📜 ⬆️ ⬇️

CIS Controls V7: Information Security Recommendations



The Internet Security Center (CIS) is a non-profit organization that develops its own benchmarks and recommendations that allow organizations to improve their security and compliance programs. This initiative aims to create basic levels of system security configuration, which are commonly found in all organizations.

The center presented a new version of the information security guide CIS Controls Version 7, which includes 20 recommendations for the protection of IT infrastructure.

Key principles


The development of recommendations is based on 7 key principles to ensure reliable results, using the best practices of the global IT community and recommendations of the PCI, NIST, ISO and HIPAA methodologies:
')

Description CIS Controls


Describing critical elements of security management includes comprehensive checks of IT infrastructure elements, configurations, access rights, privileges, system logs, incident response measures and means, and the initiation of checks.

In the 7th edition of the manual, the elements are divided into three categories, taking into account the modern landscape of cyber threats.
image

Basic


This category contains recommendations necessary to ensure the information security of the organization. This category includes the following items:


Fundamental


This category includes recommendations necessary to apply best practices to ensure the benefits and use of advanced cyber security technologies. This category includes the following items:


Organizational


This category includes recommendations focused on organizational processes and administrative measures related to information security, in order to increase staff awareness and conduct Red Team / Blue Team operations. This category includes the following items:




These recommendations allow you to create clear and priority guidelines for solving the tasks of ensuring the information security of the organization and can be used as the basis of information security policies.

Source: https://habr.com/ru/post/351872/


All Articles