Achieving CIS Security Controls 1 & 2 in Asset Management

inventory-management-app-benefits-header

In this blog post, we will be looking at CIS Controls 1 and 2 for asset management. CIS Controls are a set of best practices that help organizations reduce their attack surface and maintain compliance with industry regulations such as NIST 800-53, ISO 27001, GLBA, HIPAA/HITECH Act and Sarbanes-Oxley. These controls provide the foundation for an effective cybersecurity program by addressing key IT security risks like: vulnerabilities in application code; insufficient access control; improper use of privileges; data loss or theft; sabotage or espionage; denial of service attacks; destruction or disruption to infrastructure. When your organization implements these controls you'll be able to identify vulnerabilities before they're exploited and protect sensitive information from attackers who might try to steal it.

What is CIS in Asset Management?

CIS is the acronym for the Center for Internet Security, an independent organization that focuses on creating standards for security among connected devices. They've established a set of best practices for organizations to help simplify the process of securing IT devices and infrastructure.

The benefits of achieving CIS Security Controls 1 & 2 include increased protection for company assets. CIS compliance also improves IT service levels, quality assurance, and accountability. CIS helps with developing comprehensive business continuity plans that help with disaster recovery. The CIS security controls allow the organization to have a better understanding of risks and threats to critical assets.

Evaluation of the controls can be done by looking at risk assessment, cost analysis, and level of effort analysis.

There are 18 total CIS controls, and they fall into three core implementation groups. We'll briefly address the three implementation groups, but in this article we'll only be exploring the first two CIS controls— Inventory and Control of Enterprise Assets and Inventory and Control of Software Assets.

CIS Implementation Groups

CIS implementation groups are recommended guidance parameters for prioritizing implementation of CIS critical security controls. Each of the three implementation groups builds on the previous and includes multiple individual controls.

CIS Controls Implementation Group 1

Implementation Group 1 (or IG1) could be considered the 'essentials' of cybersecurity. It includes basics like cyber hygiene and helps companies achieve the minimum standards of information security, applicable to nearly all enterprises at every level. The Center for Internet Security describes it as the 'on-ramp' to the CIS controls. It consists of 56 cyber defense Safeguards in all, designed to provide the most basic level of defense against the most common types of attacks.

Companies that are at the CIS Control Implementation Group 1 level tend to be small to medium-sized businesses. They have limited budgets and resources, but they're also more likely to be targeted by opportunistic attacks. These companies need a strong foundation of security practices that can help them move forward in their cybersecurity journey.

CIS Controls Implementation Group 2

Implementation Group 2 (or IG2) is the next step up from implementation group one and includes additional controls beyond what's included in implementation group one. This is the stage where most organizations want to be, as it offers a good balance between security and costs. The Center for Internet Security recommends implementation group II as an intermediary step before implementing controls in Implementation Group III.

Implementation Group II includes 24 Safeguards that address some of the more advanced cyber threats out there, like zero-day exploits and malware. These controls help companies detect malicious activity on their networks so they can respond quickly to these types of threats, but also give them some more protection against commodity attacks that might be targeted at basic Windows or Linux vulnerabilities—the kind you'll find in the implementation group one list of cyber defense measures.

CIS Controls Implementation Group 3

Implementation Group III (or IG3) is the highest stage of implementation, and includes additional controls beyond what's included in Implementation Groups I & II. It's designed for companies that are especially security conscious or who may be subject to industry-specific compliance requirements like PCI DSS or HIPAA . These Safeguards include higher-level protections than those required by CIS implementation groups one and two.

By implementing all three levels of protection outlined above, organizations can help protect against current cyber threats while also preparing themselves for even more advanced attacks down the road. If you're interested in learning more about these critical control measures, download our free guide below!

CIS Control 1: Inventory and Control of Enterprise Assets

This control is focused on creating an inventory of all hardware assets that access a network in order to determine which devices are authorized for use by employees or other third parties who require remote access. It also provides additional protection against stolen equipment being used as an attack vector when unauthorized individuals have physical access to these resources. In this case, organizations can identify compromised systems before they've been impacted or damaged through malware attacks like ransomware.

How to Achieve CIS Control 1

This control includes a number of detailed requirements, such as:

  • Creating an accurate inventory of all hardware assets attached to the network
  • Authorizing each device for connection and use by employees or other authorized parties only
  • Ensuring that unauthorized devices are not connected to enterprise resources and services at any time. This can be achieved through technical controls like firewalls and proxies, which prevent unwanted access from outside networks.

These protections should also detect anomalous traffic including encrypted communication channels that could indicate malware activity. The next step is encrypting data in motion across these communications links so they cannot be intercepted during transmission between different points on the network (like when entering via VPN.) Data at rest encryption deals with storage protection instead of transit security—preventing unauthorized access to data when it is sitting on a server.

Compiling a list of all company-owned equipment in an asset tracking platform like Asset Panda can help companies accomplish the first part of CIS Control 1, putting them on the path to becoming an IG1 organization.

CIS Control 2: Inventory and Control of Software Assets

In CIS Control 2, your company has to have an inventory and control of software assets. This basically means that you need to know what software licenses you have, how many computers are using these software licenses, and if there are any discrepancies between what is in your inventory versus with what is actually loaded on the computers. For example, if your inventory says that there are 10 licenses for software X, but only 8 copies of this software are installed on the computers, then you have 2 unaccounted-for copies of this software license. If you find these copies later on by chance, make sure they are accounted for in your asset management system.

A solution like Asset Panda can help track what software is associated with the devices your company owns. This can also help identify when new licenses are needed, when you're overpaying for software, and how to ensure that all of your software users have the support they need.

The next requirement of this control is to ensure that only authorized users can access or use your software. This means the user has a valid license for the copy they are using, and there aren't any other unauthorized copies being used either on their computer or elsewhere in your organization. For example, if you have an agreement with another company that allows employees at both companies to share licenses between them, then all parties involved must be documented properly so it doesn't appear as though additional people have unauthorized access to these resources when in reality they don't.

You'll also want to ensure accurate records surrounding who is allowed to use which programs and what devices (like laptops) those individuals will typically use each day while working remotely from different locations around the world. Tracking that equipment with an IT asset tracking tool can provide you a better understanding of who has what and where they're using it.

How to Achieve CIS Control 2

To achieve CIS Control 2, it would be wise to make sure that all licenses currently installed on computers are appropriately accounted for in the system.

Additionally, you need to make sure that all software installed on your network is documented and known by IT staff. This includes identifying each piece of software along with its version number through asset inventory audits. If there are any discrepancies between what you have recorded versus what is actually installed, then this needs to be corrected immediately (i.e., if only one computer uses a particular license but it was not initially recorded). You must have clear instructions about how new equipment will be added to the list of existing equipment so that all licenses can be properly assigned to these new machines before they go into use - otherwise you run the risk of having additional licenses on the books that you do not know about and this can cause some serious problems in your organization.

Conclusion

Achieving CIS security controls 1 and 2 in asset management is a must for any company that needs to ensure the safety of their data. If you’re not sure where to start, don’t worry! From creating an accurate inventory of all hardware assets attached to the network to authorizing each device for connection and use by employees or other authorized parties only— and everything in-between— Asset Panda can help your organization achieve CIS Security levels based on your unique needs and security goals.

By:

Guest Author

See Asset Panda in action

Our FREE demo will show how we can transform your asset management system

98a1c75f-0e18-4641-b478-323cb7ae5087