ISC S1 Overview of CIS Control 01-18

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/97

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

98 Terms

1
New cards

CIS Control 01 - Goal

Track and manage IT assets connected to infrastructure, physically or virtually.

2
New cards

CIS Control 01 - Importance of Tracking IT Assets

To know the totality of assets, which should be monitored and protected.

3
New cards

CIS Control 01 - Tool for Tracking Assets

A simple IT inventory list tracking various data points.

4
New cards

CIS Control 01 - Handling Sensitive Data

Know which device has sensitive info for closer monitoring.

5
New cards

CIS Control 01 - Guest/Third-Party Access

Properly secure or terminate guest/third-party access/networks.

6
New cards

CIS Control 02 - Main Focus

Inventory and control of software assets like OS and applications.

7
New cards

CIS Control 02 - Unauthorized Software

Use policies and whitelisting to approve only authorized software.

8
New cards

CIS Control 02 - Regular Verification

Ensure the most current software is installed and old apps are renewed/removed.

9
New cards

CIS Control 03 - Goal

Securely manage data from start to end.

10
New cards

CIS Control 03 - Data Handling

Identify, archive, label, and classify data.

11
New cards

CIS Control 03 - Types of Classification

Public, internal, sensitive, confidential.

12
New cards

CIS Control 03 - Mapping Sensitive Data

To identify the software that accesses these types of data.

13
New cards

CIS Control 03 - Policy Requirements

Data retention, usage, and disposal guidelines.

14
New cards

CIS Control 03 - Data Security

Use encryption for data at rest and in transit.

15
New cards

CIS Control 04 - Configuration Recommendation

Establish and maintain secure baseline configurations for enterprise assets.

16
New cards

CIS Control 04 - Included Assets

Network devices, mobile/portable devices, IoT, operating systems.

17
New cards

CIS Control 04 - Default Configurations Risk

They may present vulnerabilities that can be exploited.

18
New cards

CIS Control 04 - Reconfiguration Sources

Publicly available security standards.

19
New cards

CIS Control 04 - Security Hardening

Adjusting target configurations continuously to reduce vulnerabilities.

20
New cards

CIS Control 04 - Hardening Actions

Remove unused software, change default passwords, turn off non-essential services.

21
New cards

CIS Control 04 - Supporting Tools

Firewalls, IDS/IPS, DLP systems, MDM software.

22
New cards

CIS Control 04 - Multiple Environments

Use separate baseline configurations for each type/classification level.

23
New cards

CIS Control 04

Continuously monitor for deviations and updates.

24
New cards

CIS Control 05 - Main Focus

Best practices for managing account credentials and authorization.

25
New cards

CIS Control 05 - Inventory Accounts

So appropriate controls can be applied.

26
New cards

CIS Control 05 - Policies to Communicate

Account safety guidelines and password requirements.

27
New cards

CIS Control 05 - Admin Accounts Handling

Restrict usage

28
New cards

separate from regular user accounts.

29
New cards

CIS Control 05 - Additional Protection

Multi-factor authentication (2FA).

30
New cards

CIS Control 06 - Purpose

Ensure users only have access needed for their job roles.

31
New cards

CIS Control 06 - Guiding Principles

Least privilege and need-to-know.

32
New cards

CIS Control 06 - Risks to Reduce

Unauthorized access and security breaches.

33
New cards

CIS Control 06 - Systems to Inventory

Authentication and authorization systems.

34
New cards

CIS Control 06 - Access Control

Access granting and revoking protocols (ARK/separation of duties).

35
New cards

CIS Control 06 - Access Handling During Hiring/Firing

Add/remove access in a timely manner.

36
New cards

CIS Control 07 - Goal

Continuously identify and manage vulnerabilities.

37
New cards

CIS Control 07 - Staying Current on Threats

To defend against known and unknown vulnerabilities.

38
New cards

CIS Control 07 - Zero-Day Exploits

Unknown vulnerabilities with no remediation available.

39
New cards

CIS Control 07 - Handling New Vulnerabilities

Assess and prioritize based on likelihood and impact.

40
New cards

CIS Control 08 - Goal

Collect, alert, review, and retain logs for detecting and recovering from attacks.

