Rapid7 Solution Guide A Definitive Guide To Understanding and Meeting The Cis Critical Security Controls
Rapid7 Solution Guide A Definitive Guide To Understanding and Meeting The Cis Critical Security Controls
A Definitive Guide
to Understanding
and Meeting the CIS
Critical Security Controls
The CIS Critical Security Controls are the industry
standard for good security. Are you up to par?
Introduction
Everyone in security has heard of the CIS Critical Security Controls, but not all understand exactly how to implement them.
The CIS controls supplement almost every other security framework, such as NIST, CSF, NIST 800.53, ISO 27001, PCI, and
HIPAA, and they’re a useful base for developing or assessing your security program. However, with lengthy documentation
and many methods out there for meeting them, implementing these controls can be a daunting project to embark on.
Because of this, Rapid7’s Advisory Services team, which specializes in security assessments for organizations, developed
this guide to explain each control in plain language and assess how it can be approached, evaluated, and implemented.
“How can I be prepared Correct implementation of all 20 of the controls greatly re-
to stop known attacks?” duces security risk, lowers operational costs, and improves
any organization’s defensive posture. However, as you likely
know, simply being compliant is not enough to entirely
mitigate attacks and protect your critical information. While
there’s no silver bullet for security, organizations can reduce
Developed by leading security experts from around the
their chances of compromise by moving from a compli-
world, these controls are not simply a list of best practices
ance-driven approach to a risk management approach
to implement, but rather a framework of real ideas and
focused on real-world effectiveness.
actions gathered from seasoned individuals and enterprises
to help everyone strengthen their security posture and stop
today’s most pervasive and dangerous threats.
The 20 critical controls are divided into three categories: Implementing the CIS
Basic, Foundational, and Organizational. Basic controls Top 20 Critical Security Controls
(1–6) should be implemented in every organization for es-
sential defense readiness. Foundational controls (7–16) are
is a great way to protect your
the next step up from basic controls, while the Organization- organization from some of
al controls (17–20) focus more on people and the most common attacks.
processes. Whether you’re just starting out or are looking
to build onto your existing security program, the CIS con-
trols transform best-in-class threat intelligence into priori-
tized and actionable ways to protect your organization.
This guide will help you better understand how to
approach and implement each of the key controls
The controls were designed in such a way so that they can
so you can go on to develop a best-in-class security pro-
scale across organizations of any size. Many organizations
gram for your organization.
use the CIS controls as the foundation of their entire securi-
ty strategy. The sequence of controls allows you to follow a
logical path of building your foundation while you gradually
improve your security posture and reduce your exposure to
risk.
Basic 5
Foundational 11
Organizational 21
Control 1
Inventory and Control of Hardware Assets
The theme of this first control is fairly simple: You can’t Implementation of Dynamic Host Configuration Protocol
protect what you don’t know is there. This means you need (DHCP) logging and management. will effectively address
the ability to see what is on your network, know which sys- several sections of Critical Control 1. For organizations with
tems belong to whom, and use this information to prevent a security information and event management (SIEM)
unauthorized users from connecting to your network. This solution or centralized audit repository, ingested DHCP
control is split into eight focused sections relating to net- logs can allow correlation with other security and network
work access control, automation, and events. Correlating the logs against additional system infor-
asset management. mation from tools like SCCM or event monitoring services
can also assist with inventory tracking and automated
With the ability to actively manage all hardware devices on inventory management, which leads to added benefits on
your network, you can ensure only authorized devices have the financial and operations side of the shop.
access and unauthorized ones are found and prevented If you don’t use SCCM, most agent-based system discovery
from gaining access. This requires being able to inventory, and configuration management can still address this con-
track, and correct asset permissions. Implementing inven- trol and other governance requirements.
tory control is likely the least glamorous part of a security
program, but because it serves as the foundation for many Though these tools often require time and effort to deploy,
other controls, it can reduce insider-threat and the cost benefit is significant, as it allows smaller IT teams
loss risks, clean up the IT environment, and improve the to quickly have a major impact on their network.
other CIS Critical Security Controls.
