Cisa CPG Checklist v1.0.1 Final
Cisa CPG Checklist v1.0.1 Final
COST: $$
$$$$ IMPACT: HIGH COMPLEXITY: MEDIUM
DATE: 12/4/2023 DATE:
TACTIC, TECHNIQUE, AND PROCEDURE (TTP) OR RISK ADDRESSED:
Hardware Additions (T1200)
Exploit Public-Facing Application (T0819, ICS T0819) IMPLEMENTED IMPLEMENTED
Internet-accessible device (ICS T0883)
IN PROGRESS IN PROGRESS
IT Done. OT in process.
RECOMMENDED ACTION: Maintain a regularly updated inventory of all
organizational assets with an IP address (including IPv6), including OT. This
SCOPED SCOPED
inventory is updated on a recurring basis, no less than monthly for both IT and OT.
FREE SERVICES AND REFERENCES: Cyber Hygiene Services, “Stuff Off NOT STARTED NOT STARTED
Search” Guide or email [email protected]
1.B Organizational Cybersecurity Leadership ID.GV-1, ID.GV-2 CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
1.C OT Cybersecurity Leadership ID.GV-1, ID.GV-2 CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
1.D Improving IT and OT Cybersecurity Relationships ID.GV-2, CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
PR.AT-5
1
ID.RA-1, PR.IP-12,
1.E Mitigating Known Vulnerabilities DE.CM-8, RS.MI-3, CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
ID.RA-6, RS.AN-5
OT: For assets where patching is either not possible or may substantially
compromise availability or safety, compensating controls are applied (e.g.
segmentation, monitoring) and recorded. Sufficient controls either make
the asset inaccessible from the public internet, or they reduce the ability of
adversaries to exploit the vulnerabilities in these assets.
ID.RA-1, ID.RA-3,
1.F Third-Party Validation of ID.RA-4, ID.RA-5, CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
Cybersecurity Control Effectiveness ID.RA-6
High-impact findings from previous tests are mitigated in a timely manner and
are not re-observed in future tests.
1.G Supply Chain Incident Reporting ID.SC-1, ID.SC-3 CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
2
1.H Supply Chain Vulnerability Disclosure ID.SC-1, ID.SC-3 CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
1.I Vendor/Supplier Cybersecurity Requirements ID.SC-3 CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
3
PROTECT (2)
2.A Changing Default Passwords PR.AC-1 CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
In instances where changing default passwords is not feasible (e.g., a control NOT STARTED NOT STARTED
system with a hard-coded password), implement and document appropriate
compensating security controls, and monitor logs for network traffic and login
attempts on those devices.
2.B Minimum Password Strength PR.AC-1 CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
4
2.C Unique Credentials PR.AC-1 CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
COST: $$
$$$$ IMPACT: MEDIUM COMPLEXITY: MEDIUM
DATE: 12/4/2023 DATE:
TTP OR RISK ADDRESSED:
Valid Accounts (T1078, ICS T0859)
Brute Force - Password Guessing (T1110.001) IMPLEMENTED IMPLEMENTED
RECOMMENDED ACTION: Organizations provision unique and separate Users can not reuse passwords. Service account
IN PROGRESS IN PROGRESS
credentials for similar services and asset access on IT and OT networks. Users
do not (or cannot) reuse passwords for accounts, applications, services, etc.
SCOPED SCOPED
Service accounts/machine accounts have unique passwords from all member
user accounts.
NOT STARTED NOT STARTED
PR.AC-1,
2.D Revoking Credentials for Departing Employees CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
PR.IP-11
2.E Separating User and Privileged Accounts PR.AC-4 CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
2.F Network Segmentation PR.AC-5, PR.PT-4 CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
5
2.G Detection of Unsuccessful (Automated)
CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
Login Attempts PR.AC-7
RECOMMENDED ACTION: All unsuccessful logins are logged and sent to SCOPED SCOPED
an organization’s security team or relevant logging system. Security teams are
Logged and reported by EventLogAnalyzer.
notified (e.g., by an alert) after a specific number of consecutive, unsuccessful NOT STARTED NOT STARTED
login attempts in a short period (e.g., 5 failed attempts over 2 minutes). This
alert is logged and stored in the relevant security or ticketing system for
retroactive analysis.
