Qualys Guide Automating Cis 20 Critical Controls
Qualys Guide Automating Cis 20 Critical Controls
CRITICAL
SECURITY
CONTROLS
With Qualys Cloud Platform
2 Qualys Guide to Automating CIS 20 Critical Security Controls
Introduction
The cyber security world is a noisy place. CISOs get bombarded daily
with information, including the latest research studies, threat warnings,
vendor announcements, industry and regulatory mandates, best practice
controls and hacking incident reports.
85% This structured and prioritized set of best practices maps effectively to
most security control frameworks, government regulations, contractual
obligations and industry mandates. Developed and periodically updated
by a global community of experts, the 20 controls are the most
effective and specific set of technical measures available to detect,
prevent, respond, and mitigate damage from the most common to the
most advanced of those attacks, according to the CIS, a non-profit
organization devoted to improving cybersecurity.
How effective are these controls? According to CIS, organizations can cut
TOP 5 CIS CONTROLS their risk of cyber attack by a whopping 85 percent if they just apply the
first five controls, which provide what the organization calls foundational
1 Inventory of cyber hygiene.
authorized and
unauthorized
devices In last years SANS Institute paper Leading Effective Cybersecurity with
the Critical Security Controls, author Wes Whitteker noted that while
2 Inventory of investments in cybersecurity have boomed in recent years, so have the
authorized and
unauthorized number and impact of major data breaches.
software
For Whitteker, this signals an ugly truth: The global cybersecurity problem
3 Secure
configurations is being met with ineffective responses, due to organizations lack of a
for hardware and solid cybersecurity foundation and of a comprehensive understanding and
software on visibility of the information infrastructure.
mobile devices,
laptops,
workstations If the functions that set an organizations cybersecurity foundation
and servers are flawed, it is very likely that the solutions they choose will be flawed,
4 Continuous too, he writes. The CSCs offer a framework that provides the critical
vulnerability visibility needed to aid in strategy development and manage existing
assessment and organizational environments.
remediation
5 Controlled use of Ultimately, organizations that leverage the CSCs to improve their
administrative cybersecurity foundation will move unequivocally towards attaining a
privileges
resilient cybersecurity architecture that is prepared for continuous
improvement and adaptable to the latest cybersecurity threats,
Whitteker writes.
A California Attorney General report from 2016 stated that the CSCs represent a minimum
level of information security that all organizations that collect or maintain personal information
should meet and that failing to implement them constitutes a lack of reasonable security.
The U.S. National Institute of Standards and Technology (NIST) cites the CSCs as one of the
informative references for its Framework for Improving Critical Infrastructure Cybersecurity.
As youll see from this whitepaper, the Qualys Cloud Platform a single, integrated, end-to-end platform
can help security teams of any size to broadly and comprehensively adopt the CIS controls.
Its robust, scalable, and extensible architecture powers Qualys IT security and compliance cloud apps,
giving you a continuous, always-on assessment of your global security and compliance posture, with
instant visibility across all your IT assets, wherever they reside. Qualys solutions can provide in-depth
assessment and validation of all critical security controls and related technologies to ensure that they
are in place, properly configured, and free from vulnerabilities.
CSC #17
Security Skills Assessment and Appropriate
Training to Fill Gaps
Now well take a closer look at all of the controls, and explain how Qualys can help you implement them.
This data is collected using a variety of tools and methods, including Qualys network
scanners and Qualys groundbreaking Cloud Agents. Qualys AI collects detailed
information about assets and their components, and keeps it up to date. It provides
fast searching across these attributes using a powerful search engine, and allows you to
organize the systems, aligning them with their business purpose.
Tap powerful Qualys asset discovery and classification technology to complement the
ServiceNow CMDB, providing detailed data on new and changed IT assets. The data comes
from Qualys AI, which leverages Qualys highly distributed and scalable cloud platform, and
various data collection tools, including Qualys Cloud Agents, to compile and continually
update a full inventory of your IT assets everywhere: on-premises, in elastic clouds and
mobile endpoints.