Control 2
Inventory and Control of Software Assets
Like Control 1, this one addresses the need for awareness Beyond limiting administrator and installation rights and
of what software is running on your systems and network, blacklisting, you should also set up some form of integrity
as well as finding any unauthorized and unmanaged soft- checking and management. In most cases, this is possible
ware and preventing it from being installed or executed. using only OS-based tools, and Microsoft includes integ-
Inventory knowledge and control is an essential security rity management tools in Windows 10. OS-level integrity
need, and when done correctly, it improves the detection management tools typically rely on limiting installation
and response aspects of any security program. Because based on a list of trusted actors (installers, sources, etc.)
of this, CIS places these controls in the “Top 2” in the same In more comprehensive cases (such as in some endpoint
way that the NIST Cybersecurity Framework addresses protection services), there are heuristic and behavior-based
them as “Priority 1” controls on the 800-53 framework. tools that monitor critical application libraries and paths for
change. Because integrity management is intrinsically tied
to malware prevention and data protection, implementing
How to implement it this section of the control actually assists with:
Control 3
Continuous Vulnerability Management
Understanding and managing vulnerabilities is a continuous You then need to understand how vulnerabilities could
activity that requires dedicated time, attention, and resources. affect your organization. This control states that there must
Failing to proactively scan for vulnerabilities and address be a process to risk-rate a vulnerability based on exploit-
discovered flaws means there is a high likelihood an organi- ability and potential impact, then use that as guidance for
zation’s systems will become compromised. prioritizing remediation. However, what it doesn’t spell out is
what this process looks like. Here
This control offers guidelines for: are three important factors to consider:
• Monitoring and correlating logs asset in terms of the data it hosts and its expo-
sure level?
• Staying on top of new and emerging
vulnerabilities and exposures
2. Risk of compromise: What is the likelihood that
• Implementing remediation the vulnerability could compromise this system?
• Establishing a process to assign risk
ratings to vulnerabilities
3. Impact of compromise: If a particular vulnerabili-
ty is exploited, how will it affect
How to implement it the confidentiality, integrity, and availability
of the system and its data?
To begin meeting this control, you need to adopt scanning.
CIS states that vulnerability scanning should occur weekly,
but that is not always possible due to various circum- This rating system can help you determine the order in
stances and may depend more so on how mature your which to proceed with remediation. To ensure patches are
organization is from a security standpoint. It is important to being applied across all systems within the organization,
have both an internal and external scan — internally facing it is recommended to deploy and use an automated patch
machines should only have authenticated scans performed management tool and software update tool. However, tools
on them, and outward-facing devices should have both are not enough to ensure patches are fully and correctly
authenticated and unauthenticated scans performed. applied. Vulnerability scans that occur after remediation
should be analyzed to check that vulnerabilities that were
Next, all scanning activities must be logged, monitored, and supposed to be remediated are no longer showing up on
stored. Your security team must be able to see these events the report.
are being generated and then match them to scan logs in
order to determine whether the exploit was used against a
target known to be vulnerable instead of being part of an
actual attack. Scan logs and alerts should be generated How Rapid7 can help
and stored to track when and where administrative creden-
The following Rapid7 solutions enable continuous data
tials were being used. This way, you can determine that the
collection from all systems through scanning, integrations,
credentials are only being used during scans on approved
and endpoint agents and simplify remediation workflows in
devices and only within approved timeframes. the language of the IT team responsible:
• InsightVM • InsightAppSec
• Advisory Services
Control 4
Controlled Use of Administrative Privileges
Put another way, much of the effort spent implementing • Use long passwords (14 characters or more)
all the other CIS controls can be undone if administrative
access is not restricted. • Require system admins to have a normal account
and a privileged account
First, you will have to deal with the political issues of doing • As an advanced control, require that admin tasks
can only be performed on machines that are
this. Some users think they need admin access to install
software (hint: they don’t), some say they need it to do their air-gapped from the rest of the network and only con-
job, while others simply demand it. While admin rights are nect to systems they need to administer.
required to do some tasks, not all tasks call for them.
Reducing or controlling admin access is a change to the
Here’s an exercise that may be helpful: List the tasks an way things are being done, and fear of change is very pow-
admin user does on an average day, then mark each task erful. However, by reducing admin privilege and satisfying
that can be accomplished without admin privileges. Show the first three CIS Critical Security Controls, you can reduce
that list to the person responsible for managing risk in your the risks in your organization by 80% or more.
organization. Then, create a separate, normal user account
for admins and require them to use it for all normal tasks.