For IT assets, there is a system-enforced policy that prevents future logins for
the suspicious account. For example, this could be for some minimum time or
until the account is re-enabled by a privileged user. This configuration is enabled
when available on an asset. For example, Windows 11 can automatically lock
out accounts for 10 minutes after 10 incorrect logins in a 10-minute period.
2.H Phishing-Resistant
CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
Multi-Factor Authentication (MFA) PR.AC-7, PR.AC-1
COST: $$
$$$$ IMPACT: HIGH COMPLEXITY: MEDIUM
DATE: 12/4/2023 DATE:
TTP OR RISK ADDRESSED:
Brute Force (T1110)
Remote Services - Remote Desktop Protocol (T1021.001) IMPLEMENTED IMPLEMENTED
Remote Services - SSH (T1021.004)
Valid Accounts (T1078, ICS T0859) IN PROGRESS IN PROGRESS
External Remote Services (ICS T0822)
SCOPED SCOPED
RECOMMENDED ACTION: Organizations implement MFA for access to assets
using the strongest available method for that asset (see below for scope). MFA
NOT STARTED NOT STARTED
options sorted by strength, high to low, are as follows:
1. Hardware-based, phishing-resistant MFA (e.g., FIDO/WebAuthn or PKI-
based - see CISA guidance in “Resources”);
Duo security useing Yubikey or duo app. OT can
2. If such hardware-based MFA is not available, then mobile app-based soft
tokens (preferably push notification with number matching) or emerging
technology such as FIDO passkeys are used;
3. MFA via SMS or voice only used when no other options are possible.
2.I Basic Cybersecurity Training PR.AT-1 CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
RECOMMENDED ACTION: At least annual trainings for all organizational IMPLEMENTED IMPLEMENTED
employees and contractors that cover basic security concepts, such as
phishing, business email compromise, basic operational security (OPSEC),
IN PROGRESS IN PROGRESS At a minimum yearly training for all employees.
password security, etc., as well as foster an internal culture of security and cyber
SCOPED SCOPED
awareness.
New employees receive initial cybersecurity training within 10 days of NOT STARTED NOT STARTED
onboarding and recurring training on at least an annual basis.
6
2.J OT Cybersecurity Training PR.AT-2, PR.AT-3, PR.AT-5 CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
2.K Strong and Agile Encryption PR.DS-2 CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
COST: $$
$$$$ IMPACT: HIGH COMPLEXITY: MEDIUM
DATE: 12/4/2023 DATE:
TTP OR RISK ADDRESSED:
Threat actor-in-the-Middle (T1557)
Automated Collection (T1119) IMPLEMENTED IMPLEMENTED
Network Sniffing (T1040, ICS T0842)
Wireless Compromise (ICS T0860) IN PROGRESS IN PROGRESS
Wireness Sniffing (ICS T0887)
SCOPED SCOPED Standard use of SSL. Wireless network is encryp
RECOMMENDED ACTION: Properly configured and up-to-date transport
layer security (TLS) is utilized to protect data in transit, when technically feasible. NOT STARTED NOT STARTED
Organizations should also plan to identify any use of outdated or weak encryption,
update these to sufficiently strong algorithms, and consider managing implications
of post-quantum cryptography.
OT: To minimize the impact to latency and availability; encryption is used where
feasible, usually for OT communications connecting with remote/external assets.
2.L Secure Sensitive Data PR.DS-1, PR.DS-5 CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
2.M Email Security PR.DS-5, PR.AC-7 CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
FREE SERVICES AND REFERENCES: CISA Binding Operational Directive NOT STARTED NOT STARTED
7
2.N Disable Macros by Default PR.IP-1, PR.IP-3 CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
2.O Document Device Configurations PR.IP-1 CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
2.P Document Network Topology PR.IP-1, ID.AM-3 CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
2.Q Hardware and Software Approval Process PR.IP-3 CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
8
2.R System Backups PR.IP-4 CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
RECOMMENDED ACTION: All systems that are necessary for operations are
backed up on a regular cadence, no less than once per year.
