12
Tony Sager, the Center for Internet Security Making Best Practice Common Practice: the CIS Controls

Making Best Practice Common Practice: the CIS Controls › wp-content › uploads › 2016 › ... · 2016-10-26 · DLP threat feed certification best practiceassessment governance

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Making Best Practice Common Practice: the CIS Controls › wp-content › uploads › 2016 › ... · 2016-10-26 · DLP threat feed certification best practiceassessment governance

Tony Sager, the Center for Internet Security

Making Best Practice Common Practice: the CIS Controls

Page 2: Making Best Practice Common Practice: the CIS Controls › wp-content › uploads › 2016 › ... · 2016-10-26 · DLP threat feed certification best practiceassessment governance

TheLongandWindingRoad….

Page 3: Making Best Practice Common Practice: the CIS Controls › wp-content › uploads › 2016 › ... · 2016-10-26 · DLP threat feed certification best practiceassessment governance

SeismicShi:s

•  Communica=onsSecurityà“Cyber”•  Mathema=csàCS,Networking,OpsAnaly=cs•  TechnologyàInforma=on,Opera=ons•  Governmentmonopolyàuser/marketdriven•  Na=onalSecurityàeconomic/socialRisk

Page 4: Making Best Practice Common Practice: the CIS Controls › wp-content › uploads › 2016 › ... · 2016-10-26 · DLP threat feed certification best practiceassessment governance

Afewcybersecuritylessons

•  Cybersecurityislike“GroundhogDay”,not“IndependenceDay”

•  Knowingaboutflawsdoesn’tgetthemfixed•  CyberDefense==Informa=onManagement

–  notInforma=onSharing,nottechnology–  themostimportantverbistranslate

•  TheBadGuydoesn’tperformmagic•  There’salargebutlimitednumberofdefensivechoices

–  priori=za=onisALWAYSrequired–  andthe80/20ruleapplies(TheParetoPrinciple)

Page 5: Making Best Practice Common Practice: the CIS Controls › wp-content › uploads › 2016 › ... · 2016-10-26 · DLP threat feed certification best practiceassessment governance

“The ”

standards SDL

supply-chain security

securitybulletinsuser awareness training

browser isolationtwo-factor authentication

encryption

incident response

security controls

threat intelligence

whitelistingneed-to-know

SIEMvirtualizationsandbox

compliance

maturity model

anti-malware

penetration testing

audit logs

baseline configuration

risk management framework

continuous monitoring

DLP

threat feed

certification

assessmentbest practice

governance

Page 6: Making Best Practice Common Practice: the CIS Controls › wp-content › uploads › 2016 › ... · 2016-10-26 · DLP threat feed certification best practiceassessment governance

TheDefender’sDilemma

1.  What’stherightthingtodo,andhowmuchdoIneedtodo?2.  HowdoIactuallydoit?3.  AndhowcanIdemonstratetoothersthatIhavedonethe

rightthing?

Page 7: Making Best Practice Common Practice: the CIS Controls › wp-content › uploads › 2016 › ... · 2016-10-26 · DLP threat feed certification best practiceassessment governance

fromBestPrac=ceàCommonPrac=ce

•  Howdoweknowwhatis“best”?–  BasedonData?Solu=ontotheworstproblem?Trustedsource?

•  Whatisa“prac=ce”?–  Howspecific?HowdoIactuallydoit?WhatdoIneedtodothis?

•  Whatarethebarriers?–  Knowledge?Cost?Tools?Training?Enforcement?Misalignment?

Repeatability?

•  Ittakesmorethanalistofprac=ces–  Marketplaceoftools,training;community-building;sharingofideas;

alignmentofprac=ceswithoversight,audi=ng,compliance.

Page 8: Making Best Practice Common Practice: the CIS Controls › wp-content › uploads › 2016 › ... · 2016-10-26 · DLP threat feed certification best practiceassessment governance

Howdidwegethere?

NSA/DoDProject(2008)

TheSANSIns=tute(2009)“TheSANSTop20Cri=calControls”

CouncilonCyberSecurity(2013;non-profit)“TheCri=calSecurityControls”

CenterforInternetSecurity(2015)“TheCISControls”

CenterforStrategicandInterna=onalStudies(2008)“TheConsensusAuditGuidelines”

Page 9: Making Best Practice Common Practice: the CIS Controls › wp-content › uploads › 2016 › ... · 2016-10-26 · DLP threat feed certification best practiceassessment governance

CISCri=calSecurityControls(Version6)

Page 10: Making Best Practice Common Practice: the CIS Controls › wp-content › uploads › 2016 › ... · 2016-10-26 · DLP threat feed certification best practiceassessment governance

RecentReferencestotheCISControls•  CaliforniaAiorneyGeneral’s2016DataBreachReport•  TheNISTCybersecurityFramework•  Symantec2016InternetSecurityThreatReport

–  andVerizonDBIR,HP,PaloAlto,Solu=onary…)•  Na=onalGovernor’sAssocia=on•  Na=onalConsor=umforAdvancedPolicing•  ConferenceofStateBankSupervisors•  ZurichInsurance•  UKCri=calProtec=onforNa=onalInfrastructure•  ENISA,ETSI

Page 11: Making Best Practice Common Practice: the CIS Controls › wp-content › uploads › 2016 › ... · 2016-10-26 · DLP threat feed certification best practiceassessment governance

MakingBestPrac>ceCommonPrac>ce

TheCenterforInternetSecurity

Page 12: Making Best Practice Common Practice: the CIS Controls › wp-content › uploads › 2016 › ... · 2016-10-26 · DLP threat feed certification best practiceassessment governance

Contact•  Website:www.cisecurity.org•  Email: [email protected]•  Twiier: @CISecurity•  Facebook: CenterforInternetSecurity•  LinkedInGroups:

•  TheCenterforInternetSecurity•  20Cri=calSecurityControls