For other tasks, they can escalate into their admin account
and then de-escalate when complete. It’s an extra step, but How Rapid7 can help
it’s a secure one.
The following Rapid7 solutions monitor access controls
and baseline permitted access to systems in critical envi-
ronments to identify any suspicious change in
settings or behavior:
Control 5
Secure Configuration for Hardware and Software on
Mobile Devices, Laptops, Workstations, and Servers
This control is about shrinking the attack surface by secur-
ing anything that connects to your network. Meeting the requirements of Control 5 also
Default configurations are normally geared toward requires addressing these five sub-controls:
ease-of-deployment, not security. This includes open
and running ports and services, default accounts or pass-
words, and pre-installed software, which are all exploitable 1. Document and standardize security configura-
in their default state. tions for authorized operating
systems and software.
How to implement it
To begin addressing this control, you first have to ask your- 2. Maintain secure images or templates
self what constitutes a secure configuration. As with most for all systems based on approved
questions in security, the answer is contextual and based configuration standards.
on your business rules. Approach this with a mindset of
starting as small as you can and gradually opening up your
3. Store master images and templates on securely
systems and applications until they are usable.
configured servers that are monitored 24/7.
Here are a few recommended configuration frameworks: 5. Leverage a Security Content Automation Proto-
col-compliant configuration monitoring system to
verify security configurations, log exceptions, and
• NIST 800-70 rev 3 send alerts when unauthorized changes occur.
• National Vulnerability Database (NVD)
• CIS Benchmarks The vulnerability management process is continuous, not
• Security Technical Implementation Guide (STIG) one and done. Changes to your configurations will occur as
systems and applications are patched and updated, new
software is introduced, or operational support changes.
• InsightVM • InsightIDR
• Advisory Services
Control 6
Maintenance, Monitoring, and Analysis of Audit Logs
This control covers a variety of areas, including Network Wondering what log data you should be collecting? In a per-
Time Protocol (NTP) configuration, verbose logging of fect world where storage isn’t an issue, each of the following
traffic from network devices, best practices for leveraging would have security logs sent to the SIEM:
a SIEM for consolidated view and action points, and how
often reports need to be reviewed for anomalies. It also
runs alongside or directly connects to many other CIS Criti-
• Network gear: Switches, routers, firewalls, wireless con-
trollers, and their access points
cal Security Controls.
• Third-party security support platforms: Web proxy and
filtration, anti-malware solutions, endpoint security plat-
How to implement it forms (HBSS, EMET), identity management solutions,
and IDS/IPS
Implementation of this control ranges in complexity from
a quick win to full configuration. What’s your quick win? • Servers: Application, database, web, and file servers, as
well as domain controllers in a Windows environment
NTP. By leveraging the various NTP pools that are available
(such as those offered by the NTP Pool Project), your sys-
tems can check in to a single regionally available
• Workstations: Pretty much all security log files
server on your network. Because it has obtained its time
This list is by no means exhaustive, so here are a
from the NTP pool, you’ll be spared from hours of chasing
few references to refine what information to include
down information.
in log collections:
Control 7
Email and Web Browser Protections
The biggest threat surface in any organization is its work- Configure all the things!
stations. This control helps you understand how to manage
There are a number of ways to handle browser configura-
this threat surface without limiting usability and covers
tion that can both enable your users and limit the risks from
topics such as browser and email client safety, which are
malicious code in websites (as well as any attachments that
critically important for low-level risk mitigation.
get through your ironclad email server). We typically recom-
mend disabling browser plugins and only running authorized
How to implement it scripting languages and any software that
hasn’t been reviewed by the security team.
Because this control touches on a number of IT functions,
it’s important to have the people who run the various impli- When implementing this control, follow this simple axiom:
cated systems on board when working with it.
Follow these steps:
Control 8
Malware Defenses
Control 9
Limitation and Control of Ports, Protocols, and Services
How to implement it
5. Separate critical services on individual
host machines — While you may be leveraging
Successful implementation of Control 9 your domain controller for DHCP, you should not
requires following these six steps: include any other critical services on these boxes.