Backups are stored separately from the source systems and tested on a
recurring basis, no less than once per year. Stored information for OT assets
includes at a minimum: configurations, roles, PLC logic, engineering drawings,
and tools.
2.S Incident Response (IR) Plans PR.IP-9, PR.IP-10 CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
RECOMMENDED ACTION: Access- and security-focused (e.g., IDS/IDPS, IN PROGRESS IN PROGRESS Eventlog analyzer used in IT. Built in logs used fo
firewall, DLP, VPN) logs are collected and stored for use in both detection and
SCOPED SCOPED
incident response activities (e.g., forensics). Security teams are notified when a
critical log source is disabled, such as Windows Event Logging.
NOT STARTED NOT STARTED
OT: For OT assets where logs are non-standard or not available, network traffic
and communications to and from logless assets is collected.
9
2.U Secure Log Storage PR.PT-1 CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
COST: $$$
$$$$ IMPACT: HIGH COMPLEXITY: LOW
DATE: 12/4/2023 DATE:
TTP OR RISK ADDRESSED:
Indicator Removal on Host - Clear Windows Event Logs (T1070.001)
Indicator Removal on Host - Clear Linux or Mac System Logs (T1070.002) IMPLEMENTED IMPLEMENTED
Indicator Removal on Host - File Deletion (T1070.004)
IN PROGRESS IN PROGRESS
Logs are stored on loggingserver. This server is a
Indicator Removal on Host (ICS T0872)
RECOMMENDED ACTION: Logs are stored in a central system, such as a SCOPED SCOPED
security information and event management (SIEM) tool or central database, and
can only be accessed or modified by authorized and authenticated users. Logs NOT STARTED NOT STARTED
are stored for a duration informed by risk or pertinent regulatory guidelines.
2.V Prohibit Connection of Unauthorized Devices PR.PT-2 CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
OT: When feasible, establish procedures to remove, disable, or otherwise secure NOT STARTED NOT STARTED
physical ports to prevent the connection of unauthorized devices, or establish
procedures for granting access through approved exceptions.
2.W No Exploitable Services on the Internet PR.AC-3 CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
2.X Limit OT Connections to Public Internet PR.PT-4 CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
COST: $$$
$$$$ IMPACT: MEDIUM COMPLEXITY: MEDIUM
DATE: 12/4/2023 DATE:
TTP OR RISK ADDRESSED:
Active Scanning - Vulnerability Scanning (T1595.002)
Exploit Public-Facing Application (T1190, ICS T0819) IMPLEMENTED IMPLEMENTED
Exploitation of Remote Service (T1210, ICS T0866)
External Remote Services (T1133, ICS T0822) IN PROGRESS IN PROGRESS
OT devices do not have access to public internet
RECOMMENDED ACTION: No OT assets are on the public internet, unless SCOPED SCOPED
explicitly required for operation. Exceptions must be justified and documented,
and excepted assets must have additional protections in place to prevent and NOT STARTED NOT STARTED
detect exploitation attempts (e.g., logging, MFA, mandatory access via proxy or
other intermediary).
10
DETECT (3)
ID.RA-2, ID.RA-3,
3.A Detecting Relevant Threats and TTPs CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
DE.CM-1
11
RESPOND (4)
4.A Incident Reporting RS.CO-2, RS.CO-4 CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
COST: $$$
$$$$ IMPACT: LOW COMPLEXITY: HIGH
DATE: 12/4/2023 DATE:
TTP OR RISK ADDRESSED:
Active Scanning - Vulnerability Scanning (T1595.002)
Exploit Public-Facing Application (T1190, ICS T0819) IMPLEMENTED IMPLEMENTED
Exploitation of Remote Service (T1210, ICS T0866)
Supply Chain Compromise (T1195, ICS T0862) IN PROGRESS IN PROGRESS
4.C Deploy Security.txt Files RS.AN-5 CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
RECOMMENDED ACTION: All public-facing web domains have a security.txt SCOPED SCOPED
file that conforms to the recommendations in RFC 9116.
12
RECOVER (5)
RC.RP-1, R.IP-9,
5.A Incident Planning and Preparedness CURRENT ASSESSMENT YEAR 1 ASSESSMENT NOTES
PR.IP-10
SCOPED SCOPED
13