Control categories for @turbot/cis

CIS

URI
tmod:@turbot/cis#/control/categories/cis

CIS > Controls v6

URI
tmod:@turbot/cis#/control/categories/v06
Parent

CIS > Controls v6 > 01 Inventory of Authorized and Unauthorized Devices

URI
tmod:@turbot/cis#/control/categories/v0601

CIS > Controls v6 > 01 Inventory of Authorized and Unauthorized Devices > 1.01 Deploy an automated asset inventory discovery tool and use it to build a preliminary inventory of systems connected to an organization’s public and private network(s)

URI
tmod:@turbot/cis#/control/categories/v060101

CIS > Controls v6 > 01 Inventory of Authorized and Unauthorized Devices > 1.02 Deploy DHCP server logging to improve asset inventory and detect unknown systems

URI
tmod:@turbot/cis#/control/categories/v060102

CIS > Controls v6 > 01 Inventory of Authorized and Unauthorized Devices > 1.03 Ensure that all equipment acquisitions automatically update the inventory system

URI
tmod:@turbot/cis#/control/categories/v060103

CIS > Controls v6 > 01 Inventory of Authorized and Unauthorized Devices > 1.04 Maintain an asset inventory of all systems connected to the network along with the network devices

URI
tmod:@turbot/cis#/control/categories/v060104

CIS > Controls v6 > 01 Inventory of Authorized and Unauthorized Devices > 1.05 Deploy network level authentication via 802.1x to limit and control which devices can be connected to the network

URI
tmod:@turbot/cis#/control/categories/v060105

CIS > Controls v6 > 01 Inventory of Authorized and Unauthorized Devices > 1.06 Use client certificates to validate and authenticate systems prior to connecting to the private network

URI
tmod:@turbot/cis#/control/categories/v060106

CIS > Controls v6 > 02 Inventory of Authorized and Unauthorized Software

URI
tmod:@turbot/cis#/control/categories/v0602

CIS > Controls v6 > 02 Inventory of Authorized and Unauthorized Software > 2.01 Devise a list of authorized software and version that is required in the enterprise for each type of system, including servers, workstations, and laptops of various kinds and uses

URI
tmod:@turbot/cis#/control/categories/v060201

CIS > Controls v6 > 02 Inventory of Authorized and Unauthorized Software > 2.02 Deploy application whitelisting that allows systems to run software only if it is included on the whitelist and prevents execution of all other software on the system

URI
tmod:@turbot/cis#/control/categories/v060202

CIS > Controls v6 > 02 Inventory of Authorized and Unauthorized Software > 2.03 Deploy software inventory tools throughout the organization covering each of the operating system types in use, including servers, workstations, and laptops

URI
tmod:@turbot/cis#/control/categories/v060203

CIS > Controls v6 > 02 Inventory of Authorized and Unauthorized Software > 2.04 Virtual machines and/or air-gapped systems should be used to isolate and run applications that are required for business operations but based on higher risk should not be installed within a networked environment

URI
tmod:@turbot/cis#/control/categories/v060204

CIS > Controls v6 > 03 Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers

URI
tmod:@turbot/cis#/control/categories/v0603

CIS > Controls v6 > 03 Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers > 3.01 Establish standard secure configurations of operating systems and software applications

CIS > Controls v6 > 03 Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers > 3.02 Follow strict configuration management, building a secure image that is used to build all new systems that are deployed in the enterprise

CIS > Controls v6 > 03 Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers > 3.03 Store the master images on securely configured servers, validated with integrity checking tools capable of continuous inspection, and change management to ensure that only authorized changes to the images are possible

CIS > Controls v6 > 03 Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers > 3.04 Perform all remote administration of servers, workstation, network devices, and similar equipment over secure channels

CIS > Controls v6 > 03 Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers > 3.05 Use file integrity checking tools to ensure that critical system files (including sensitive system and application executables, libraries, and configurations) have not been altered

CIS > Controls v6 > 03 Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers > 3.06 Implement and test an automated configuration monitoring system that verifies all remotely testable secure configuration elements, and alerts when unauthorized changes occur

CIS > Controls v6 > 03 Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers > 3.07 Deploy system configuration management tools, such as Active Directory Group Policy Objects for Microsoft Windows systems or Puppet for UNIX systems that will automatically enforce and redeploy configuration settings to systems at regularly scheduled intervals

CIS > Controls v6 > 04 Continuous Vulnerability Assessment and Remediation

URI
tmod:@turbot/cis#/control/categories/v0604

CIS > Controls v6 > 04 Continuous Vulnerability Assessment and Remediation > 4.01 Run automated vulnerability scanning tools against all systems on the network on a weekly or more frequent basis and deliver prioritized lists of the most critical vulnerabilities to each responsible system administrator along with risk scores that compare the effectiveness of system administrators and departments in reducing risk

URI
tmod:@turbot/cis#/control/categories/v060401

CIS > Controls v6 > 04 Continuous Vulnerability Assessment and Remediation > 4.02 Correlate event logs with information from vulnerability scans to fulfill two goals

URI
tmod:@turbot/cis#/control/categories/v060402

CIS > Controls v6 > 04 Continuous Vulnerability Assessment and Remediation > 4.03 Perform vulnerability scanning in authenticated mode either with agents running locally on each end system to analyze the security configuration or with remote scanners that are given administrative rights on the system being tested

URI
tmod:@turbot/cis#/control/categories/v060403

CIS > Controls v6 > 04 Continuous Vulnerability Assessment and Remediation > 4.04 Subscribe to vulnerability intelligence services in order to stay aware of emerging exposures, and use the information gained from this subscription to update the organization’s vulnerability scanning activities on at least a monthly basis

URI
tmod:@turbot/cis#/control/categories/v060404

CIS > Controls v6 > 04 Continuous Vulnerability Assessment and Remediation > 4.05 Deploy automated patch management tools and software update tools for operating system and software/applications on all systems for which such tools are available and safe

URI
tmod:@turbot/cis#/control/categories/v060405

CIS > Controls v6 > 04 Continuous Vulnerability Assessment and Remediation > 4.06 Monitor logs associated with any scanning activity and associated administrator accounts to ensure that this activity is limited to the timeframes of legitimate scans

URI
tmod:@turbot/cis#/control/categories/v060406

CIS > Controls v6 > 04 Continuous Vulnerability Assessment and Remediation > 4.07 Compare the results from back-to-back vulnerability scans to verify that vulnerabilities were addressed, either by patching, implementing a compensating control, or documenting and accepting a reasonable business risk

URI
tmod:@turbot/cis#/control/categories/v060407

CIS > Controls v6 > 04 Continuous Vulnerability Assessment and Remediation > 4.08 Establish a process to risk-rate vulnerabilities based on the exploitability and potential impact of the vulnerability, and segmented by appropriate groups of assets

URI
tmod:@turbot/cis#/control/categories/v060408

CIS > Controls v6 > 05 Controlled Use of Administrative Privileges

URI
tmod:@turbot/cis#/control/categories/v0605

CIS > Controls v6 > 05 Controlled Use of Administrative Privileges > 5.01 Minimize administrative privileges and only use administrative accounts when they are required

URI
tmod:@turbot/cis#/control/categories/v060501

CIS > Controls v6 > 05 Controlled Use of Administrative Privileges > 5.02 Use automated tools to inventory all administrative accounts and validate that each person with administrative privileges on desktops, laptops, and servers is authorized by a senior executive

URI
tmod:@turbot/cis#/control/categories/v060502

CIS > Controls v6 > 05 Controlled Use of Administrative Privileges > 5.03 Before deploying any new devices in a networked environment, change all default passwords for applications, operating systems, routers, firewalls, wireless access points, and other systems to have values consistent with administration-level accounts

URI
tmod:@turbot/cis#/control/categories/v060503

CIS > Controls v6 > 05 Controlled Use of Administrative Privileges > 5.04 Configure systems to issue a log entry and alert when an account is added to or removed from a domain administrators’ group, or when a new local administrator account is added on a system

URI
tmod:@turbot/cis#/control/categories/v060504

CIS > Controls v6 > 05 Controlled Use of Administrative Privileges > 5.05 Configure systems to issue a log entry and alert on any unsuccessful login to an administrative account

URI
tmod:@turbot/cis#/control/categories/v060505

CIS > Controls v6 > 05 Controlled Use of Administrative Privileges > 5.06 Use multi-factor authentication for all administrative access, including domain administrative access

URI
tmod:@turbot/cis#/control/categories/v060506

CIS > Controls v6 > 05 Controlled Use of Administrative Privileges > 5.07 Where multi-factor authentication is not supported, user accounts shall be required to use long passwords on the system

