CIS - Establishing Essential Cyber Hygiene
CIS - Establishing Essential Cyber Hygiene
CIS - Establishing Essential Cyber Hygiene
Essential
Cyber Hygiene
April 2022
The Center for Internet Security® (CIS®) would like to thank the many security experts who This work is licensed under a
Creative Commons Attribution-
volunteer their time and talent to support the CIS Critical Security Controls® (CIS Controls®) Non Commercial-No Derivatives
and other CIS work. CIS products represent the effort of a veritable army of volunteers from 4.0 International Public License
(the link can be found at https://
across the industry, generously giving their time and talent in the name of a more secure creativecommons.org/licenses/
online experience for everyone. by-nc-nd/4.0/legalcode).
To further clarify the Creative
Commons license related to the
EDITORS CIS Critical Security Controls®
Valecia Stocchetti, CIS (CIS Controls®) content, you are
authorized to copy and redistribute
Robin Regnier, CIS the content as a framework for use
by you, within your organization and
outside of your organization, for non-
CONTRIBUTORS commercial purposes only, provided
Emily Sochia, CIS that (i) appropriate credit is given to
CIS, and (ii) a link to the license is
Josh Franklin, CIS provided. Additionally, if you remix,
Tyler Scarlotta, CIS transform, or build upon the CIS
Controls, you may not distribute the
modified materials. Users of the CIS
Controls framework are also required
to refer to (http://www.cisecurity.org/
controls/) when referring to the CIS
Controls in order to ensure that users
are employing the most up-to-date
guidance. Commercial use of the
CIS Controls is subject to the prior
approval of the Center for Internet
Security, Inc.(CIS®).
Conclusion 21
Appendix A: Policy Templates 22
Appendix B: Links and Resources 24
Appendix C: Acronyms and Abbreviations 25
In general, many cyber-attacks can be attributed to a lack of good cyber hygiene. Simple
enough, but there is an important idea in here. Study after study, and test after test gives us
the same depressing result. Almost all successful attacks take advantage of conditions that
could reasonably be described as “poor hygiene” including:
• Failure to patch known vulnerabilities
• Poor configuration management
• Inefficient management of administrative privileges
At CIS, we attribute these failures primarily to the complexity of modern systems management,
as well as a noisy and confusing environment of technology, marketplace claims, and
oversight/regulation (“The Fog of More”). Defenders are overwhelmed. Therefore, any large-
scale security improvement program needs a way to bring focus and attention to the most
effective and fundamental things that need to be done.
We do this at CIS by moving “cyber hygiene” from a notion or tagline into a campaign
of specific actions, supported by a complementary market ecosystem of content, tools,
training, and services. Recently, we codified our definition of “essential cyber hygiene” as
consisting of the Safeguards found in Implementation Group 1 (IG1) of the CIS Critical Security
Controls (CIS Controls). By defining IG1, we can then specify tools that can be put in place to
implement the actions, measurements to track progress or maturity, and reporting that can
be used to manage an enterprise improvement program. In today’s environment of shared
technology, linked by complex business relationships and hidden dependencies, this approach
provides a specific way to negotiate “trust” and an “expectation” of security. (Are you a safe
partner to bring into my supply chain? Can I count on this merchant to safely hold my financial
information?) This approach is better than paper surveys or inconsistent interpretation of
abstract security requirements.
IG1 is not just another list of good things to do; it is an essential set of steps that helps all
enterprises deal with the most common types of attacks we see in real life. Our recent release
of the CIS Community Defense Model v2.0 provides the technical underpinning for that
declaration.
The Center for Internet Security and its divisions, the Multi-State Information Sharing and
Analysis Center® (MS-ISAC®) and Elections Infrastructure Information Sharing and Analysis
Center® (EI-ISAC®), are offering this guide as a resource to assist with the implementation of
essential cyber hygiene, in alignment with the Nationwide Cybersecurity Review (NCSR) and
National Institute of Standards and Technology® Cybersecurity Framework (NIST® CSF), by
providing the tools, resources, and templates that are needed.
When tasked to implement a cybersecurity program, many enterprises ask “How do we get
started?” In response, the Controls Community sorted the Safeguards in the CIS Controls
into three Implementation Groups (IGs) based on their difficulty and cost to implement. IG1
is the group that is least costly and difficult to implement and are the Safeguards we assert
that every enterprise should deploy. Applying all of the Safeguards listed in IG1 will help
thwart general, non-targeted attacks and strengthen an enterprise’s security program. IG1 is
the definition of essential cyber hygiene and represents a minimum standard of information
security for all enterprises. We acknowledge that a listing of activities will not be the silver
bullet for all security threats, but aim to provide activities for defending against common
threats. For enterprises that face more sophisticated attacks or that must protect more critical
data or systems, IG1 Safeguards provide the foundation for the other two Implementation
Groups (IG2 and IG3).