Qualys Vulnerability Management (VM) and Qualys Policy Compliance (PC) further augment
the inventory data from the AI and SYN apps enabling you to manage and track mandatory
and prohibited software, operating systems and devices. Each app has out-of-the-box
signatures to check detailed requirements, such as specific software details, identification of
out of date/end-of-lifed versions, service status, as
well as patch information for critical software.
CSC 3
Qualys Policy Compliance (PC) is the gold standard for assessing IT security
configurations, letting you continuously reduce risk and comply with internal policies and
external regulations. Qualys PC provides automated technical control assessment across
a wide variety of technologies, including operating systems, network devices, server
applications and databases. With out-of-the-box library content based on industry- and
vendor-recommended best practices, such as the CIS Benchmarks and the Defense
Information Systems Agencys (DISA) Security Technical Implementation Guides (STIGs),
you can fast-track your compliance assessments, or you can customize your control
requirements to suit your unique needs. Qualys PC helps you prevent configuration drift and
meet a variety of regulatory requirements. It provides mandate-based reporting to easily
identify areas of concern ahead of audits while optimizing the data collection process using
your choice of baseline standards.
With PC, you can prioritize and track remediation and exceptions, demonstrating a
repeatable, auditable process for compliance management focused on the most critical
issues first.
Qualys PC enables you to completely address the second of the first five quick wins sub-
controls, which is mentioned above and which requires organizations to establish
and ensure the use of standard secure configurations for operating systems and
software applications.
Qualys Cloud Security Assessment (CSA) provides unparalleled visibility and continuous
security of public cloud infrastructures so you can identify cloud assets, and assess their
configurations against industry best practices from groups like CIS and vendors like
Amazon AWS, Microsoft Azure, and Google Cloud. As part of Qualys new CloudView app
framework, CSA enables businesses to continuously monitor and secure their public cloud
infrastructure against misconfigurations, malicious behavior, and non-standard deployments.
It integrates with cloud platform providers native APIs to continuously discover all
resources and provide full visibility into your entire cloud infrastructure. It also provides
topological views of the infrastructure and relationships across other cloud resources.
CSC 4
Qualys Vulnerability Management (VM) gives you immediate, global visibility into where
your IT systems might be vulnerable to the latest threats, and how to protect them. It
helps you to continuously secure your IT infrastructure, so that your organization can
withstand attacks seeking to exploit unpatched and improperly configured systems.
Qualys VM assigns remediation tickets, manages exceptions, lists required patches for
each host, integrates with existing IT ticketing systems, and generates comprehensive
reports to help drive remediation of found vulnerabilities.
Qualys Threat Protection (TP) helps you automatically prioritize the vulnerabilities that
pose the greatest risk to your organization by correlating active threats against your
vulnerabilities. Qualys TP includes a Live Threat Intelligence Feed where Qualys security
engineers continuously validate and rate new threats from internal and external sources,
highlighting emerging concerns about vulnerabilities that pose an immediate threat to
your business, including details about which assets may be affected.
Qualys TP allows teams to quickly visualize which of our systems are exposed to active
threats, such as zero-days, denial-of-service attacks, actively attacked vulnerabilities, and
easy exploits requiring little scills or vulnerabilities lacking a patch. Qualys TP provides
you with the ability to measure your progress and remediation efforts with real-time trend
analysis and receive notifications when critical exposures emerge.
Qualys Patch Management (PM) will enable remediation at scale by deploying security
patches to operating systems and applications to remediate code-based vulnerabilities.
With the combination of Qualys VM, CM, and TP, youll also address the third of the first
five quick wins sub-controls, which is mentioned above and which requires customers to
run automated vulnerability scanning tools against all systems on the network on a weekly
or more frequent basis.
In addition, with Qualys VM and PM, youll address the fourth of these quick wins sub-
controls: Deployment of automated patch management tools and software update tools
for operating system and software/applications on all systems for which such tools are
available and safe.
CSC 5
The processes and tools used to track/control/prevent/correct the use, assignment, and configuration
of administrative privileges on computers, networks, and applications.