URI
tmod:@turbot/cis#/control/categories/v060507

CIS > Controls v6 > 05 Controlled Use of Administrative Privileges > 5.08 Administrators should be required to access a system using a fully logged and non-administrative account

URI
tmod:@turbot/cis#/control/categories/v060508

CIS > Controls v6 > 05 Controlled Use of Administrative Privileges > 5.09 Administrators shall use a dedicated machine for all administrative tasks or tasks requiring elevated access

URI
tmod:@turbot/cis#/control/categories/v060509

CIS > Controls v6 > 06 Maintenance, Monitoring, and Analysis of Audit Logs

URI
tmod:@turbot/cis#/control/categories/v0606

CIS > Controls v6 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.01 Include at least two synchronized time sources from which all servers and network equipment retrieve time information on a regular basis so that timestamps in logs are consistent

URI
tmod:@turbot/cis#/control/categories/v060601

CIS > Controls v6 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.02 Validate audit log settings for each hardware device and the software installed on it, ensuring that logs include a date, timestamp, source addresses, destination addresses, and various other useful elements of each packet and/or transaction

URI
tmod:@turbot/cis#/control/categories/v060602

CIS > Controls v6 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.03 Ensure that all systems that store logs have adequate storage space for the logs generated on a regular basis, so that log files will not fill up between log rotation intervals

URI
tmod:@turbot/cis#/control/categories/v060603

CIS > Controls v6 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.04 Have security personnel and/or system administrators run biweekly reports that identify anomalies in logs

URI
tmod:@turbot/cis#/control/categories/v060604

CIS > Controls v6 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.05 Configure network boundary devices, including firewalls, network-based IPS, and inbound and outbound proxies, to verbosely log all traffic (both allowed and blocked) arriving at the device

URI
tmod:@turbot/cis#/control/categories/v060605

CIS > Controls v6 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.06 Deploy a SIEM (Security Information and Event Management) or log analytic tools for log aggregation and consolidation from multiple machines and for log correlation and analysis

URI
tmod:@turbot/cis#/control/categories/v060606

CIS > Controls v6 > 07 Email and Web Browser Protections

URI
tmod:@turbot/cis#/control/categories/v0607

CIS > Controls v6 > 07 Email and Web Browser Protections > 7.01 Ensure that only fully supported web browsers and email clients are allowed to execute in the organization

URI
tmod:@turbot/cis#/control/categories/v060701

CIS > Controls v6 > 07 Email and Web Browser Protections > 7.02 Uninstall or disable any unnecessary or unauthorized browser or email client plugins or add-on applications

URI
tmod:@turbot/cis#/control/categories/v060702

CIS > Controls v6 > 07 Email and Web Browser Protections > 7.03 Limit the use of unnecessary scripting languages in all web browsers and email clients

URI
tmod:@turbot/cis#/control/categories/v060703

CIS > Controls v6 > 07 Email and Web Browser Protections > 7.04 Log all URL requests from each of the organization's systems

URI
tmod:@turbot/cis#/control/categories/v060704

CIS > Controls v6 > 07 Email and Web Browser Protections > 7.05 Deploy two separate browser configurations to each system

URI
tmod:@turbot/cis#/control/categories/v060705

CIS > Controls v6 > 07 Email and Web Browser Protections > 7.06 The organization shall maintain and enforce network based URL filters that limit a system's ability to connect to websites not approved by the organization

URI
tmod:@turbot/cis#/control/categories/v060706

CIS > Controls v6 > 07 Email and Web Browser Protections > 7.07 To lower the chance of spoofed email messages, implement the Sender Policy Framework (SPF) by deploying SPF records in DNS and enabling receiver-side verification in mail servers

URI
tmod:@turbot/cis#/control/categories/v060707

CIS > Controls v6 > 07 Email and Web Browser Protections > 7.08 Scan and block all email attachments entering the organization's email gateway if they contain malicious code or file types that are unnecessary for the organization's business

URI
tmod:@turbot/cis#/control/categories/v060708

CIS > Controls v6 > 08 Malware Defenses

URI
tmod:@turbot/cis#/control/categories/v0608

CIS > Controls v6 > 08 Malware Defenses > 8.01 Employ automated tools to continuously monitor workstations, servers, and mobile devices with anti-virus, anti-spyware, personal firewalls, and host-based IPS functionality

URI
tmod:@turbot/cis#/control/categories/v060801

CIS > Controls v6 > 08 Malware Defenses > 8.02 Employ anti-malware software that offers a centralized infrastructure that compiles information on file reputations or have administrators manually push updates to all machines

URI
tmod:@turbot/cis#/control/categories/v060802

CIS > Controls v6 > 08 Malware Defenses > 8.03 Limit use of external devices to those with an approved, documented business need. Monitor for use and attempted use of external devices

URI
tmod:@turbot/cis#/control/categories/v060803

CIS > Controls v6 > 08 Malware Defenses > 8.04 Enable anti-exploitation features such as Data Execution Prevention (DEP), Address Space Layout Randomization (ASLR), virtualization/containerization, etc

URI
tmod:@turbot/cis#/control/categories/v060804

CIS > Controls v6 > 08 Malware Defenses > 8.05 Use network-based anti-malware tools to identify executables in all network traffic and use techniques other than signature- based detection to identify and filter out malicious content before it arrives at the endpoint

URI
tmod:@turbot/cis#/control/categories/v060805

CIS > Controls v6 > 08 Malware Defenses > 8.06 Enable domain name system (DNS) query logging to detect hostname lookup for known malicious C2 domains

URI
tmod:@turbot/cis#/control/categories/v060806

CIS > Controls v6 > 09 Limitation and Control of Network Ports, Protocols, and Services

URI
tmod:@turbot/cis#/control/categories/v0609

CIS > Controls v6 > 09 Limitation and Control of Network Ports, Protocols, and Services > 9.01 Ensure that only ports, protocols, and services with validated business needs are running on each system

CIS > Controls v6 > 09 Limitation and Control of Network Ports, Protocols, and Services > 9.02 Apply host-based firewalls or port filtering tools on end systems, with a default-deny rule that drops all traffic except those services and ports that are explicitly allowed

CIS > Controls v6 > 09 Limitation and Control of Network Ports, Protocols, and Services > 9.03 Perform automated port scans on a regular basis against all key servers and compare to a known effective baseline

CIS > Controls v6 > 09 Limitation and Control of Network Ports, Protocols, and Services > 9.04 Verify any server that is visible from the Internet or an untrusted network

CIS > Controls v6 > 09 Limitation and Control of Network Ports, Protocols, and Services > 9.05 Operate critical services on separate physical or logical host machines, such as DNS, file, mail, web, and database servers

CIS > Controls v6 > 09 Limitation and Control of Network Ports, Protocols, and Services > 9.06 Place application firewalls in front of any critical servers to verify and validate the traffic going to the server

CIS > Controls v6 > 10 Data Recovery Capability

URI
tmod:@turbot/cis#/control/categories/v0610

CIS > Controls v6 > 10 Data Recovery Capability > 10.01 Ensure that each system is automatically backed up on at least a weekly basis, and more often for systems storing sensitive information

URI
tmod:@turbot/cis#/control/categories/v061001

CIS > Controls v6 > 10 Data Recovery Capability > 10.02 Test data on backup media on a regular basis by performing a data restoration process to ensure that the backup is properly working

URI
tmod:@turbot/cis#/control/categories/v061002

CIS > Controls v6 > 10 Data Recovery Capability > 10.03 Ensure that backups are properly protected via physical security or encryption when they are stored, as well as when they are moved across the network

URI
tmod:@turbot/cis#/control/categories/v061003

CIS > Controls v6 > 10 Data Recovery Capability > 10.04 Ensure that key systems have at least one backup destination that is not continuously addressable through operating system calls

URI
tmod:@turbot/cis#/control/categories/v061004

CIS > Controls v6 > 11 Secure Configurations for Network Devices such as Firewalls, Routers, and Switches

URI
tmod:@turbot/cis#/control/categories/v0611

CIS > Controls v6 > 11 Secure Configurations for Network Devices such as Firewalls, Routers, and Switches > 11.01 Compare firewall, router, and switch configuration against standard secure configurations defined for each type of network device in use in the organization

CIS > Controls v6 > 11 Secure Configurations for Network Devices such as Firewalls, Routers, and Switches > 11.02 All new configuration rules beyond a baseline-hardened configuration that allow traffic to flow through network security devices

CIS > Controls v6 > 11 Secure Configurations for Network Devices such as Firewalls, Routers, and Switches > 11.03 Use automated tools to verify standard device configurations and detect changes