41
New cards

CIS Control 08 - System Logs

Record system start/end times, crashes, and restorations.

42
New cards

CIS Control 08 - Audit Logs

Track user actions like logins, file access, and application use.

43
New cards

CIS Control 08 - Importance of Event Logs

Used in legal matters, process improvement, and compliance.

44
New cards

CIS Control 08 - Log Lifecycle

The full log lifecycle from collection to disposal.

45
New cards

CIS Control 09 - Focus

Prevent cybercrime via email and web access.

46
New cards

CIS Control 09 - Risks of Browsers and Email

They allow attackers to reach users directly with malware or scams.

47
New cards

CIS Control 09 - Common Attack Types

Phishing scams targeting executives and others.

48
New cards

CIS Control 09 - Recommended Protections

URL filtering, file type blocking, browser add-on restrictions.

49
New cards

CIS Control 10 - What is the goal of CIS Control 10?

Prevent the installation of malware onto company assets.

50
New cards

CIS Control 10 - What types of malware are mentioned in CIS Control 10?

Viruses, worms, spyware, adware, keyloggers, and ransomware.

51
New cards

CIS Control 10 - How can malware damage an organization per CIS Control 10?

By stealing intellectual property, login credentials, destroying data, or encrypting it for ransom.

52
New cards

CIS Control 10 - What should be done with anti-malware solutions per CIS Control 10?

They should be automated, centrally managed, maintained, and deployed to all potential entry points.

53
New cards

CIS Control 10 - How does CIS Control 10 recommend handling unauthorized downloads?

Security features should prevent the installation of unauthorized downloads.

54
New cards

CIS Control 10 - What is "living off the land" in the context of CIS Control 10?

Attackers use an organization's existing tools against itself to avoid detection.

55
New cards

CIS Control 10 - How do attackers use stolen credentials per CIS Control 10?

Hackers exploit existing tools/applications with stolen credentials to gain access to systems.

56
New cards

CIS Control 11 - What is the purpose of CIS Control 11?

Establish data backup, testing, and restoration processes to recover assets to a pre-incident state.

57
New cards

CIS Control 11 - Why is data recovery essential in CIS Control 11?

Organizational data is critical for conducting business and targeted by ransomware attacks.

58
New cards

CIS Control 11 - What factors can make data unusable, as mentioned in CIS Control 11?

Human error, misconfigurations, and natural events.

59
New cards

CIS Control 11 - What are the best practices for data recovery in CIS Control 11?

Automate backups, use off-site storage, and encrypt backup data.

60
New cards

CIS Control 11 - How often should data recovery functions be tested according to CIS Control 11?

At least once per quarter.

61
New cards

CIS Control 12 - What is the focus of CIS Control 12?

Managing and securing a company's network infrastructure.

62
New cards

CIS Control 12 - What types of network devices are covered in CIS Control 12?

Firewalls, routers, switches, gateways, access points, and physical/virtual devices.

63
New cards

CIS Control 12 - Why must network documentation be kept current in CIS Control 12?

To reflect the organization's network topology and layout accurately.

64
New cards

CIS Control 12 - What should network documentation include according to CIS Control 12?

Critical vendor contact information for timely upgrades or patches.

65
New cards

CIS Control 12 - What should be done with end-of-life network components per CIS Control 12?

Monitor and upgrade them as necessary.

66
New cards

CIS Control 12 - How does CIS Control 12 recommend dealing with insecure default network configurations?

Continuously identify and remediate insecure settings.

67
New cards

CIS Control 12 - What tools help fulfill the requirements of CIS Control 12?

Commercial tools to evaluate network configurations and run sanity checks.

68
New cards

CIS Control 13 - What is the focus of CIS Control 13?

Monitoring and defending a company's network infrastructure.

69
New cards

CIS Control 13 - What is crucial for network defense according to CIS Control 13?

Continuous monitoring and fine-tuning network security.

70
New cards

CIS Control 13 - How can networks be attacked, as described in CIS Control 13?

Through Denial of Service (DoS) attacks and ransomware.

71
New cards

CIS Control 13 - What happens during a DoS attack, as per CIS Control 13?

A perpetrator overloads a network, rendering it useless.