Users with administrative privileges are particularly attractive for hackers. Compromising one of those
accounts gives intruders broad access within the breached device and network, boosting their ability to
do harm. Consequently, InfoSec teams must closely monitor these accounts. Critical Security Control 5
requires minimizing the use of administrative privileges.
Minimizing administrative privileges, only using these accounts when required, auditing the
use of administrative privileged functions, and monitoring anomalous behavior.
Using automated tools to inventory administrative accounts and validating that users with
admin privileges on desktops, laptops, and servers are authorized by a senior executive.
Before deploying any new devices in a networked environment, change all default
passwords for applications, operating systems, routers, firewalls, wireless access points,
and other systems to have values consistent with administration-level accounts.
Qualys Policy Compliance (PC) account controls provide full visibility into accounts with
administrative privileges, so you can validate that theyre being used only where needed.
This helps you address the last of the first five quick wins sub-controls, which is mentioned
above and which discusses the need to minimize administrative privileges and only use
administrative accounts when required.
CSC 6
Collect, manage, and analyze audit logs of events that could help detect,
understand, or recover from an attack.
Another critical security element are audit logs, because often they provide the only clear evidence
of insider or stealthy attacks. For this reason, InfoSec teams must make sure to activate the logging
capabilities that come with most operating systems, network services, and firewall technologies. Logs
should be comprehensive, accurate, and centrally stored so that they can be mined for insights, audits,
and, when needed, incident response. Critical Security Control 6 defines requirements for managing
audit logs to meet these needs.
Include at least two synchronized time sources from which all servers and network
equipment retrieve time information on a regular basis so that timestamps in logs
are consistent.
Validate audit log settings for each hardware device and the software installed on it,
ensuring that logs include a date, timestamp, source addresses, destination addresses,
and other elements of each packet and/or transaction. Make sure systems record logs in a
standardized format, and if this is impossible, deploy log normalization tools.
Ensure that all systems that store logs have adequate storage space. Archive and digitally
sign logs periodically.
Qualys Policy Compliance (PC) helps organizations validate key aspects of audit log
configuration on a breadth of technologies including operating systems, network devices
(including firewalls), database servers, and other server software. This includes validating
related critical settings, such as synchronized time sources, configuration of file auditing
settings, and logging storage and permissions.
Qualys File Integrity Monitoring (FIM) tracks file changes across global IT systems, including
changes to security settings for log files, helping you detect and identify potential tampering
with log files and critical settings. File Audit attributes changes can also be tracked, to make
sure that critical logging of access to files is being logged by the underlying operating system.
Qualys FIM comes with out-of-the-box monitoring profiles based on industry best practices
and vendor-recommended guidelines to make sure you are monitoring the correct sensitive
operating system and application files. FIM logs file modification events centrally as well,
providing another avenue of security event analysis to protect against more complex attacks
while also providing a means to enforce change-control policies in your IT environment.
CSC 7
Minimize the attack surface and the opportunities for attackers to manipulate human behavior through
their interaction with web browsers and email systems.
Hackers do their best to turn web browsers and email clients into traps to trick end users into
performing actions that will help them gain access to their IT environment. For example, via phishing
and social engineering methods, hackers try to fool email recipients into opening malware-laden
attachments and clicking on legitimate-looking links that take users to malicious sites, and inadvertently
providing sensitive, confidential data in the process.
Cyber criminals also attempt to compromise web browsers in multiple ways, such as by using automated
self-updating exploit kits to compromise endpoints to get behind your network perimeter.
Thus, its crucial for InfoSec teams to secure these two attractive breach vectors.
Using only fully supported web browsers and email clients, and, ideally, only the latest
version of the browsers, because they have the vendors latest security functions and fixes.
Limiting unnecessary scripting languages in web browsers and email clients, including
ActiveX and JavaScript on systems that dont need such capabilities.
Qualys Policy Compliance (PC) can assess the configurations of the web browsers against
CIS benchmark recommendations, to make sure that high-risk settings are disabled that may
automatically execute plug-ins, scripts, and other content that can increase risk of compromise.