CIS > Controls v6 > 11 Secure Configurations for Network Devices such as Firewalls, Routers, and Switches > 11.04 Manage network devices using two-factor authentication and encrypted sessions

CIS > Controls v6 > 11 Secure Configurations for Network Devices such as Firewalls, Routers, and Switches > 11.06 Network engineers shall use a dedicated machine for all administrative tasks or tasks requiring elevated access

CIS > Controls v6 > 11 Secure Configurations for Network Devices such as Firewalls, Routers, and Switches > 11.07 Manage the network infrastructure across network connections that are separated from the business use of that network

CIS > Controls v6 > 12 Boundary Defense

URI
tmod:@turbot/cis#/control/categories/v0612

CIS > Controls v6 > 12 Boundary Defense > 12.01 Deny communications with (or limit data flow to) known malicious IP addresses (black lists), or limit access only to trusted sites (whitelists)

URI
tmod:@turbot/cis#/control/categories/v061201

CIS > Controls v6 > 12 Boundary Defense > 12.02 On DMZ networks, configure monitoring systems (which may be built in to the IDS sensors or deployed as a separate technology) to record at least packet header information, and preferably full packet header and payloads of the traffic destined for or passing through the network border

URI
tmod:@turbot/cis#/control/categories/v061202

CIS > Controls v6 > 12 Boundary Defense > 12.03 Deploy network-based IDS sensors on Internet and extranet DMZ systems and networks that look for unusual attack mechanisms and detect compromise of these systems

URI
tmod:@turbot/cis#/control/categories/v061203

CIS > Controls v6 > 12 Boundary Defense > 12.04 Network-based IPS devices should be deployed to complement IDS by blocking known bad signatures or the behavior of potential attacks

URI
tmod:@turbot/cis#/control/categories/v061204

CIS > Controls v6 > 12 Boundary Defense > 12.05 Design and implement network perimeters so that all outgoing network traffic to the Internet must pass through at least one application layer filtering proxy server

URI
tmod:@turbot/cis#/control/categories/v061205

CIS > Controls v6 > 12 Boundary Defense > 12.06 Require all remote login access (including VPN, dial-up, and other forms of access that allow login to internal systems) to use two-factor authentication

URI
tmod:@turbot/cis#/control/categories/v061206

CIS > Controls v6 > 12 Boundary Defense > 12.07 All enterprise devices remotely logging into the internal network should be managed by the enterprise, with remote control of their configuration, installed software, and patch levels

URI
tmod:@turbot/cis#/control/categories/v061207

CIS > Controls v6 > 12 Boundary Defense > 12.08 Periodically scan for back-channel connections to the Internet that bypass the DMZ, including unauthorized VPN connections and dual-homed hosts connected to the enterprise network and to other networks via wireless, dial-up modems, or other mechanisms

URI
tmod:@turbot/cis#/control/categories/v061208

CIS > Controls v6 > 12 Boundary Defense > 12.09 Deploy NetFlow collection and analysis to DMZ network flows to detect anomalous activity

URI
tmod:@turbot/cis#/control/categories/v061209

CIS > Controls v6 > 12 Boundary Defense > 12.10 To help identify covert channels exfiltrating data through a firewall, configure the built-in firewall session tracking mechanisms included in many commercial firewalls to identify TCP sessions that last an unusually long time for the given organization and firewall device, alerting personnel about the source and destination addresses associated with these long sessions

URI
tmod:@turbot/cis#/control/categories/v061210

CIS > Controls v6 > 13 Data Protection

URI
tmod:@turbot/cis#/control/categories/v0613

CIS > Controls v6 > 13 Data Protection > 13.01 Perform an assessment of data to identify sensitive information that requires the application of encryption and integrity controls

URI
tmod:@turbot/cis#/control/categories/v061301

CIS > Controls v6 > 13 Data Protection > 13.02 Deploy approved hard drive encryption software to mobile devices and systems that hold sensitive data

URI
tmod:@turbot/cis#/control/categories/v061302

CIS > Controls v6 > 13 Data Protection > 13.03 Deploy an automated tool on network perimeters that monitors for sensitive information (e.g., personally identifiable information), keywords, and other document characteristics to discover unauthorized attempts to exfiltrate data across network boundaries and block such transfers while alerting information security personnel

URI
tmod:@turbot/cis#/control/categories/v061303

CIS > Controls v6 > 13 Data Protection > 13.04 Conduct periodic scans of server machines using automated tools to determine whether sensitive data (e.g., personally identifiable information, health, credit card, or classified information) is present on the system in clear text

URI
tmod:@turbot/cis#/control/categories/v061304

CIS > Controls v6 > 13 Data Protection > 13.05 If there is no business need for supporting such devices, configure systems so that they will not write data to USB tokens or USB hard drives

URI
tmod:@turbot/cis#/control/categories/v061305

CIS > Controls v6 > 13 Data Protection > 13.06 Use network-based DLP solutions to monitor and control the flow of data within the network

URI
tmod:@turbot/cis#/control/categories/v061306

CIS > Controls v6 > 13 Data Protection > 13.07 Monitor all traffic leaving the organization and detect any unauthorized use of encryption

URI
tmod:@turbot/cis#/control/categories/v061307

CIS > Controls v6 > 13 Data Protection > 13.08 Block access to known file transfer and email exfiltration websites

URI
tmod:@turbot/cis#/control/categories/v061308

CIS > Controls v6 > 13 Data Protection > 13.09 Use host-based data loss prevention (DLP) to enforce ACLs even when data is copied off a server

URI
tmod:@turbot/cis#/control/categories/v061309

CIS > Controls v6 > 14 Controlled Access Based on the Need to Know

URI
tmod:@turbot/cis#/control/categories/v0614

CIS > Controls v6 > 14 Controlled Access Based on the Need to Know > 14.01 Segment the network based on the label or classification level of the information stored on the servers

URI
tmod:@turbot/cis#/control/categories/v061401

CIS > Controls v6 > 14 Controlled Access Based on the Need to Know > 14.02 All communication of sensitive information over less- trusted networks should be encrypted

URI
tmod:@turbot/cis#/control/categories/v061402

CIS > Controls v6 > 14 Controlled Access Based on the Need to Know > 14.03 All network switches will enable Private Virtual Local Area Networks (VLANs) for segmented workstation networks to limit the ability of devices on a network to directly communicate with other devices on the subnet and limit an attackers ability to laterally move to compromise neighboring systems

URI
tmod:@turbot/cis#/control/categories/v061403

CIS > Controls v6 > 14 Controlled Access Based on the Need to Know > 14.04 All information stored on systems shall be protected with file system, network share, claims, application, or database specific access control lists

URI
tmod:@turbot/cis#/control/categories/v061404

CIS > Controls v6 > 14 Controlled Access Based on the Need to Know > 14.05 Sensitive information stored on systems shall be encrypted at rest and require a secondary authentication mechanism, not integrated into the operating system, in order to access the information

URI
tmod:@turbot/cis#/control/categories/v061405

CIS > Controls v6 > 14 Controlled Access Based on the Need to Know > 14.06 Enforce detailed audit logging for access to nonpublic data and special authentication for sensitive data

URI
tmod:@turbot/cis#/control/categories/v061406

CIS > Controls v6 > 14 Controlled Access Based on the Need to Know > 14.07 Archived data sets or systems not regularly accessed by the organization shall be removed from the organization's network

URI
tmod:@turbot/cis#/control/categories/v061407

CIS > Controls v6 > 15 Wireless Access Control

URI
tmod:@turbot/cis#/control/categories/v0615

CIS > Controls v6 > 15 Wireless Access Control > 15.01 Ensure that each wireless device connected to the network matches an authorized configuration and security profile, with a documented owner of the connection and a defined business need

URI
tmod:@turbot/cis#/control/categories/v061501

CIS > Controls v6 > 15 Wireless Access Control > 15.02 Configure network vulnerability scanning tools to detect wireless access points connected to the wired network

URI
tmod:@turbot/cis#/control/categories/v061502

CIS > Controls v6 > 15 Wireless Access Control > 15.03 Use wireless intrusion detection systems (WIDS) to identify rogue wireless devices and detect attack attempts and successful compromises

URI
tmod:@turbot/cis#/control/categories/v061503

CIS > Controls v6 > 15 Wireless Access Control > 15.04 Where a specific business need for wireless access has been identified, configure wireless access on client machines to allow access only to authorized wireless networks

