CIS Helps Businesses Obtain Digital Integrity


IT technicians are always concerned about keeping their company’s data safe and secure, while maintaining a high level of digital integrity, or performance.  The Center for Internet Security’s Critical Security Controls can help businesses to achieve digital integrity. Here are the 6 steps to achieving digital integrity by using CIS Controls:

1.  Establish a Configuration Baseline

Businesses can better understand how their assets are configured by creating a configuration baseline that applies to all authorized endpoints.  Using CIS Controls 5 and 11, organizations can create a configuration baseline allowing them to issue security alerts for unapproved changes, catalogue exceptions, and manage configurations.  

2.  Determine what software you need to monitor the Baseline

Once businesses have a baseline in place, they need to make sure that their baselines are being monitored.  Using CIS Controls 7-17, companies can include endpoint master images and OS binaries into the monitoring system.

3.  Configure Monitoring Systems

Using CIS Control 3.1 and 3.2 businesses can configure their scanners to check for vulnerabilities.  They should then set up a system to periodically assess network parameters and notify users of changes to the system.

4.  Monitor for Vulnerabilities

After setting up the scanning system, businesses need to follow CIS Control 3 and continuously monitor the scanner for malicious activity or suspicious changes to the system.

5.  Start Change Management

Creating a change control board can further advance the security of the system.  It establishes a formal system of evaluating vulnerabilities. It can rank the risks based on severity, making it easy for businesses to know which threats to focus on first.

6.  Implement a training program

Once all of these security measures are in place, make sure your staff is trained in security awareness for employees.  CIS Control 18 helps businesses understand what skills every employee should possess in order to maintain cyber security.

Story via TripWire