Qualys Patch Management will ensure that browsers are updated by deploying their most
recent version, mitigating the risk that infiltration could occur via human interaction with
malicious payloads.
CSC 8
Malware Defenses
Control the installation, spread, and execution of malicious code at multiple points in the enterprise,
while optimizing the use of automation to enable rapid updating of defense, data gathering, and
corrective action.
Malware is a key component of cyber attacks and continues to be an arms-race between InfoSec
professionals and hackers. Malware can be used to compromise a wide variety of IT assets and can be
deployed via many different avenues, including email attachments, malicious web pages, cloud services
and removable media (such as USB devices). Keeping up with the constant change in malware delivery
and obfuscation techniques is a significant challenge requiring that a variety of controls be in place as
defined in Critical Security Control 8.
Employ automated tools to continuously monitor workstations, servers, and mobile devices
with anti-virus, anti-spyware, personal firewalls, and host-based IPS functionality. All malware
detection events should be sent to enterprise anti-malware administration tools and event
log servers.
Limit use of external devices to those with an approved, documented business need. Monitor
for use and attempted use of external devices. Configure laptops, workstations, and servers
so that they will not auto-run content from removable media, like USB tokens (i.e., thumb
drives), USB hard drives, CDs/DVDs, FireWire devices, external serial advanced technology
attachment devices, and mounted network shares. Configure systems so that they
automatically conduct an antimalware scan of removable media when inserted.
Qualys Web Application Scanning (WAS) and Web Application Firewall (WAF) are natively
and tightly integrated for seamless identification and mitigation of risks and offer a
complete solution for web app security.
Qualys WAS is a robust DAST (Dynamic Application Security Testing) product that
identifies security holes in web applications, SOAP web services, and RESTful APIs,
through continuous discovery of HTTP services and detection of vulnerabilities and
misconfigurations. Qualys WAS easily scales to scan thousands of web applications while
covering the OWASP Top 10 vulnerabilities and more. Its malware detection functionality
scans an organizations internet-facing websites, and identifies and reports infections,
including zero-day threats via behavioral analysis. Detailed malware infection reports are
provided for remediation. A central dashboard displays scan activity, infected pages and
malware infection trends, and lets users initiate actions directly from its interface.
Meanwhile, Qualys WAF blocks attacks and lets you virtually patch web app vulnerabilities.
It can be quickly deployed for apps on public or private clouds, and scaled quickly.
Application traffic stays in your environment to minimize latency and maintain control.
Analysis, hunting, and threat indicator processing is performed in the cloud on billions of
active and past endpoint events. Those results are then coupled with threat intelligence data
from Qualys Malware Labs and third-party threat intelligence sources to identify malware
infections (indicators of compromise) and threat actor actions (indicators of activity).
Qualys Policy Compliance (PC) allows customers to validate the configuration settings of
anti-virus solutions, as well as check the list of running processes and software for potential
malicious entries.
Qualys File Integrity Monitoring (FIM) can serve as a last line of detection, identifying
changes to critical operating system and configuration files that may indicate a targeted
attack or specially designed root-kit has been put in place.
CSC 9
Manage (track/control/correct) the ongoing operational use of ports, protocols, and services on
networked devices in order to minimize windows of vulnerability available to attackers.
Hackers constantly look for remotely accessible network services vulnerable to exploitation, such as
poorly configured web, mail, file, and print servers, and domain name system (DNS) servers installed by
default on a variety of devices, often without a business need. Many software packages automatically
install and activate services without alerting users or administrators. Critical Security Control 9 calls for
limiting unnecessary services to reduce potential exposures to attack.
Ensure that only ports, protocols, and services with validated business needs are running on
each system.
Apply host-based firewalls or port filtering tools on end systems, with a default-deny rule
that drops all traffic except those services and ports that are explicitly allowed.
Perform automated port scans on a regular basis against all key servers and compare to
a known effective baseline. If a change that is not listed on the organizations approved
baseline is discovered, an alert should be generated and reviewed.