URI
tmod:@turbot/cis#/control/categories/v061504

CIS > Controls v6 > 15 Wireless Access Control > 15.05 Ensure that all wireless traffic leverages at least Advanced Encryption Standard (AES) encryption used with at least Wi-Fi Protected Access 2 (WPA2) protection

URI
tmod:@turbot/cis#/control/categories/v061505

CIS > Controls v6 > 15 Wireless Access Control > 15.06 Ensure that wireless networks use authentication protocols such as Extensible Authentication Protocol-Transport Layer Security (EAP/TLS), which provide credential protection and mutual authentication

URI
tmod:@turbot/cis#/control/categories/v061506

CIS > Controls v6 > 15 Wireless Access Control > 15.07 Disable peer-to-peer wireless network capabilities on wireless clients

URI
tmod:@turbot/cis#/control/categories/v061507

CIS > Controls v6 > 15 Wireless Access Control > 15.08 Disable wireless peripheral access of devices (such as Bluetooth), unless such access is required for a documented business need

URI
tmod:@turbot/cis#/control/categories/v061508

CIS > Controls v6 > 15 Wireless Access Control > 15.09 Create separate virtual local area networks (VLANs) for BYOD systems or other untrusted devices

URI
tmod:@turbot/cis#/control/categories/v061509

CIS > Controls v6 > 16 Account Monitoring and Control

URI
tmod:@turbot/cis#/control/categories/v0616

CIS > Controls v6 > 16 Account Monitoring and Control > 16.01 Review all system accounts and disable any account that cannot be associated with a business process and owner

URI
tmod:@turbot/cis#/control/categories/v061601

CIS > Controls v6 > 16 Account Monitoring and Control > 16.02 Ensure that all accounts have an expiration date that is monitored and enforced

URI
tmod:@turbot/cis#/control/categories/v061602

CIS > Controls v6 > 16 Account Monitoring and Control > 16.03 Establish and follow a process for revoking system access by disabling accounts immediately upon termination of an employee or contractor

URI
tmod:@turbot/cis#/control/categories/v061603

CIS > Controls v6 > 16 Account Monitoring and Control > 16.04 Regularly monitor the use of all accounts, automatically logging off users after a standard period of inactivity

URI
tmod:@turbot/cis#/control/categories/v061604

CIS > Controls v6 > 16 Account Monitoring and Control > 16.05 Configure screen locks on systems to limit access to unattended workstations

URI
tmod:@turbot/cis#/control/categories/v061605

CIS > Controls v6 > 16 Account Monitoring and Control > 16.06 Monitor account usage to determine dormant accounts, notifying the user or user’s manager

URI
tmod:@turbot/cis#/control/categories/v061606

CIS > Controls v6 > 16 Account Monitoring and Control > 16.07 Use and configure account lockouts such that after a set number of failed login attempts the account is locked for a standard period of time

URI
tmod:@turbot/cis#/control/categories/v061607

CIS > Controls v6 > 16 Account Monitoring and Control > 16.08 Monitor attempts to access deactivated accounts through audit logging

URI
tmod:@turbot/cis#/control/categories/v061608

CIS > Controls v6 > 16 Account Monitoring and Control > 16.09 Configure access for all accounts through a centralized point of authentication, for example Active Directory or LDAP

URI
tmod:@turbot/cis#/control/categories/v061609

CIS > Controls v6 > 16 Account Monitoring and Control > 16.10 Profile each user’s typical account usage by determining normal time-of-day access and access duration

URI
tmod:@turbot/cis#/control/categories/v061610

CIS > Controls v6 > 16 Account Monitoring and Control > 16.11 Require multi-factor authentication for all user accounts that have access to sensitive data or systems

URI
tmod:@turbot/cis#/control/categories/v061611

CIS > Controls v6 > 16 Account Monitoring and Control > 16.12 Where multi-factor authentication is not supported, user accounts shall be required to use long passwords on the system

URI
tmod:@turbot/cis#/control/categories/v061612

CIS > Controls v6 > 16 Account Monitoring and Control > 16.13 Ensure that all account usernames and authentication credentials are transmitted across networks using encrypted channels

URI
tmod:@turbot/cis#/control/categories/v061613

CIS > Controls v6 > 16 Account Monitoring and Control > 16.14 Verify that all authentication files are encrypted or hashed and that these files cannot be accessed without root or administrator privileges

URI
tmod:@turbot/cis#/control/categories/v061614

CIS > Controls v6 > 17 Security Skills Assessment and Appropriate Training to Fill Gaps

URI
tmod:@turbot/cis#/control/categories/v0617

CIS > Controls v6 > 17 Security Skills Assessment and Appropriate Training to Fill Gaps > 17.01 Perform gap analysis to see which skills employees need to implement the other Controls, and which behaviors employees are not adhering to, using this information to build a baseline training and awareness roadmap for all employees

CIS > Controls v6 > 17 Security Skills Assessment and Appropriate Training to Fill Gaps > 17.02 Deliver training to fill the skills gap. If possible, use more senior staff to deliver the training

CIS > Controls v6 > 17 Security Skills Assessment and Appropriate Training to Fill Gaps > 17.03 Implement a security awareness program that (1) focuses on the methods commonly used in intrusions that can be blocked through individual action, (2) is delivered in short online modules convenient for employees (3) is updated frequently (at least annually) to represent the latest attack techniques, (4) is mandated for completion by all employees at least annually, (5) is reliably monitored for employee completion, and 6) includes the senior leadership team’s personal messaging, involvement in training, and accountability through performance metrics

CIS > Controls v6 > 17 Security Skills Assessment and Appropriate Training to Fill Gaps > 17.05 Use security skills assessments for each of the mission- critical roles to identify skills gaps

CIS > Controls v6 > 18 Application Software Security

URI
tmod:@turbot/cis#/control/categories/v0618

CIS > Controls v6 > 18 Application Software Security > 18.01 For all acquired application software, check that the version you are using is still supported by the vendor

URI
tmod:@turbot/cis#/control/categories/v061801

CIS > Controls v6 > 18 Application Software Security > 18.02 Protect web applications by deploying web application firewalls (WAFs) that inspect all traffic flowing to the web application for common web application attacks, including but not limited to cross-site scripting, SQL injection, command injection, and directory traversal attacks

URI
tmod:@turbot/cis#/control/categories/v061802

CIS > Controls v6 > 18 Application Software Security > 18.03 For in-house developed software, ensure that explicit error checking is performed and documented for all input, including for size, data type, and acceptable ranges or format

URI
tmod:@turbot/cis#/control/categories/v061803

CIS > Controls v6 > 18 Application Software Security > 18.04 Test in-house-developed and third-party-procured web applications for common security weaknesses using automated remote web application scanners prior to deployment, whenever updates are made to the application, and on a regular recurring basis

URI
tmod:@turbot/cis#/control/categories/v061804

CIS > Controls v6 > 18 Application Software Security > 18.05 Do not display system error messages to end-users (output sanitization)

URI
tmod:@turbot/cis#/control/categories/v061805

CIS > Controls v6 > 18 Application Software Security > 18.06 Maintain separate environments for production and nonproduction systems

URI
tmod:@turbot/cis#/control/categories/v061806

CIS > Controls v6 > 18 Application Software Security > 18.07 For applications that rely on a database, use standard hardening configuration templates

URI
tmod:@turbot/cis#/control/categories/v061807

CIS > Controls v6 > 18 Application Software Security > 18.08 Ensure that all software development personnel receive training in writing secure code for their specific development environment

URI
tmod:@turbot/cis#/control/categories/v061808

CIS > Controls v6 > 18 Application Software Security > 18.09 For in-house developed applications, ensure that development artifacts (sample data and scripts; unused libraries, components, debug code; or tools) are not included in the deployed software, or accessible in the production environment

URI
tmod:@turbot/cis#/control/categories/v061809

CIS > Controls v6 > 19 Incident Response and Management

URI
tmod:@turbot/cis#/control/categories/v0619

CIS > Controls v6 > 19 Incident Response and Management > 19.01 Ensure that there are written incident response procedures that include a definition of personnel roles for handling incidents

URI
tmod:@turbot/cis#/control/categories/v061901

CIS > Controls v6 > 19 Incident Response and Management > 19.02 Assign job titles and duties for handling computer and network incidents to specific individuals

URI
tmod:@turbot/cis#/control/categories/v061902

CIS > Controls v6 > 19 Incident Response and Management > 19.03 Define management personnel who will support the incident handling process by acting in key decision-making roles

URI
tmod:@turbot/cis#/control/categories/v061903

CIS > Controls v6 > 19 Incident Response and Management > 19.04 Devise organization-wide standards for the time required for system administrators and other personnel to report anomalous events to the incident handling team, the mechanisms for such reporting, and the kind of information that should be included in the incident notification