Enterprises should first review this guide, which will provide an overview of each Safeguard
in IG1 as well as why they are important to implement. Resources, tools, and policy templates
that can be used to help facilitate implementation of these Safeguards are provided after the
applicable Safeguard information, as well as in Appendices A and B of this guide. Enterprises
can learn more about how they can gain access to multiple cybersecurity tools and resources,
at no cost, through a CIS SecureSuite® Membership and MS- and EI-ISAC membership.
The CIS Controls are a prioritized set of defensive actions aimed to protect enterprises from
the most common attacks. They are developed by a community of information technology
(IT) experts who apply their first-hand experience as cyber defenders to create these globally
accepted security best practices. Each CIS Control includes smaller actions, known as CIS
Safeguards, which focus on measurable actions so you can more easily track your progress
in applying effective protection against common attacks. There are 153 Safeguards in CIS
Controls v8.
IG2 IG3
IG3
IG3 assists enterprises with IT security experts to secure sensitive and
confidential data. IG3 aims to prevent and/or lessen the impact of
sophisticated attacks.
23
SAFEGUARDS
IG2
IG2 assists enterprises managing IT infrastructure of multiple
departments with differing risk profiles. IG2 aims to help enterprises cope
with increased operational complexity.
74
SAFEGUARDS
IG1
IG1 is the definition of essential cyber hygiene and represents a minimum
standard of information security for all enterprises. IG1 assists enterprises
with limited cybersecurity expertise thwart general, non-targeted attacks.
56
SAFEGUARDS
Why It Matters? Enterprises cannot defend what they do not know they have. Managed control of all enterprise
assets also plays a critical role in security monitoring, incident response, system backup, and
recovery. Enterprises should know what data is critical to them (CIS Control 3), and proper
asset management will help identify those enterprise assets that hold or manage this critical
data, so that appropriate security controls can be applied.
Safeguards
SAFEGUARD NIST CSF SECURITY FUNCTION TITLE/DESCRIPTION
CIS Asset Tracking Spreadsheet Spreadsheet to help with asset and data inventory 1.1, 1.2
Nmap® Network Scanning Tool used for reconnaissance and fingerprinting 1.1, 1.2
Zenmap Nmap with a Graphical User Interface (GUI) 1.1, 1.2
Spiceworks® IT inventory and asset management platform 1.1, 1.2
Open-AudIT® Network device discovery and inventory auditing tool 1.1, 1.2
Microsoft® Configuration Manager Windows® application within Microsoft® Endpoint Management used for configuration 1.1, 1.2
management
NIST SP 1800-5 IT Asset Management 1.1, 1.2
Establishing Essential Cyber Hygiene CIS Control 01: Inventory and Control of Enterprise Assets 4
CIS CONTROL
02 Inventory and Control of
Software Assets
Overview Actively manage (inventory, track, and correct) all software (operating systems and
applications) on the network so that only authorized software is installed and can execute,
and that unauthorized and unmanaged software is found and prevented from installation
or execution.
Why It Matters? A complete software inventory is a critical foundation for preventing attacks. Attackers
continuously scan target enterprises looking for vulnerable versions of software that can
be remotely exploited. For example, if a user opens a malicious website or attachment with
a vulnerable browser, an attacker can often install backdoor programs and bots that give
the attacker long-term control of the system. Attackers can also use this access to move
laterally through the network. One of the key defenses against these attacks is updating and
patching software (CIS Control 7). However, without a complete inventory of software assets,
an enterprise cannot determine if they have vulnerable software, or if there are potential
licensing violations.