Verify any server that is visible from the internet or an untrusted network, and if it is not
required for business purposes, move it to an internal VLAN and give it a private address.
Qualys Vulnerability Management (VM) scans the organizations assets for open ports and
services, and processes, allowing you to quickly identify services so they can be analyzed
for importance.
Qualys Policy Compliance (PC) assesses the organizations hosts from the inside-out, to
make sure that only required services and applications are running and that initial baseline
configurations remain constant. Unnecessary ports and services that should be blocked or
disabled are quickly identified. Recommended services are a key component of many of the
out-of-the-box library policies provided with PC.
Qualys Web Application Firewall (WAF) is an inline virtual appliance that terminates both
client-side and server-side traffic on a single NIC. In addition to Secure Shell (SSH) for admin
purposes, it opens http/s sockets on requested TCP ports (TCP 80, 443 or any transposed port).
CSC 10
After compromising machines, attackers often make significant changes to configurations and
software, and subtle alterations to data, potentially jeopardizing organizational effectiveness with
polluted information. After the attack is detected, it can be extremely difficult for organizations
without a trustworthy data recovery capability to remove all aspects of the attackers presence on the
machine. Critical Security Control 10 requires good backup and recovery practices to be in place to
speed incident recovery.
Ensure each system is automatically backed up at least weekly, and more often for systems
storing sensitive information. To rapidly restore a system from backup, the operating system,
application software, and data should each be included in the overall backup procedure. All
backup policies should be.
Test data on backup media on a regular basis by performing a data restoration process to ensure
that the backup is properly working.
Qualys Policy Compliance (PC) assesses key configuration settings related to backups and
restore features for a variety of technologies, such as databases and server applications. For
example, if backup for a SQL database is enabled, then replication is enabled. The presence
of mandatory software, such as backup software, can also be confirmed.
CSC 11
Establish, implement, and actively manage (track, report on, correct) the
When attackers security configuration of network infrastructure devices using a rigorous
configuration management and change control process in order to
exploit flaws in
prevent attackers from exploiting vulnerable services and settings.
these devices,
they gain access
to networks, The default configurations with which vendors ship network infrastructure
redirect traffic devices are aimed at simple deployments and ease of use, not security:
on a network, open services and ports, default accounts or passwords, support for
older (vulnerable) protocols, pre-installation of unneeded software.
and intercept
Once deployed, these devices often become less secure as users request
information. configuration exceptions. When attackers exploit flaws in these devices,
they gain access to networks, redirect traffic on a network, and intercept
information. Critical Security Control 11 establishes guidelines for securing
these devices.
Qualys Vulnerability Management (VM) continuously discovers and maps each device on the
organizations network, including applications on the perimeter, internal networks, and cloud
provider networks, and assesses them for security vulnerabilities. Vulnerabilities can easily
be identified and tracked to drive remediation efforts.
Qualys Policy Compliance (PC) lets you continuously reduce risk and comply with internal
policies and external regulations. As with CSC 5, which requires similar configuration and
control review for operating systems and software, Qualys PC provides automated technical
control assessment across many network devices from vendors including Cisco, Juniper,
and Palo Alto. Customizable out-of-the-box library content based on industry- and vendor-
recommended best practices such as CIS Benchmarks and DISA STIG are also provided to
fast-track your compliance assessments, or you can establish gold-standard configurations
and identify drift from the original hardened configuration settings.
CSC 12
Boundary Defense
Qualys Vulnerability Management (VM) can scan remote devices from different network
vantage points, including externally, to identify potential openings that put data at risk.
Coupled with Qualys Continuous Monitoring (CM), recurrent scans can be completed to
keep you constantly up to date about new services and ports on internal devices, as well as
external devices exposed to the internet.
Adding Qualys Threat Protection (TP) provides threat intelligence about the latest
vulnerability disclosures and maps them to your impacted IT assets whether internal or
exposed to the internet. The three apps combined provide the comprehensive coverage
needed to protect your perimeter.