URI
tmod:@turbot/cis#/control/categories/v061904

CIS > Controls v6 > 19 Incident Response and Management > 19.05 Assemble and maintain information on third-party contact information to be used to report a security incident (e.g., maintain an email address of security@organization.com or have a web page http://organization.com/security)

URI
tmod:@turbot/cis#/control/categories/v061905

CIS > Controls v6 > 19 Incident Response and Management > 19.06 Publish information for all personnel, including employees and contractors, regarding reporting computer anomalies and incidents to the incident handling team

URI
tmod:@turbot/cis#/control/categories/v061906

CIS > Controls v6 > 19 Incident Response and Management > 19.07 Conduct periodic incident scenario sessions for personnel associated with the incident handling team to ensure that they understand current threats and risks, as well as their responsibilities in supporting the incident handling team

URI
tmod:@turbot/cis#/control/categories/v061907

CIS > Controls v6 > 20 Penetration Tests and Red Team Exercises

URI
tmod:@turbot/cis#/control/categories/v0620

CIS > Controls v6 > 20 Penetration Tests and Red Team Exercises > 20.01 Conduct regular external and internal penetration tests to identify vulnerabilities and attack vectors that can be used to exploit enterprise systems successfully

URI
tmod:@turbot/cis#/control/categories/v062001

CIS > Controls v6 > 20 Penetration Tests and Red Team Exercises > 20.02 Any user or system accounts used to perform penetration testing should be controlled and monitored to make sure they are only being used for legitimate purposes, and are removed or restored to normal function after testing is over

URI
tmod:@turbot/cis#/control/categories/v062002

CIS > Controls v6 > 20 Penetration Tests and Red Team Exercises > 20.03 Perform periodic Red Team exercises to test organizational readiness to identify and stop attacks or to respond quickly and effectively

URI
tmod:@turbot/cis#/control/categories/v062003

CIS > Controls v6 > 20 Penetration Tests and Red Team Exercises > 20.04 Include tests for the presence of unprotected system information and artifacts that would be useful to attackers, including network diagrams, configuration files, older penetration test reports, emails or documents containing passwords or other information critical to system operation

URI
tmod:@turbot/cis#/control/categories/v062004

CIS > Controls v6 > 20 Penetration Tests and Red Team Exercises > 20.05 Plan clear goals of the penetration test itself with blended attacks in mind, identifying the goal machine or target asset

URI
tmod:@turbot/cis#/control/categories/v062005

CIS > Controls v6 > 20 Penetration Tests and Red Team Exercises > 20.06 Use vulnerability scanning and penetration testing tools in concert

URI
tmod:@turbot/cis#/control/categories/v062006

CIS > Controls v6 > 20 Penetration Tests and Red Team Exercises > 20.07 Wherever possible, ensure that Red Teams results are documented using open, machine-readable standards

URI
tmod:@turbot/cis#/control/categories/v062007

CIS > Controls v6 > 20 Penetration Tests and Red Team Exercises > 20.08 Create a test bed that mimics a production environment for specific penetration tests and Red Team attacks against elements that are not typically tested in production, such as attacks against supervisory control and data acquisition and other control systems

URI
tmod:@turbot/cis#/control/categories/v062008

CIS > Controls v7

URI
tmod:@turbot/cis#/control/categories/v07
Parent

CIS > Controls v7 > 01 Inventory and Control of Hardware Assets

URI
tmod:@turbot/cis#/control/categories/v0701

CIS > Controls v7 > 01 Inventory and Control of Hardware Assets > 1.01 Utilize an Active Discovery Tool

URI
tmod:@turbot/cis#/control/categories/v070101

CIS > Controls v7 > 01 Inventory and Control of Hardware Assets > 1.02 Use a Passive Asset Discovery Tool

URI
tmod:@turbot/cis#/control/categories/v070102

CIS > Controls v7 > 01 Inventory and Control of Hardware Assets > 1.03 Use DHCP Logging to Update Asset Inventory

URI
tmod:@turbot/cis#/control/categories/v070103

CIS > Controls v7 > 01 Inventory and Control of Hardware Assets > 1.04 Maintain Detailed Asset Inventory

URI
tmod:@turbot/cis#/control/categories/v070104

CIS > Controls v7 > 01 Inventory and Control of Hardware Assets > 1.05 Maintain Asset Inventory Information

URI
tmod:@turbot/cis#/control/categories/v070105

CIS > Controls v7 > 01 Inventory and Control of Hardware Assets > 1.06 Address Unauthorized Assets

URI
tmod:@turbot/cis#/control/categories/v070106

CIS > Controls v7 > 01 Inventory and Control of Hardware Assets > 1.07 Deploy Port Level Access Control

URI
tmod:@turbot/cis#/control/categories/v070107

CIS > Controls v7 > 01 Inventory and Control of Hardware Assets > 1.08 Utilize Client Certificates to Authenticate Hardware Assets

URI
tmod:@turbot/cis#/control/categories/v070108

CIS > Controls v7 > 02 Inventory and Control of Software Assets

URI
tmod:@turbot/cis#/control/categories/v0702

CIS > Controls v7 > 02 Inventory and Control of Software Assets > 2.01 Maintain Inventory of Authorized Software

URI
tmod:@turbot/cis#/control/categories/v070201

CIS > Controls v7 > 02 Inventory and Control of Software Assets > 2.02 Ensure Software is Supported by Vendor

URI
tmod:@turbot/cis#/control/categories/v070202

CIS > Controls v7 > 02 Inventory and Control of Software Assets > 2.03 Utilize Software Inventory Tools

URI
tmod:@turbot/cis#/control/categories/v070203

CIS > Controls v7 > 02 Inventory and Control of Software Assets > 2.04 Track Software Inventory Information

URI
tmod:@turbot/cis#/control/categories/v070204

CIS > Controls v7 > 02 Inventory and Control of Software Assets > 2.05 Integrate Software and Hardware Asset Inventories

URI
tmod:@turbot/cis#/control/categories/v070205

CIS > Controls v7 > 02 Inventory and Control of Software Assets > 2.06 Address Unapproved Software

URI
tmod:@turbot/cis#/control/categories/v070206

CIS > Controls v7 > 02 Inventory and Control of Software Assets > 2.07 Utilize Application Whitelisting

URI
tmod:@turbot/cis#/control/categories/v070207

CIS > Controls v7 > 02 Inventory and Control of Software Assets > 2.08 Implement Application Whitelisting of Libraries

URI
tmod:@turbot/cis#/control/categories/v070208

CIS > Controls v7 > 02 Inventory and Control of Software Assets > 2.09 Implement Application Whitelisting of Scripts

URI
tmod:@turbot/cis#/control/categories/v070209

CIS > Controls v7 > 02 Inventory and Control of Software Assets > 2.10 Physically or Logically Segregate High Risk Applications

URI
tmod:@turbot/cis#/control/categories/v070210

CIS > Controls v7 > 03 Continuous Vulnerability Management

URI
tmod:@turbot/cis#/control/categories/v0703

CIS > Controls v7 > 03 Continuous Vulnerability Management > 3.01 Run Automated Vulnerability Scanning Tools

URI
tmod:@turbot/cis#/control/categories/v070301

CIS > Controls v7 > 03 Continuous Vulnerability Management > 3.02 Perform Authenticated Vulnerability Scanning

URI
tmod:@turbot/cis#/control/categories/v070302

CIS > Controls v7 > 03 Continuous Vulnerability Management > 3.03 Protect Dedicated Assessment Accounts

URI
tmod:@turbot/cis#/control/categories/v070303

CIS > Controls v7 > 03 Continuous Vulnerability Management > 3.04 Deploy Automated Operating System Patch Management Tools

URI
tmod:@turbot/cis#/control/categories/v070304

CIS > Controls v7 > 03 Continuous Vulnerability Management > 3.05 Deploy Automated Software Patch Management Tools

URI
tmod:@turbot/cis#/control/categories/v070305

CIS > Controls v7 > 03 Continuous Vulnerability Management > 3.06 Compare Back-toback Vulnerability Scans

URI
tmod:@turbot/cis#/control/categories/v070306

CIS > Controls v7 > 03 Continuous Vulnerability Management > 3.07 Utilize a Risk-rating Process

URI
tmod:@turbot/cis#/control/categories/v070307

CIS > Controls v7 > 04 Controlled Use of Administrative Privileges

URI
tmod:@turbot/cis#/control/categories/v0704

CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.01 Maintain Inventory of Administrative Accounts

URI
tmod:@turbot/cis#/control/categories/v070401

CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.02 Change Default Passwords

