 2018 Risenhoover Consulting, Inc.

Controls 17-20: Application (Program / Governance) Security Skills Assessment and Appropriate Training to Fill Gaps Application Software Security Incident Response and Management Penetration Tests and Red Team Exercises Copyright © 2018 Risenhoover Consulting, Inc.

Copyright © 2018 Risenhoover Consulting, Inc. Example – Control 19 Copyright © 2018 Risenhoover Consulting, Inc.

Copyright © 2018 Risenhoover Consulting, Inc. Auditing the Controls Sub-controls make a basic work program by themselves Structure lends itself to time and percentage-based measurements Measurement companion gives target metrics Maturity Progression: Approved Policy -> Implementation -> Automation -> Reporting Copyright © 2018 Risenhoover Consulting, Inc.

Extra Resource: Measurement Companion Copyright © 2018 Risenhoover Consulting, Inc.

Extra Resource: AuditScripts Initial Assessment Copyright © 2018 Risenhoover Consulting, Inc.

Extra Resource: AuditScripts Master Mapping Copyright © 2018 Risenhoover Consulting, Inc.

CSC Version 7 – In Draft Now Couple of controls renamed Some reordering compared to version 6 Version 6 Version 7 Draft 3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers 3: Continuous Vulnerability Assessment and Remediation 4: Continuous Vulnerability Assessment and Remediation 4. Controlled Use of Administrative Privileges 5: Controlled Use of Administrative Privileges 5: Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers Copyright © 2018 Risenhoover Consulting, Inc.

CSC Version 7 – Controls 17-20 May be handled differently Remove sub-controls, replace with principles of effective program Link to other organizations/standards (i.e. OWASP for 18. Application Software Security) Copyright © 2018 Risenhoover Consulting, Inc.

Copyright © 2018 Risenhoover Consulting, Inc. Useful Resources Center for Internet Security https://www.cisecurity.org/ https://www.cisecurity.org/white-papers/a-measurement-companion-to-the-cis-critical- controls/ AuditScripts free resources https://www.auditscripts.com/ https://www.auditscripts.com/free-resources/critical-security-controls/ SANS poster https://www.sans.org/security-resources/posters/leadership/20-critical-security- controls-55 California Attorney General 2016 data breach report https://oag.ca.gov/sites/all/files/agweb/pdfs/dbr/2016-data-breach-report.pdf Copyright © 2018 Risenhoover Consulting, Inc.