Qualys Policy Compliance (PC) can be used to assess configuration of network devices and
firewalls to ensure the boundary is properly protected and help prevent configuration drift
for key security settings on such devices. A wide array of out-of-the-box content is available
to ensure proper configuration of the perimeter network, which can be customized to fit an
organizations unique needs.
Qualys offers a complete solution for web app security with Qualys Web Application
Scanning (WAS) and Web Application Firewall (WAF), which are natively and tightly
integrated, giving you a single, interactive console for web app vulnerability detection
(WAS) and attack protection (WAF) for seamless identification and mitigation of risks.
Qualys WAS is a robust DAST (Dynamic Application Security Testing) product that
identifies security holes in web applications, SOAP web services, and RESTful APIs, through
continuous web app discovery of HTTP services and detection of vulnerabilities and
misconfigurations. Identified vulnerabilities from WAS can be virtually patched in WAF with
the push of a button, thereby protecting you from exploitation even in the case where the
application developers are unable to remediate the code.
Qualys CS lets organizations discover, track, and continuously protect containers in DevOps
pipelines and deployments across cloud and on-premises environments. This helps ensure
that the boundary settings of the containers are assessed on a continuous basis.
CSC 13
Data Protection
The processes and tools used to prevent data exfiltration, mitigate the effects
of exfiltrated data, and ensure the privacy and integrity of sensitive information.
Since data resides in many places, a combination of encryption, integrity protection, and (DLP)
techniques are required to defend it.
Care should also be taken to ensure that products used within an enterprise implement well known and
vetted cryptographic algorithms, as identified by NIST. Re-evaluation of the algorithms and key sizes
used within the enterprise on an annual basis is also recommended to ensure that organizations are not
falling behind in the strength of protection applied to their data.
Perform an assessment of data to identify sensitive information that requires the application
of encryption and integrity controls.
Deploy approved hard drive encryption software to mobile devices and systems that hold
sensitive data.
Deploy an automated tool on network perimeters that monitors for sensitive information
(e.g., personally identifiable information), keywords, and other document characteristics to
discover unauthorized attempts to exfiltrate data across network boundaries and block such
transfers while alerting information security personnel.
Qualys Policy Compliance (PC) has a number of out-of-the-box controls for checking the
security and permissions on sensitive, critical files and processes, while making sure file
transfer options are either restricted or blocked. Qualys PC can also validate that required
software such as DLP solutions are in place on critical assets.
Qualys File Integrity Monitoring (FIM) monitors and tracks changes to critical files, including
changes to important security settings and file attributes to help you detect and track
critical changes and incidents, while monitoring the integrity of the sensitive data.
CSC 14
Qualys Asset Inventory (AI) can help identify and track critical systems to ensure they are
organized and tracked according to their business purpose. The wealth of inventory data
can help ensure that only necessary software is installed for the business purpose to help
maintain proper segmentation.
Qualys Policy Compliance (PC) has a number of out-of-the-box controls for checking
the security and permissions on sensitive, critical assets (e.g., information, resources and
systems in the traditional data centers as well as in the cloud infrastructure) and for making
sure access is only provided on a need-to-know basis. Network security controls addressed
in other CSCs can also be applied here to validate proper network segmentation and the
security of critical network devices.
Qualys Container Security (CS) lets organizations discover, track, and continuously protect
containers in DevOps pipelines and deployments across cloud and on-premises environments,
ensuring that the data access outside the boundary of the containers is restricted.
CSC 15
Unsecured access points give attackers convenient entry points into your IT environment, bypassing
security perimeters. Attack methods include compromising employees wireless devices and using them
to enter your network, as well as planting rogue wireless access points in your organization, providing
unrestricted access for intruders.
Ensure that wireless devices connected to the network match an authorized configuration
and security profile, with a documented owner of the connection and a defined business
need. Deny access to wireless devices lacking such a configuration and profile.
Configure network vulnerability scanning tools to detect wireless access points connected
to the wired network. Reconcile identified devices against a list of authorized wireless access
points. Deactivate unauthorized access points.
Use wireless intrusion detection systems (WIDS) to identify rogue wireless devices and
detect attack attempts and successful compromises. All wireless traffic should be monitored
by WIDS as traffic passes into the wired network.