URI
tmod:@turbot/cis#/control/categories/v070402

CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.03 Ensure the Use of Dedicated Administrative Accounts

URI
tmod:@turbot/cis#/control/categories/v070403

CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.04 Use Unique Passwords

URI
tmod:@turbot/cis#/control/categories/v070404

CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.05 Use Multifactor Authentication For All Administrative Access

URI
tmod:@turbot/cis#/control/categories/v070405

CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.06 Use Dedicated Workstations For All Administrative

URI
tmod:@turbot/cis#/control/categories/v070406

CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.07 Limit Access to Scripting Tools

URI
tmod:@turbot/cis#/control/categories/v070407

CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.08 Log and Alert on Changes to Administrative Group Membership

URI
tmod:@turbot/cis#/control/categories/v070408

CIS > Controls v7 > 04 Controlled Use of Administrative Privileges > 4.09 Log and Alert on Unsuccessful Administrative Account Login

URI
tmod:@turbot/cis#/control/categories/v070409

CIS > Controls v7 > 05 Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers

URI
tmod:@turbot/cis#/control/categories/v0705

CIS > Controls v7 > 05 Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers > 5.01 Establish Secure Configurations

CIS > Controls v7 > 05 Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers > 5.02 Maintain Secure Images

CIS > Controls v7 > 05 Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers > 5.03 Securely Store Master Images

CIS > Controls v7 > 05 Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers > 5.04 Deploy System Configuration Management Tools

CIS > Controls v7 > 05 Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers > 5.05 Implement Automated Configuration Monitoring Systems

CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs

URI
tmod:@turbot/cis#/control/categories/v0706

CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.01 Utilize Three Synchronized Time Sources

URI
tmod:@turbot/cis#/control/categories/v070601

CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.02 Activate Audit Logging

URI
tmod:@turbot/cis#/control/categories/v070602

CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.03 Enable Detailed Logging

URI
tmod:@turbot/cis#/control/categories/v070603

CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.04 Ensure Adequate Storage for Logs

URI
tmod:@turbot/cis#/control/categories/v070604

CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.05 Central Log Management

URI
tmod:@turbot/cis#/control/categories/v070605

CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.06 Deploy SIEM or Log Analytic Tools

URI
tmod:@turbot/cis#/control/categories/v070606

CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.07 Regularly Review Logs

URI
tmod:@turbot/cis#/control/categories/v070607

CIS > Controls v7 > 06 Maintenance, Monitoring, and Analysis of Audit Logs > 6.08 Regularly Tune SIEM

URI
tmod:@turbot/cis#/control/categories/v070608

CIS > Controls v7 > 07 Email and Web Browser Protections

URI
tmod:@turbot/cis#/control/categories/v0707

CIS > Controls v7 > 07 Email and Web Browser Protections > 7.01 Ensure Use of Only Fully Supported Browsers and Email Clients

URI
tmod:@turbot/cis#/control/categories/v070701

CIS > Controls v7 > 07 Email and Web Browser Protections > 7.02 Disable Unnecessary or Unauthorized Browser or Email Client Plugins

URI
tmod:@turbot/cis#/control/categories/v070702

CIS > Controls v7 > 07 Email and Web Browser Protections > 7.03 Limit Use of Scripting Languages in Web Browsers and Email Clients

URI
tmod:@turbot/cis#/control/categories/v070703

CIS > Controls v7 > 07 Email and Web Browser Protections > 7.04 Maintain and Enforce Network-Based URL Filters

URI
tmod:@turbot/cis#/control/categories/v070704

CIS > Controls v7 > 07 Email and Web Browser Protections > 7.05 Subscribe to URL Categorization service

URI
tmod:@turbot/cis#/control/categories/v070705

CIS > Controls v7 > 07 Email and Web Browser Protections > 7.06 Log all URL Requests

URI
tmod:@turbot/cis#/control/categories/v070706

CIS > Controls v7 > 07 Email and Web Browser Protections > 7.07 Use of DNS Filtering Services

URI
tmod:@turbot/cis#/control/categories/v070707

CIS > Controls v7 > 07 Email and Web Browser Protections > 7.08 Implement DMARC and Enable Receiver-Side Verification

URI
tmod:@turbot/cis#/control/categories/v070708

CIS > Controls v7 > 07 Email and Web Browser Protections > 7.09 Block Unnecessary File Types

URI
tmod:@turbot/cis#/control/categories/v070709

CIS > Controls v7 > 07 Email and Web Browser Protections > 7.10 Sandbox All Email Attachments

URI
tmod:@turbot/cis#/control/categories/v070710

CIS > Controls v7 > 08 Malware Defenses

URI
tmod:@turbot/cis#/control/categories/v0708

CIS > Controls v7 > 08 Malware Defenses > 8.01 Utilize Centrally Managed Antimalware Software

URI
tmod:@turbot/cis#/control/categories/v070801

CIS > Controls v7 > 08 Malware Defenses > 8.02 Ensure AntiMalware Software and Signatures are Updated

URI
tmod:@turbot/cis#/control/categories/v070802

CIS > Controls v7 > 08 Malware Defenses > 8.03 Enable Operating System AntiExploitation Features/ Deploy Anti-Exploit Technologies

URI
tmod:@turbot/cis#/control/categories/v070803

CIS > Controls v7 > 08 Malware Defenses > 8.04 Configure AntiMalware Scanning of Removable

URI
tmod:@turbot/cis#/control/categories/v070804

CIS > Controls v7 > 08 Malware Defenses > 8.05 Configure Devices to Not Auto-run Content

URI
tmod:@turbot/cis#/control/categories/v070805

CIS > Controls v7 > 08 Malware Defenses > 8.06 Centralize Antimalware Logging

URI
tmod:@turbot/cis#/control/categories/v070806

CIS > Controls v7 > 08 Malware Defenses > 8.07 Enable DNS Query Logging

URI
tmod:@turbot/cis#/control/categories/v070807

CIS > Controls v7 > 08 Malware Defenses > 8.08 Enable Commandline Audit Logging

URI
tmod:@turbot/cis#/control/categories/v070808

CIS > Controls v7 > 09 Limitation and Control of Network Ports, Protocols, and Services

URI
tmod:@turbot/cis#/control/categories/v0709

CIS > Controls v7 > 09 Limitation and Control of Network Ports, Protocols, and Services > 9.01 Associate Active Ports, Services and Protocols to Asset Inventory

CIS > Controls v7 > 09 Limitation and Control of Network Ports, Protocols, and Services > 9.02 Ensure Only Approved Ports, Protocols and Services Are Running

CIS > Controls v7 > 09 Limitation and Control of Network Ports, Protocols, and Services > 9.03 Perform Regular Automated Port Scans

CIS > Controls v7 > 09 Limitation and Control of Network Ports, Protocols, and Services > 9.04 Apply Host-based Firewalls or Port Filtering

CIS > Controls v7 > 09 Limitation and Control of Network Ports, Protocols, and Services > 9.05 Implement Application Firewalls

CIS > Controls v7 > 10 Data Recovery Capabilities

URI
tmod:@turbot/cis#/control/categories/v0710

CIS > Controls v7 > 10 Data Recovery Capabilities > 10.01 Ensure Regular Automated Back Ups

URI
tmod:@turbot/cis#/control/categories/v071001

CIS > Controls v7 > 10 Data Recovery Capabilities > 10.02 Perform Complete System Backups

URI
tmod:@turbot/cis#/control/categories/v071002

CIS > Controls v7 > 10 Data Recovery Capabilities > 10.03 Test Data on Backup Media

URI
tmod:@turbot/cis#/control/categories/v071003

CIS > Controls v7 > 10 Data Recovery Capabilities > 10.04 Protect Backups

URI
tmod:@turbot/cis#/control/categories/v071004

CIS > Controls v7 > 10 Data Recovery Capabilities > 10.05 Ensure Backups Have At least One Non-Continuously Addressable Destination

URI
tmod:@turbot/cis#/control/categories/v071005

CIS > Controls v7 > 11 Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches

URI
tmod:@turbot/cis#/control/categories/v0711

CIS > Controls v7 > 11 Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches > 11.01 Maintain Standard Security Configurations for Network Devices

CIS > Controls v7 > 11 Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches > 11.02 Document Traffic Configuration Rules

CIS > Controls v7 > 11 Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches > 11.03 Use Automated Tools to Verify Standard Device Configurations and Detect Changes

CIS > Controls v7 > 11 Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches > 11.05 Manage Network Devices Using MultiFactor Authentication and Encrypted Sessions

