Top 5 CIS Controls to Reduce 85% of Cybersecurity Risks in Your Organization

Mar 20, 2023

 Cybersecurity is a critical issue that every organization needs to address. A cyber attack can cause severe damage to a company's reputation, financial losses, and legal consequences. This article will discuss the top 5 CIS (Center for Internet Security) controls that can help reduce 85% of cybersecurity risks in your organization.

Introduction

Organizations must secure their systems and data with the increasing frequency of cyber attacks. The CIS Controls are a set of guidelines developed by the Center for Internet Security to help organizations improve their cybersecurity posture. These controls are a set of actions that can be taken to protect against the most common cybersecurity threats.

1. Inventory and Control of Hardware Assets

The first CIS Control is maintaining an inventory of all hardware assets within the organization's network. This includes all devices such as desktops, laptops, servers, and mobile devices. The inventory should include information such as the device's location, operating system, and patch level. Organizations can ensure that all devices are authorized and updated with security patches by maintaining an inventory.

Benefits of Inventory and Control of Hardware Assets

Helps organizations keep track of their devices and ensure all are authorized

Enables organizations to maintain the security of all devices by ensuring they are up to date with security patches

Helps organizations quickly identify and respond to any unauthorized devices on their network

2. Inventory and Control of Software Assets

The second CIS Control is maintaining an inventory of all software assets within the organization's network. This includes all software applications and operating systems installed on devices within the network. The inventory should include the software version, vendor, and patch-level information. By maintaining an inventory of software assets, organizations can ensure that all software is authorized, up-to-date, and secure.

Benefits of Inventory and Control of Software Assets

Helps organizations keep track of their software and ensure all is authorized

Enables organizations to maintain the security of all software by ensuring it is up to date with security patches

Helps organizations quickly identify and respond to any unauthorized software on their network

3. Continuous Vulnerability Management

The third CIS Control is to assess continuously and remediate vulnerabilities within the organization's network. This includes conducting regular vulnerability assessments and penetration testing. By continuously assessing vulnerabilities, organizations can identify and remediate them before they are exploited by attackers.

Benefits of Continuous Vulnerability Management

Helps organizations identify vulnerabilities before they are exploited

Enables organizations to remediate vulnerabilities before they cause harm

Helps organizations maintain a proactive approach to cybersecurity

4. Controlled Use of Administrative Privileges

The fourth CIS Control controls the use of administrative privileges within the organization's network. This includes limiting access to administrative privileges to only authorized personnel and monitoring the use of these privileges. By controlling the use of administrative privileges, organizations can limit the risk of unauthorized access to critical systems and data.

Benefits of Controlled Use of Administrative Privileges

Helps organizations limit the risk of unauthorized access to critical systems and data

Enables organizations to maintain the integrity of their systems and data

Helps organizations maintain a proactive approach to cybersecurity

5. Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers

The fifth CIS Control is to ensure that all hardware and software on mobile devices, laptops, workstations, and servers are securely configured. This includes configuring devices to follow security best practices and disabling unnecessary features and services. Organizations can limit the risk of unauthorized access and data loss by ensuring that all devices are securely configured.

Benefits of Secure Configuration for Hardware and Software

Helps organizations limit the risk

THE CYBER RISK NEWSLETTER

Want Helpful Cyber Risk Tips Every Week?

 

You're safe with me. I'll never spam you or sell your contact info.