Safeguards
SAFEGUARD NIST CSF SECURITY FUNCTION TITLE/DESCRIPTION
CIS Asset Tracking Spreadsheet Spreadsheet to help with asset and data inventory 2.1, 2.2, 2.3
Nmap® Network Scanning Tool used for reconnaissance and fingerprinting 2.1, 2.2, 2.3
Zenmap Nmap with a Graphical User Interface (GUI) 2.1, 2.2, 2.3
Spiceworks® IT inventory and asset management platform 2.1, 2.2, 2.3
Open-AudIT® Network device discovery and inventory auditing tool 2.1, 2.2, 2.3
Microsoft® Configuration Manager Windows® application within Microsoft® Endpoint Management used for configuration 2.1, 2.2, 2.3
management
NIST SP 1800-5 IT Asset Management 2.1, 2.2, 2.3
Supported Versions of Windows® List of currently supported versions of Windows® 10 and 11 2.2
Endoflife.date Community-maintained list of end-of-life software 2.2
Uninstall or Remove Apps and Programs in Step-by-step on how to remove a program or application on Windows® 10 2.2
Windows® 10
How to Uninstall Apps on your Mac Step-by-step on how to remove a program or application on macOS 2.2
Establishing Essential Cyber Hygiene CIS Control 02: Inventory and Control of Software Assets 5
CIS CONTROL
03 Data
Protection
Overview Develop processes and technical controls to identify, classify, securely handle, retain, and
dispose of data.
Why It Matters? Data is no longer only contained within an enterprise’s border; it is in the cloud, on portable
end-user devices where users work from home, and is often shared with partners or online
services that might have it anywhere in the world. In addition to sensitive data an enterprise
holds related to finances, intellectual property, and customer data, there also might be
numerous international regulations for protection of personal data. Data privacy has become
increasingly important, and enterprises are learning that privacy is about the appropriate use
and management of data, not just encryption. Data must be appropriately managed through
its entire life cycle. These privacy rules can be complicated for multi-national enterprises of
any size; however, there are fundamentals that can apply to all.
Safeguards
SAFEGUARD NIST CSF SECURITY FUNCTION TITLE/DESCRIPTION
CIS Asset Tracking Spreadsheet Spreadsheet to help with asset and data inventory 3.1, 3.2
Active Directory Microsoft Windows® directory service for account management and access control 3.3, 3.4
Local Group Policy Editor Microsoft Management Console (MMC) snap-in used to configure or modify Group Policy settings 3.3, 3.4
with Group Policy Objects (GPOs)
OpenLDAP Open source implementation of the Lightweight Directory Access Protocol (LDAP) 3.3
Deploy Implementing Retention of How to set retention periods in Active Directory through Dynamic Access Control 3.4
Information on File Servers (Windows®)
Disk Wipe Portable Windows® application to permanently delete data volumes 3.5
NIST SP 800-88 Rev. 1 Guides for Media Sanitization 3.5
VeraCrypt On-the-fly encryption 3.6
Apple FileVault Disk encryption for macOS 3.6
BitLocker Built-in Windows® 10 utility used for full volume encryption 3.6
Why It Matters? As delivered from manufacturers and resellers, the default configurations for enterprise
assets and software are normally geared towards ease-of-deployment and ease-of-use,
rather than security. Basic controls, open services and ports, default accounts or passwords,
pre-configured Domain Name System (DNS) settings, older (vulnerable) protocols, and pre-
installation of unnecessary software can all be exploitable if left in their default state. Further,
these security configuration updates need to be managed and maintained over the life cycle
of enterprise assets and software. Configuration updates need to be tracked and approved
through configuration management workflow process to maintain a record that can be
reviewed for compliance, leveraged for incident response, and to support audits. This CIS
Control is important to on-premises devices, as well as remote devices, network devices, and
cloud environments.