CIS > Controls v7 > 11 Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches > 11.06 Use Dedicated Workstations For All Network Administrative Tasks

CIS > Controls v7 > 11 Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches > 11.07 Manage Network Infrastructure Through a Dedicated Network

CIS > Controls v7 > 12 Boundary Defense

URI
tmod:@turbot/cis#/control/categories/v0712

CIS > Controls v7 > 12 Boundary Defense > 12.01 Maintain an Inventory of Network Boundaries

URI
tmod:@turbot/cis#/control/categories/v071201

CIS > Controls v7 > 12 Boundary Defense > 12.02 Scan for Unauthorized Connections across Trusted Network Boundaries

URI
tmod:@turbot/cis#/control/categories/v071202

CIS > Controls v7 > 12 Boundary Defense > 12.03 Deny Communications with Known Malicious IP Addresses

URI
tmod:@turbot/cis#/control/categories/v071203

CIS > Controls v7 > 12 Boundary Defense > 12.04 Deny Communication over Unauthorized Ports

URI
tmod:@turbot/cis#/control/categories/v071204

CIS > Controls v7 > 12 Boundary Defense > 12.05 Configure Monitoring Systems to Record Network Packets

URI
tmod:@turbot/cis#/control/categories/v071205

CIS > Controls v7 > 12 Boundary Defense > 12.06 Deploy Networkbased IDS Sensors

URI
tmod:@turbot/cis#/control/categories/v071206

CIS > Controls v7 > 12 Boundary Defense > 12.07 Deploy NetworkBased Intrusion Prevention Systems

URI
tmod:@turbot/cis#/control/categories/v071207

CIS > Controls v7 > 12 Boundary Defense > 12.08 Deploy NetFlow Collection on Networking Boundary Devices

URI
tmod:@turbot/cis#/control/categories/v071208

CIS > Controls v7 > 12 Boundary Defense > 12.09 Deploy Application Layer Filtering Proxy Server

URI
tmod:@turbot/cis#/control/categories/v071209

CIS > Controls v7 > 12 Boundary Defense > 12.10 Decrypt Network Traffic at Proxy

URI
tmod:@turbot/cis#/control/categories/v071210

CIS > Controls v7 > 12 Boundary Defense > 12.11 Require All Remote Logins to Use Multi-factor Authentication

URI
tmod:@turbot/cis#/control/categories/v071211

CIS > Controls v7 > 12 Boundary Defense > 12.12 Manage All Devices Remotely Logging into Internal Network

URI
tmod:@turbot/cis#/control/categories/v071212

CIS > Controls v7 > 13 Data Protection

URI
tmod:@turbot/cis#/control/categories/v0713

CIS > Controls v7 > 13 Data Protection > 13.01 Maintain an Inventory Sensitive Information

URI
tmod:@turbot/cis#/control/categories/v071301

CIS > Controls v7 > 13 Data Protection > 13.02 Remove Sensitive Data or Systems Not Regularly Accessed by Organization

URI
tmod:@turbot/cis#/control/categories/v071302

CIS > Controls v7 > 13 Data Protection > 13.03 Monitor and Block Unauthorized Network Traffic

URI
tmod:@turbot/cis#/control/categories/v071303

CIS > Controls v7 > 13 Data Protection > 13.04 Only Allow Access to Authorized Cloud Storage or Email Providers

URI
tmod:@turbot/cis#/control/categories/v071304

CIS > Controls v7 > 13 Data Protection > 13.05 Monitor and Detect Any Unauthorized Use of Encryption

URI
tmod:@turbot/cis#/control/categories/v071305

CIS > Controls v7 > 13 Data Protection > 13.06 Encrypt the Hard Drive of All Mobile Devices

URI
tmod:@turbot/cis#/control/categories/v071306

CIS > Controls v7 > 13 Data Protection > 13.07 Manage USB Devices

URI
tmod:@turbot/cis#/control/categories/v071307

CIS > Controls v7 > 13 Data Protection > 13.08 Manage System's External Removable Media's Read/write Configurations

URI
tmod:@turbot/cis#/control/categories/v071308

CIS > Controls v7 > 13 Data Protection > 13.09 Encrypt Data on USB Storage Devices

URI
tmod:@turbot/cis#/control/categories/v071309

CIS > Controls v7 > 14 Controlled Access Based on the Need to Know

URI
tmod:@turbot/cis#/control/categories/v0714

CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.01 Segment the Network Based on Sensitivity

URI
tmod:@turbot/cis#/control/categories/v071401

CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.02 Enable Firewall Filtering Between VLANs

URI
tmod:@turbot/cis#/control/categories/v071402

CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.03 Disable Workstation to Workstation Communication

URI
tmod:@turbot/cis#/control/categories/v071403

CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.04 Encrypt All Sensitive Information in Transit

URI
tmod:@turbot/cis#/control/categories/v071404

CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.05 Utilize an Active Discovery Tool to Identify Sensitive Data

URI
tmod:@turbot/cis#/control/categories/v071405

CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.06 Protect Information through Access Control Lists

URI
tmod:@turbot/cis#/control/categories/v071406

CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.07 Enforce Access Control to Data through Automated Tools

URI
tmod:@turbot/cis#/control/categories/v071407

CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.08 Encrypt Sensitive Information at Rest

URI
tmod:@turbot/cis#/control/categories/v071408

CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.09 t Enforce Detail Logging for Access or Changes to Sensitive Data

URI
tmod:@turbot/cis#/control/categories/v071409

CIS > Controls v7 > 15 Wireless Access Control

URI
tmod:@turbot/cis#/control/categories/v0715

CIS > Controls v7 > 15 Wireless Access Control > 15.01 Maintain an Inventory of Authorized Wireless Access Points

URI
tmod:@turbot/cis#/control/categories/v071501

CIS > Controls v7 > 15 Wireless Access Control > 15.02 Detect Wireless Access Points Connected to the Wired Network

URI
tmod:@turbot/cis#/control/categories/v071502

CIS > Controls v7 > 15 Wireless Access Control > 15.03 Use a Wireless Intrusion Detection System

URI
tmod:@turbot/cis#/control/categories/v071503

CIS > Controls v7 > 15 Wireless Access Control > 15.04 Disable Wireless Access on Devices if it is Not Required

URI
tmod:@turbot/cis#/control/categories/v071504

CIS > Controls v7 > 15 Wireless Access Control > 15.05 Limit Wireless Access on Client Devices

URI
tmod:@turbot/cis#/control/categories/v071505

CIS > Controls v7 > 15 Wireless Access Control > 15.06 Disable Peer-to-peer Wireless Network Capabilities on Wireless Clients

URI
tmod:@turbot/cis#/control/categories/v071506

CIS > Controls v7 > 15 Wireless Access Control > 15.07 Leverage the Advanced Encryption Standard (AES) to Encrypt Wireless Data

URI
tmod:@turbot/cis#/control/categories/v071507

CIS > Controls v7 > 15 Wireless Access Control > 15.08 Use Wireless Authentication Protocols that Require Mutual, Multi-Factor Authentication

URI
tmod:@turbot/cis#/control/categories/v071508

CIS > Controls v7 > 15 Wireless Access Control > 15.09 Disable Wireless Peripheral Access to Devices

URI
tmod:@turbot/cis#/control/categories/v071509

CIS > Controls v7 > 15 Wireless Access Control > 15.10 Create Separate Wireless Network for Personal and Untrusted Devices

URI
tmod:@turbot/cis#/control/categories/v071510

CIS > Controls v7 > 16 Account Monitoring and Control

URI
tmod:@turbot/cis#/control/categories/v0716

CIS > Controls v7 > 16 Account Monitoring and Control > 16.01 Maintain an Inventory of Authentication Systems

URI
tmod:@turbot/cis#/control/categories/v071601

CIS > Controls v7 > 16 Account Monitoring and Control > 16.02 Configure Centralized Point of Authentication

URI
tmod:@turbot/cis#/control/categories/v071602

CIS > Controls v7 > 16 Account Monitoring and Control > 16.03 Require Multi-factor Authentication

URI
tmod:@turbot/cis#/control/categories/v071603

CIS > Controls v7 > 16 Account Monitoring and Control > 16.04 Encrypt or Hash all Authentication Credentials

URI
tmod:@turbot/cis#/control/categories/v071604

CIS > Controls v7 > 16 Account Monitoring and Control > 16.05 Encrypt Transmittal of Username and Authentication Credentials

URI
tmod:@turbot/cis#/control/categories/v071605

CIS > Controls v7 > 16 Account Monitoring and Control > 16.06 Maintain an Inventory of Accounts

