20 Critical Security Controls

Twenty Critical Security Controls for Effective Cyber Defense: Consensus Audit Guidelines

The Twenty Critical Security Controls have already begun to transform security in government agencies and other large enterprises by focusing their spending on the key controls that block known attacks and find the ones that get through. With the change in FISMA reporting implemented on June 1, the 20 Critical Controls become the centerpiece of effective security programs across government These controls allow those responsible for compliance and those responsible for security to agree, for the first time, on what needs to be done to make systems safer. No development in security is having a more profound and far reaching impact.

These Top 20 Controls were agreed upon by a powerful consortium brought together by John Gilligan (previously CIO of the US Department of Energy and the US Air Force) under the auspices of the Center for Strategic and International Studies. Members of the Consortium include NSA, US Cert, DoD JTF-GNO, the Department of Energy Nuclear Laboratories, Department of State, DoD Cyber Crime Center plus the top commercial forensics experts and pen testers that serve the banking and critical infrastructure communities.

The automation of these Top 20 Controls will radically lower the cost of security while improving its effectiveness. The US State Department, under CISO John Streufert, has already demonstrated more than 94% reduction in “measured” security risk through the rigorous automation and measurement of the Top 20 Controls.

20 Critical Security Controls – Version 3.1

  1. Critical Control 1: Inventory of Authorized and Unauthorized Devices
  2. Critical Control 2: Inventory of Authorized and Unauthorized Software
  3. Critical Control 3: Secure Configurations for Hardware and Software on Laptops, Workstations, and Servers
  4. Critical Control 4: Continuous Vulnerability Assessment and Remediation
  5. Critical Control 5: Malware Defenses
  6. Critical Control 6: Application Software Security
  7. Critical Control 7: Wireless Device Control
  8. Critical Control 8: Data Recovery Capability
  9. Critical Control 9: Security Skills Assessment and Appropriate Training to Fill Gaps
  10. Critical Control 10: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches
  11. Critical Control 11: Limitation and Control of Network Ports, Protocols, and Services
  12. Critical Control 12: Controlled Use of Administrative Privileges
  13. Critical Control 13: Boundary Defense
  14. Critical Control 14: Maintenance, Monitoring, and Analysis of Security Audit Logs
  15. Critical Control 15: Controlled Access Based on the Need to Know
  16. Critical Control 16: Account Monitoring and Control
  17. Critical Control 17: Data Loss Prevention
  18. Critical Control 18: Incident Response Capability
  19. Critical Control 19: Secure Network Engineering
  20. Critical Control 20: Penetration Tests and Red Team Exercises

by http://www.sans.org

Advertisements

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s