Guidelines: Top 20 Cyber security Controls

Specific (actual) attacks that the control stops or mitigates;

Best practices in automating the control (for 15 controls that can be automated);

Tests that can determine whether each control is effectively implemented.

“This is the best example of risk-based security we have ever seen

“The team that was brought together represents the nation’s most complete understanding of the risk faced by our systems. In the past, cyber security was driven by people who had no clue of how the attacks are carried out. They created an illusion of security.

After severe data losses in companies doing business. Very quickly the our experts recognized that the attacks targeting the defense infrastructure were nearly identical to those targeting private and public firms.

Security Controls are a baseline for building onto their overall security model, especially in the areas of wireless device control and application software security.

“Security these days should be considered an evolutionary process”. “As fast as we move to secure networks, the bad guys are moving faster to find new ways to get into our systems.”

The 20 Controls

Following is a list of the 20 controls:

  1. Inventory of Authorized and Unauthorized Hardware.
  2. Inventory of Authorized and Unauthorized Software.
  3. Secure Configurations for Hardware and Software For Which Such Configurations Are Available.
  4. Secure Configurations of Network Devices Such as Firewalls And Routers.
  5. Boundary Defense
  6. Maintenance and Analysis of Complete Security Audit Logs
  7. Application Software Security
  8. Controlled Use of Administrative Privileges
  9. Controlled Access Based On Need to Know
  10. Continuous Vulnerability Testing and Remediation
  11. Dormant Account Monitoring and Control
  12. Anti-Malware Defenses
  13. Limitation and Control of Ports, Protocols and Services
  14. Wireless Device Control
  15. Data Leakage Protection

Additional Critical Controls (not directly supported by automated measurement and validation):

  1. Secure Network Engineering
  2. Red Team Exercises
  3. Incident Response Capability
  4. Assured Data Back-Up
  5. Security Skills Assessment and Training to Fill Gap

Leave a Reply

Your email address will not be published. Required fields are marked *