Physical segregation is ideal, but in complex
computing and operational environments, this
1. Perform a baseline port scan of the hardened may not be feasible. Regardless of segmentation,
system using your vulnerability scanner enhance the security of the hosts by locking them
You can also use other freely available applica- down to only the required services. In the case of
tions, such as port scanners and packet-captur- critical services such as DNS, DHCP, and data-
ing tools. Once the system is installed, perform base servers, ensure the attack landscape
another port scan and compare the results. is kept at a minimum and that attackers cannot
Anything required of the system that wasn’t gain access to multiple lines of advancement to
mentioned in the configuration and instructions the crown jewels.
should be made known at this time.
Control 10
Data Recovery Capabilities
Control 11
Secure Configuration for Network Devices Such as Firewalls, Routers, and Switches
6. Admin access
1. Baselining Network engineers should use a dedicated
Compare firewall, router, and switch configurations machine for all administrative tasks or tasks re-
against standard secure configurations defined quiring elevated access. This machine should be
for each type of network device. Security configu- isolated from the organization’s primary network
rations should be documented, reviewed, and ap- and not allowed internet access. It should never
proved by a change control board, and deviations be used for reading email, composing docu-
or updates should be documented ments, or surfing the web.
and approved.
7. Connectivity
2. Change management Manage the network infrastructure across network
New configuration rules that allow traffic to connections that are separated from the business
flow through network security devices such as use of that network, relying on separate VLANs or,
firewalls and network-based intrusion prevention preferably, on an entirely different physical con-
systems should be documented and recorded in a nectivity for management sessions for network
configuration management system with a specif- devices. The easiest and most predictable network
ic reason for each change, who is responsible for to start with is usually your network infrastructure
the business need, and the duration of the need. device administration connectivity, where at-
tackers often hide and attempt lateral movement
through your environment.
3. Change detection
Use automated tools to verify standard
device configurations and detect changes.
All alterations to such files should be logged
and automatically reported. How Rapid7 can help
The following Rapid7 solutions scan existing
4. Two-factor authentication and encryption systems for vulnerabilities and monitor activity
across networking devices to identify
Integrate network infrastructure devices with
misconfigurations and suspicious activity:
multifactor authentication solutions. Or, consider
restricting administration to geographically dispa-
• InsightVM • InsightIDR
rate or independently hosted administrative jump
stations and implement two-factor authentication • Advisory Services
on those stations. This means
no telnet, anywhere.
Control 12
Boundary Defense
Control 13
Data Protection
• Metasploit • InsightIDR
• Advisory Services
Control 14
Controlled Access Based on the Need to Know
• Who defines the criticality of systems and information? the principle of least privilege or role-based
access control (RBAC) to assign roles to job func-
tions rather than individuals.
These are tough questions to answer, but they can be ex-
tremely helpful in determining which people, computers, and
applications have both the need and right to access critical 4. Encrypt data both at rest and in transit,
assets and data. especially when data traverses trust zones.
Your most sensitive data should require second-
How to implement it ary authentication in order to access it.
Use the following step-by-step approach to 5. Offload and archive old data sets that have not
meet Control 14: been accessed for a specific length of time.
Control 15
Wireless Access Control
4. Adjust and limit your radio broadcast levels How Rapid7 can help
Some access points are very powerful and may
broadcast outside of your building. Tweak these The following Rapid7 solutions identify rogue wireless
levels to get as close to your building as you can. access points and detect unknown devices connecting
to the wireless network to reduce threats from this
attack vector:
• Metasploit • InsightIDR
• Advisory Services
Control 16
Account Monitoring and Control
2. Configuration settings
The settings below can have a very positive im-
pact on your security posture:
Control 17
Implement a Security Awareness and Training Program
While your users may have a basic understanding of secu- Zero in on security topics relevant to your business
rity controls such as antivirus or web filtering controls, they
There are certain security topics applicable to your
likely don’t know the latest defense strategies and what their
business that will require additional awareness and training.
responsibilities are when it comes to security. This control
For example, if you handle healthcare data, there should
helps companies implement a program that instructs em-
be training focused on HIPAA and how to handle sensitive
ployees on all of this.
information. Training can also be tailored to certain roles,
such as support, executives, and sales, or targeted based
How to implement it on best practices your workforce has failed to adhere to.
These targeted trainings should be held on a quarterly
Below is a step-by-step process to meet this control: basis and be mandatory to attend.