URI
tmod:@turbot/cis#/control/categories/v071606

CIS > Controls v7 > 16 Account Monitoring and Control > 16.07 Establish Process for Revoking Access

URI
tmod:@turbot/cis#/control/categories/v071607

CIS > Controls v7 > 16 Account Monitoring and Control > 16.08 Disable Any Unassociated Accounts

URI
tmod:@turbot/cis#/control/categories/v071608

CIS > Controls v7 > 16 Account Monitoring and Control > 16.09 Disable Dormant Accounts

URI
tmod:@turbot/cis#/control/categories/v071609

CIS > Controls v7 > 16 Account Monitoring and Control > 16.10 Ensure All Accounts Have An Expiration Date

URI
tmod:@turbot/cis#/control/categories/v071610

CIS > Controls v7 > 16 Account Monitoring and Control > 16.11 Lock Workstation Sessions After Inactivity

URI
tmod:@turbot/cis#/control/categories/v071611

CIS > Controls v7 > 16 Account Monitoring and Control > 16.12 Monitor Attempts to Access Deactivated Accounts

URI
tmod:@turbot/cis#/control/categories/v071612

CIS > Controls v7 > 16 Account Monitoring and Control > 16.13 Alert on Account Login Behavior Deviation

URI
tmod:@turbot/cis#/control/categories/v071613

CIS > Controls v7 > 17 Implement a Security Awareness and Training Program

URI
tmod:@turbot/cis#/control/categories/v0717

CIS > Controls v7 > 17 Implement a Security Awareness and Training Program > 17.01 Perform a Skills Gap Analysis

URI
tmod:@turbot/cis#/control/categories/v071701

CIS > Controls v7 > 17 Implement a Security Awareness and Training Program > 17.02 Deliver Training to Fill the Skills Gap

URI
tmod:@turbot/cis#/control/categories/v071702

CIS > Controls v7 > 17 Implement a Security Awareness and Training Program > 17.03 Implement a Security Awareness Program

URI
tmod:@turbot/cis#/control/categories/v071703

CIS > Controls v7 > 17 Implement a Security Awareness and Training Program > 17.04 Update Awareness Content Frequently

URI
tmod:@turbot/cis#/control/categories/v071704

CIS > Controls v7 > 17 Implement a Security Awareness and Training Program > 17.05 Train Workforce on Secure Authentication

URI
tmod:@turbot/cis#/control/categories/v071705

CIS > Controls v7 > 17 Implement a Security Awareness and Training Program > 17.06 Train Workforce on Identifying Social Engineering Attacks

URI
tmod:@turbot/cis#/control/categories/v071706

CIS > Controls v7 > 17 Implement a Security Awareness and Training Program > 17.07 Train Workforce on Sensitive Data Handling

URI
tmod:@turbot/cis#/control/categories/v071707

CIS > Controls v7 > 17 Implement a Security Awareness and Training Program > 17.08 Train Workforce on Causes of Unintentional Data Exposure

URI
tmod:@turbot/cis#/control/categories/v071708

CIS > Controls v7 > 17 Implement a Security Awareness and Training Program > 17.09 Train Workforce Members on Identifying and Reporting Incidents

URI
tmod:@turbot/cis#/control/categories/v071709

CIS > Controls v7 > 18 Application Software Security

URI
tmod:@turbot/cis#/control/categories/v0718

CIS > Controls v7 > 18 Application Software Security > 18.01 Establish Secure Coding Practices

URI
tmod:@turbot/cis#/control/categories/v071801

CIS > Controls v7 > 18 Application Software Security > 18.02 Ensure Explicit Error Checking is Performed for All In-house Developed Software

URI
tmod:@turbot/cis#/control/categories/v071802

CIS > Controls v7 > 18 Application Software Security > 18.03 Verify That Acquired Software is Still Supported

URI
tmod:@turbot/cis#/control/categories/v071803

CIS > Controls v7 > 18 Application Software Security > 18.04 Only Use Up-to-date And Trusted ThirdParty Components

URI
tmod:@turbot/cis#/control/categories/v071804

CIS > Controls v7 > 18 Application Software Security > 18.05 Only Standardized and Extensively Reviewed Encryption Algorithms

URI
tmod:@turbot/cis#/control/categories/v071805

CIS > Controls v7 > 18 Application Software Security > 18.06 Ensure Software Development Personnel are Trained in Secure Coding

URI
tmod:@turbot/cis#/control/categories/v071806

CIS > Controls v7 > 18 Application Software Security > 18.07 Apply Static and Dynamic Code Analysis Tools

URI
tmod:@turbot/cis#/control/categories/v071807

CIS > Controls v7 > 18 Application Software Security > 18.08 Establish a Process to Accept and Address Reports of Software Vulnerabilities

URI
tmod:@turbot/cis#/control/categories/v071808

CIS > Controls v7 > 18 Application Software Security > 18.09 Separate Production and Non-Production Systems

URI
tmod:@turbot/cis#/control/categories/v071809

CIS > Controls v7 > 18 Application Software Security > 18.10 Deploy Web Application Firewalls

URI
tmod:@turbot/cis#/control/categories/v071810

CIS > Controls v7 > 18 Application Software Security > 18.11 Use Standard Hardening Configuration Templates for Databases

URI
tmod:@turbot/cis#/control/categories/v071811

CIS > Controls v7 > 19 Incident Response and Management

URI
tmod:@turbot/cis#/control/categories/v0719

CIS > Controls v7 > 19 Incident Response and Management > 19.01 Document Incident Response Procedures

URI
tmod:@turbot/cis#/control/categories/v071901

CIS > Controls v7 > 19 Incident Response and Management > 19.02 Assign Job Titles and Duties for Incident Response

URI
tmod:@turbot/cis#/control/categories/v071902

CIS > Controls v7 > 19 Incident Response and Management > 19.03 Designate Management Personnel to Support Incident Handling

URI
tmod:@turbot/cis#/control/categories/v071903

CIS > Controls v7 > 19 Incident Response and Management > 19.04 Devise Organization-wide Standards for Reporting Incidents

URI
tmod:@turbot/cis#/control/categories/v071904

CIS > Controls v7 > 19 Incident Response and Management > 19.05 Maintain Contact Information For Reporting Security Incidents

URI
tmod:@turbot/cis#/control/categories/v071905

CIS > Controls v7 > 19 Incident Response and Management > 19.06 Publish Information Regarding Reporting Computer Anomalies and Incidents

URI
tmod:@turbot/cis#/control/categories/v071906

CIS > Controls v7 > 19 Incident Response and Management > 19.07 Conduct Periodic Incident Scenario Sessions for Personnel

URI
tmod:@turbot/cis#/control/categories/v071907

CIS > Controls v7 > 19 Incident Response and Management > 19.08 Create Incident Scoring and Prioritization Schema

URI
tmod:@turbot/cis#/control/categories/v071908

CIS > Controls v7 > 20 Penetration Tests and Red Team Exercises

URI
tmod:@turbot/cis#/control/categories/v0720

CIS > Controls v7 > 20 Penetration Tests and Red Team Exercises > 20.01 Establish a Penetration Testing Program

URI
tmod:@turbot/cis#/control/categories/v072001

CIS > Controls v7 > 20 Penetration Tests and Red Team Exercises > 20.02 Conduct Regular External and Internal Penetration Tests

URI
tmod:@turbot/cis#/control/categories/v072002

CIS > Controls v7 > 20 Penetration Tests and Red Team Exercises > 20.03 Perform Periodic Red Team Exercises

URI
tmod:@turbot/cis#/control/categories/v072003

CIS > Controls v7 > 20 Penetration Tests and Red Team Exercises > 20.04 Include Tests for Presence of Unprotected System Information and Artifacts

URI
tmod:@turbot/cis#/control/categories/v072004

CIS > Controls v7 > 20 Penetration Tests and Red Team Exercises > 20.05 Create a Test Bed for Elements Not Typically Tested in Production

URI
tmod:@turbot/cis#/control/categories/v072005

CIS > Controls v7 > 20 Penetration Tests and Red Team Exercises > 20.06 Use Vulnerability Scanning and Penetration Testing Tools in Concert

URI
tmod:@turbot/cis#/control/categories/v072006

CIS > Controls v7 > 20 Penetration Tests and Red Team Exercises > 20.07 Ensure Results from Penetration Test are Documented Using Open, Machine-readable Standards

URI
tmod:@turbot/cis#/control/categories/v072007

CIS > Controls v7 > 20 Penetration Tests and Red Team Exercises > 20.08 Control and Monitor Accounts Associated with Penetration Testing

URI
tmod:@turbot/cis#/control/categories/v072008