72
New cards

CIS Control 13 - How does ransomware work according to CIS Control 13?

Attackers block access to a company's system and demand payment to regain access.

73
New cards

CIS Control 13 - What tools should be used for monitoring and defense in CIS Control 13?

SIEM, NIPS, NGFW, DLP, and EDR systems.

74
New cards

CIS Control 13 - What role do SOC/NOC centers play in CIS Control 13?

They monitor and defend against security threats in larger organizations or through outsourced MSPs.

75
New cards

CIS Control 14 - What is the goal of CIS Control 14?

Establishing security awareness and training programs to reduce cyber risk.

76
New cards

CIS Control 14 - Why is training important in CIS Control 14?

Uninformed employees are a major security risk to IT systems.

77
New cards

CIS Control 14 - What topics should be covered in CIS Control 14 security training?

Recognizing unusual behavior, social engineering, asset handling, risks of insecure networks.

78
New cards

CIS Control 14 - How often should security training occur according to CIS Control 14?

Training should be more frequent than annual and include current, relevant examples.

79
New cards

CIS Control 14 - What recent events should be discussed in CIS Control 14 training?

Recent data breaches, phishing scams during tax season, and phishing emails about fake rewards.

80
New cards

CIS Control 15 - What does CIS Control 15 address?

The management of third-party service providers that access sensitive data or handle IT functions.

81
New cards

CIS Control 15 - Why is third-party service provider management important in CIS Control 15?

Because third-party services may not meet the same security standards, posing a risk.

82
New cards

CIS Control 15 - What is recommended for evaluating third-party services per CIS Control 15?

Establish a process to oversee the service provider's lifecycle and assess their performance.

83
New cards

CIS Control 15 - How can System Organization Controls (SOC) reports be used in CIS Control 15?

To assess risks and performance of third-party providers.

84
New cards

CIS Control 16 - What is the focus of CIS Control 16?

Application software security during the software development lifecycle.

85
New cards

CIS Control 16 - What types of vulnerabilities are mentioned in CIS Control 16?

Buffer overflows, Cross-Site Scripting (XSS), SQL injections, and race conditions.

86
New cards

CIS Control 16 - When should application security practices be introduced according to CIS Control 16?

As early in the software development lifecycle (SDLC) as possible.

87
New cards

CIS Control 16 - What should be done with third-party software components in CIS Control 16?

Inventory third-party software and ensure it is up-to-date and configured correctly.

88
New cards

CIS Control 16 - How can organizations mitigate risks in Software-as-a-Service (SaaS) platforms per CIS Control 16?

Inquire about security practices and obtain SOC reports to ensure compliance.

89
New cards

CIS Control 16 - What is a bug bounty program in CIS Control 16?

A program where employees are rewarded for identifying flaws in software.

90
New cards

CIS Control 17 - What is the purpose of CIS Control 17?

Establishing an incident response management program to detect, respond, and prepare for cyber-attacks.

91
New cards

CIS Control 17 - Why is incident response important in CIS Control 17?

To comply with laws and regulations like HIPAA and GDPR, and mitigate fines and data breach impacts.

92
New cards

CIS Control 17 - What should an incident response process include per CIS Control 17?

A key contact, response team, and communication plan for notifying impacted parties.

93
New cards

CIS Control 17 - How often should incident response processes be tested in CIS Control 17?

Periodically, to assess effectiveness and identify areas for improvement.

94
New cards

CIS Control 18 - What is the focus of CIS Control 18?

Penetration testing to evaluate cybersecurity defenses through simulated attacks.

95
New cards

CIS Control 18 - How does penetration testing differ from vulnerability testing in CIS Control 18?

Penetration testing attempts to exploit vulnerabilities, while vulnerability testing only identifies them.

96
New cards

CIS Control 18 - What is the process of penetration testing in CIS Control 18?

Discover the environment, scan for vulnerabilities, attempt exploitation, and revise controls.

97
New cards

CIS Control 18 - How often should penetration testing be performed according to CIS Control 18?

At least annually for large organizations with significant cyber risk.

98
New cards

CIS Control 18 - What are "Red Team exercises" in the context of CIS Control 18?

Simulated attacks focusing on specific tactics to test an organization's defenses.