Qualys Vulnerability Management (VM) and Policy Compliance (PC) have out-of-the-box
content to assess and report on the vulnerabilities and configuration settings of wireless
controllers and wireless settings on the systems, to make sure unauthorized connections are
disabled, and access is provided in a secure manner.
CSC 16
Actively manage the lifecycle of system and application accounts their creation, use,
dormancy, deletion in order to minimize opportunities for attackers to leverage them.
Managing accounts is a critical aspect of protecting organizations data. Inadequate password rotation,
accounts that have gained privileges as users change roles, and validation of account and privilege
revocation are all critical user-account management tasks. For example, inactive but undeleted user
accounts belonging to former employees or temporary contractors can be used by both external
hackers and rogue insiders to disguise themselves as legitimate users and carry out their attacks.
Review all system accounts and disable any account that cannot be associated with a
business process and owner.
Ensure that all accounts have an expiration date that is monitored and enforced.
Establish and follow a process for revoking system access by disabling accounts immediately
upon termination of an employee or contractor. Disabling instead of deleting accounts allows
preservation of audit trails.
Regularly monitor the use of all accounts, automatically logging off users after a standard
period of inactivity.
Qualys Policy Compliance (PC) provides out-of-the-box content to validate the lifecycle of
system/user accounts, their credentials, and privileges. PC can help organizations implement
strong account controls by validating that the OSs capabilities for account management,
credential requirements, privileges, and other settings are in line with their password policy,
auditor requirements, and industry best practices.
CSC 17
For all functional roles in the organization (prioritizing those mission -critical to the business and
its security), identify the specific knowledge, skills, and abilities needed to support defense of the
enterprise; develop and execute an integrated plan to assess, identify gaps, and remediate through
policy, organizational planning, training, and awareness programs.
CSC 17 addresses the very important element of human behavior and its impact on security. Ensuring
that individuals know what is expected of them as they participate in system design, implementation,
operation, use, and oversight is critical to good information security practices. Developers, IT ops pros,
security analysts, end users, and executives should all be aware of security best practices, corporate
policy, and incident reporting processes. If they havent been properly educated and trained, they could
inadvertently endanger the security of your IT environment in a variety of serious ways.
Perform gap analysis to see which skills employees need to implement the other Controls,
and which behaviors employees are not adhering to, using this information to build a baseline
training and awareness roadmap for all employees.
Deliver training to fill the skills gap. If possible, use more senior staff to deliver the training. Or have
outside teachers provide training on-site so the examples used will be directly relevant. If you have
small numbers of people to train, use training conferences or online training to fill the gaps.
CSC 18
Manage the security lifecycle of all in-house developed and acquired software
in order to prevent, detect, and correct security weaknesses.
Attacks often exploit vulnerabilities found in web-based and other application software. Vulnerabilities
can be present for many reasons, including coding mistakes, logic errors, incomplete requirements,
and failure to test for unusual or unexpected conditions. Attackers are attuned to the constant stream
of vulnerability disclosures, because, when left unpatched, they each represent an opportunity to
breach a system by injecting specific exploits.
For all commercial application software, check that the version you are using is still
supported by the vendor. If not, update to the most current version and install all relevant
patches and vendor security recommendations.
Protect web applications by deploying web application firewalls (WAFs) that inspect all
traffic for common attacks, including cross-site scripting, SQL injection, command injection,
and directory traversal attacks. For applications that are not web-based, specific application
firewalls should be deployed if such tools are available for the given application type.
For in-house developed software, ensure that explicit error checking is performed and
documented for all input, including for size, data type, and acceptable ranges or formats.
Qualys Asset Inventory (AI) provides complete visibility and the ability to group software
installations across the entire IT environment, so that organizations can plan and prioritize
their efforts to secure applications.
Qualys Policy Compliance (PC) provides controls to assess default configurations and
security settings as per the best practices to prevent from the exploitable exposures. It
provides recommended configurations including default credentials setup for many widely
used applications.