Control 18
Application Software Security
1. Foster a relationship with application develop- The following Rapid7 solutions can scan custom applica-
tions, third-party software, and databases
ment and procurement groups
to identify vulnerabilities and produce clear
It’s key at this phase to develop a relationship
remediation recommendations:
with those working in development, business,
change management, and project management.
• InsightVM • InsightAppSec
Have a meeting with these stakeholders to get
an understanding of how the software develop- • Advisory Services
ment lifecycle (SDLC) works, pain points that can
be addressed by security, and regulatory and
compliance requirements that are already being
addressed. Once you have a good understanding
of all of this, you can move on to the next phase.
Control 19
Incident Response and Management
Control 20
Penetration Tests and Red Team Exercises
• Do
tives of an attacker through penetration testing
you want the pen test team to target
and Red Team exercises.
a particular section of your network?
Penetration testing involves leveraging techniques used • Do you need the team to exclude any systems
from their tests?
by computer attackers to identify vulnerabilities and exploit
them. Many organizations fail to perform pen tests out of
fear of what will be found, but it’s better to know your weak-
• Does your organization have many web-based
services or applications that could benefit from
nesses than to discover you were breached through a web app pen test?
an unpatched vulnerability that went unnoticed.
• Do you want to focus on vulnerabilities or do you
want to test your detection and response capabilities?
Red Team exercises are designed for more mature organi-
zations that have been through multiple penetration tests,
have remediated vulnerabilities identified during those Other considerations to keep in mind
assessments, and are ready to test their whole organiza- A pen test will often require the use of a system account to
tion’s security posture through a simulated attack. These perform some authenticated parts of the testing, so you’ll
engagements simulate a skilled and motivated attacker want to ensure these accounts are disabled once testing is
interested in compromising their specific organization in over — or, at the very least, ensure any activities on those
order to achieve a specific objective, such as gaining access accounts are isolated to the testing windows. It’s also
to credit card numbers or sensitive files. Rather than the critical to use pen test results in conjunction with vulnera-
approach of finding many vulnerabilities and attack paths bility assessment results. Was a pen tester able to exploit a
as possible as in the case of penetration testing, Red Team vulnerability that was identified months ago? Is your orga-
exercises are meant to test the detection and response nization’s patch management program effective? There are
capabilities of the client in order to identify gaps in coverage many ways a pen test can help identify other programmatic
and help direct future investments. deficiencies in your security program.
How to implement it
How Rapid7 can help
Use the following guidelines to implement effective
testing methods: The following Rapid7 solutions simplify penetration testing
and Red Team operations and track the results over time
Define the type of penetration test you need to help organizations address issues to help prevent future
gaps from arising:
Not all pen tests are created equal, so it’s important to
develop clear goals from the outset. Ask yourself these • InsightVM • Metasploit
questions before engaging in these activities:
• Penetration Testing
There is a lot to digest in this guide, but the secret is to prioritize which controls are most applicable to your organization
and will have the highest impact. Every company has different security requirements, including the regulations they are
required to meet, the customer data they’re contractually obligated to protect, culture standards, and more.
Because most companies use these 20 controls to build or solidify their security program, it’s important to start where you
are. Not all of these controls may be immediately applicable to you, and that’s fine. Begin with the ones that will meet the most
requirements from the law, your customers, your partners, and your own security standards. Over time, it will become apparent
which ones should be implemented next, and by referencing this guide, you can get a jump start on understanding and address-
ing them.
The good news is that addressing many of these controls becomes easier by leveraging a small set of tools, many of which
Rapid7 offers. Click here for a complete breakdown of how Rapid7 can help you meet or enhance each control, or reach out
to Rapid7 Advisory Services to ask how we can help simplify this process for you. We assist many organizations of different
sizes and industries in maturing their security programs, and we’d be happy to help you, too.
Rapid7 (Nasdaq: RPD) is advancing security with visibility, analytics, and automation delivered through our Insight cloud. Our
solutions simplify the complex, allowing security teams to work more effectively with IT and development to reduce vulnerabili-
ties, monitor for malicious behavior, investigate and shut down attacks, and automate routine tasks. 7,800
customers rely on Rapid7 technology, services, and research to improve security outcomes and securely advance their organi-
zations. For more information, visit our website, check out our blog, or follow us on Twitter.