Safeguards
SAFEGUARD NIST CSF SECURITY FUNCTION TITLE/DESCRIPTION
CIS Benchmarks™ Secure configuration guidelines for 100+ technologies, including operating systems, applications, 4.1, 4.2, 4.3, 4.4, 4.5, 4.7
and network devices
CIS SecureSuite® Membership No-cost membership to SLTTs, with access to CIS-CAT Pro Assessor, CIS Build Kits, CIS 4.1, 4.2, 4.3, 4.4, 4.5, 4.7
Benchmarks, and more
CIS-CAT® Pro Tool to scan for proper CIS Benchmark configurations for applications, operating systems, and 4.1, 4.2, 4.3, 4.4, 4.5, 4.7
network devices
CIS Build Kits ZIP files that contain a GPO for each profile within the corresponding CIS Benchmark 4.1, 4.2, 4.3, 4.4, 4.5, 4.7
Establishing Essential Cyber Hygiene CIS Control 04: Secure Configuration of Enterprise Assets and Software 7
NAME DESCRIPTION CIS SAFEGUARD(S)
Active Directory Microsoft Windows® directory service for account management and access control 4.1, 4.2, 4.3, 4.4, 4.5, 4.7
Local Group Policy Editor Microsoft Management Console (MMC) snap-in used to configure or modify Group Policy settings 4.1, 4.2, 4.3, 4.4, 4.5, 4.7
with Group Policy Objects (GPOs)
OpenSCAP Ecosystem providing many tools to assist with assessment, measurement, and enforcement of 4.1, 4.2, 4.3, 4.4, 4.5, 4.7
baselines
OpenVAS Framework for vulnerability scanning and management 4.1, 4.2, 4.3, 4.4, 4.5, 4.7
DISA STIGs A set of configuration guides developed and maintained by the U.S. Department of Defense (DoD) 4.1, 4.2, 4.3, 4.4, 4.5, 4.7
RANCID Monitors the configuration of network devices 4.2
OpenNAC Network access control (NAC) solution 4.2
Zabbix Monitoring tool for IT infrastructure 4.2
Establishing Essential Cyber Hygiene CIS Control 04: Secure Configuration of Enterprise Assets and Software 8
CIS CONTROL
05 Account
Management
Overview Use processes and tools to assign and manage authorization to credentials for user
accounts, including administrator accounts, as well as service accounts, to enterprise
assets and software.
Why It Matters? It is easier for an external or internal threat actor to gain unauthorized access to enterprise
assets or data through using valid user credentials than through “hacking” the environment.
There are many ways to covertly obtain access to user accounts, including: weak passwords,
accounts still valid after a user leaves the enterprise, dormant or lingering test accounts,
shared accounts that have not been changed in months or years, service accounts embedded
in applications for scripts, a user having the same password as one they use for an online
account that has been compromised (in a public password dump), using social engineering
techniques to obtain a password, or using malware to capture passwords or tokens in memory
or over the network. Defenders need to ensure that controls are in place to protect enterprise
accounts, especially those with higher privileges.
Safeguards
SAFEGUARD NIST CSF SECURITY FUNCTION TITLE/DESCRIPTION
OpenLDAP Open source implementation of the Lightweight Directory Access Protocol (LDAP) 5.1
Active Directory Microsoft Windows® directory service for account management and access control 5.1, 5.3, 5.4
Local Group Policy Editor Microsoft Management Console (MMC) snap-in used to configure or modify Group Policy settings 5.1, 5.3, 5.4
with Group Policy Objects (GPOs)
CIS Password Policy Guide CIS Guidance for secure usage of passwords in an enterprise 5.2
KeePass Password manager 5.2
Password Safe® Simple and secure password management 5.2
Have I Been Pwnd Public password data dumps 5.2
Specops Password Auditor Active Directory password audit tool 5.2
NIST SP 800-63 Suite of documents including NIST SP 800-63-3, NIST SP800-63A, NIST 800-63B, and 5.2, 5.4
NIST 800-63C
CIS Benchmarks™ Secure configuration guidelines for 100+ technologies, including operating systems, applications, 5.4
and network devices
CIS SecureSuite® Membership No-cost membership to SLTTs, with access to CIS-CAT Pro Assessor, CIS Build Kits, CIS 5.4
Benchmarks, and more
CIS-CAT® Pro Tool to scan for proper CIS Benchmark configurations for applications, operating systems, and 5.4
network devices
CIS Build Kits ZIP files that contain a GPO for each profile within the corresponding CIS Benchmark 5.4
Why It Matters? Where CIS Control 5 deals specifically with account management, CIS Control 6 focuses on
managing what access these accounts have, ensuring users only have access to the data or
enterprise assets appropriate for their role, and ensuring that there is strong authentication
for critical or sensitive enterprise data or functions. Attackers will compromise any account
that will grant them access to a network, especially administrator accounts that have
elevated privileges. Accounts should only have the minimal authorization needed for the
role. Developing consistent access rights for each role and assigning roles to users is a best
practice. Developing a program for complete provision and de-provisioning access is also
important. Centralizing this function is ideal.