Qualys Container Security (CS) lets organizations discover, track, and protect containers in
DevOps pipelines and deployments across cloud and on-premises environments, through
continuous vulnerability assessments of Docker images and underlying hosts.
Qualys Web Application Scanning (WAS) can insert security into application development
and deployment in DevSecOps environments. With WAS and its API capability, you can
automate scans as part of the build process to detect security flaws early and often,
and automatically deliver detailed reports for review and remediation. With its flexible
scheduling features and tight integration with Qualys WAF, WAS can continuously monitor
and virtually patch vulnerabilities in production web apps.
Qualys Patch Management (PM) will allow organizations to assess the hosts and common
applications against the latest patch levels, and update vulnerable libraries and database
applications to ensure they are protected against exploitation in a secure, restricted way,
allowing deployment of the latest patches on the assets.
Qualys Web Application Firewall (WAF) terminates http/s traffic towards web applications,
using virtual, full-proxy architectured appliances that communicate with the Qualys Cloud
Platform. Thanks to a powerful DAG oriented logic programmed by tailored rulesets, WAF
protects live apps against malicious transactions and load-balances legitimate server-side
traffic. The integration with WAS provides powerful mitigation tools, including:
Virtual patching, which, with one click, provides the ability to prevent
confirmed vulnerabilities from being exploited
ScanTrust, for scanning apps through the WAF in order to assess them
and their associated policy
The ability to map front-end site trees based on active and passive discoveries,
to better understand the application and drive decisions
In addition, users can write their own genuine, flexible rules, to adapt transactions in a
DevOps manner, and manage them all through a top-to-bottom custom ruleset attached
to the application. In summary, Qualys unique solution aspires to facilitate the SDLC.
CSC 19
Assign job titles and duties for handling computer and network
incidents to specific individuals.
CSC 20
To determine how effective your security strategies and practices really are you need to subject your
defenses to stringent tests that mimic real-world attacks via penetration tests and red team exercises.
Conduct regular external and internal penetration tests to identify vulnerabilities and attack
vectors that can be used to exploit enterprise systems successfully. Penetration testing
should occur from outside the network perimeter as well as from within its boundaries.
Any user or system accounts used to perform penetration testing should be controlled and
monitored to make sure they are only being used for legitimate purposes, and are removed
or restored to normal function after testing is over.
Perform periodic Red Team exercises to test organizational readiness to identify and stop
attacks or to respond quickly and effectively.
Qualys Vulnerability Management (VM), Continuous Monitoring (CM) and Threat Protection
(TP) allow customers to continuously assess and report on the latest evolving vulnerabilities,
including zero-day vulnerabilities. TP continuously correlates external threat information
against your vulnerabilities and IT asset inventory, leveraging Qualys Cloud Platforms robust
back-end engine to automate this large-scale and intensive data analysis process. TPs Live
Threat Intelligence Feed displays the latest vulnerability disclosures and maps them to
your impacted IT assets. TP can also provide direct links to exploit code for discovered
vulnerabilities, helping security teams perform thorough penetration testing.
Qualys Policy Compliance (PC) provides control assessment data that can supplement
vulnerability details allowing pen testers more information to dig deeper into an environment.
About Qualys.
The leading provider of IT
security and compliance
solutions at your fingertips.
The Qualys Cloud Platform and its integrated
apps help businesses simplify security
operations and lower the cost of compliance
by delivering critical security intelligence on Trusted globally
demand and automating the full spectrum
of auditing, compliance and protection for IT
More than 9,300 global
systems and web applications.
businesses in more
Founded in 1999, Qualys has established than 120 countries trust
strategic partnerships with leading managed
Qualys to underpin digital
service providers and consulting organizations
including Accenture, BT, Cognizant Technology transformation for greater
Solutions, Deutsche Telekom, Fujitsu, HCL, agility, better business
HP Enterprise, IBM, Infosys, NTT, Optiv,
outcomes, and substantial
SecureWorks, Tata Communications, Verizon
and Wipro. The company is also a founding cost savings.
member of the Cloud Security Alliance (CSA).