Safeguards
SAFEGUARD NIST CSF SECURITY FUNCTION TITLE/DESCRIPTION
Active Directory Microsoft Windows® directory service for account management and access control 6.1, 6.2
Local Group Policy Editor Microsoft Management Console (MMC) snap-in used to configure or modify Group Policy settings 6.1, 6.2
with Group Policy Objects (GPOs)
NIST SP 800-63 Suite of documents including NIST SP 800-63-3, NIST SP800-63A, NIST 800-63B, and 6.1, 6.2, 6.3, 6.4, 6.5
NIST 800-63C
Google Authenticator 2-step verification codes on your phone 6.3, 6.4, 6.5
Microsoft Authenticator Multi-factor authentication application used for Microsoft® products 6.3, 6.4, 6.5
GCA Cybersecurity Toolkit for Small Links to popular platforms providing instructions on how to turn on multi-factor 6.3, 6.4, 6.5
Business: Set Up 2FA on Your Accounts authentication (MFA)
Two-Factor Authentication for Apple ID How to set up two-factor authentication for your Apple ID 6.3, 6.4, 6.5
Establishing Essential Cyber Hygiene CIS Control 06: Access Control Management 10
CIS CONTROL
07 Continuous Vulnerability
Management
Overview Develop a plan to continuously assess and track vulnerabilities on all enterprise assets
within the enterprise’s infrastructure, in order to remediate, and minimize, the window of
opportunity for attackers. Monitor public and private industry sources for new threat and
vulnerability information.
Why It Matters? Thousands of vulnerabilities are published each year, with several more that are unknown.
Cyber defenders are constantly being challenged from attackers who are looking for
vulnerabilities within their infrastructure to exploit and gain access. Defenders must have
timely threat information available to them about: software updates, patches, security
advisories, threat bulletins, etc., and they should regularly review their environment to identify
these vulnerabilities before the attackers do. Understanding and managing vulnerabilities is a
continuous activity, requiring focus of time, attention, and resources.
Safeguards
SAFEGUARD NIST CSF SECURITY FUNCTION TITLE/DESCRIPTION
CIS Benchmarks™ Secure configuration guidelines for 100+ technologies, including operating systems, applications, and 7.1, 7.2, 7.3, 7.4
network devices
CIS SecureSuite® Membership No-cost membership to SLTTs, with access to CIS-CAT Pro Assessor, CIS Build Kits, CIS Benchmarks, and more 7.1, 7.2, 7.3, 7.4
CIS-CAT® Pro Tool to scan for proper CIS Benchmark configurations for applications, operating systems, and network devices 7.1, 7.2, 7.3, 7.4
CIS Build Kits ZIP files that contain a GPO for each profile within the corresponding CIS Benchmark 7.1, 7.2, 7.3, 7.4
Active Directory Microsoft Windows® directory service for account management and access control 7.1, 7.2, 7.3, 7.4
Local Group Policy Editor Microsoft Management Console (MMC) snap-in used to configure or modify Group Policy settings with Group 7.1, 7.2, 7.3, 7.4
Policy Objects (GPOs)
OpenSCAP Ecosystem providing many tools to assist with assessment, measurement, and enforcement of baselines 7.1, 7.2, 7.3, 7.4
OpenVAS Framework for vulnerability scanning and management 7.1, 7.2, 7.3, 7.4
DISA STIGs A set of configuration guides developed and maintained by the U.S. Department of Defense (DoD) 7.1, 7.2, 7.3, 7.4
Apple® Auto-update—iOS Automatic updates for Apple® iOS devices 7.1, 7.2, 7.3, 7.4
Apple® Auto-update—macOS Automatic updates for Apple® macOS devices 7.1, 7.2, 7.3, 7.4
Auto-update Windows® Automatic updates for Windows® devices 7.1, 7.2, 7.3, 7.4
Auto-update Microsoft® Office on macOS Automatic updates for Microsoft® Office on macOS 7.1, 7.2, 7.3, 7.4
Auto-update Android™ Automatic updates for Android devices 7.1, 7.2, 7.3, 7.4
U.S. National Vulnerability Database (NVD) Repository of standards based on vulnerability management data 7.1, 7.2, 7.3, 7.4
Nmap® Scripting Engine (NSE) Tool used for vulnerability scanning (including identified Common Vulnerabilities and Exposures (CVEs)) 7.1, 7.2, 7.3, 7.4
Lynis Security audit tool used for system hardening 7.1, 7.2, 7.3, 7.4
NIST SP 800-40 Rev. 4 Guide to Enterprise Patch Management Planning: Preventive Maintenance for Technology 7.1, 7.2, 7.3, 7.4
Establishing Essential Cyber Hygiene CIS Control 07: Continuous Vulnerability Management 11
CIS CONTROL
08 Audit Log
Management
Overview Collect, alert, review, and retain audit logs of events that could help detect, understand, or
recover from an attack.
Why It Matters? Log collection and analysis is important for an enterprise’s ability to detect malicious activity
quickly. Sometimes audit records are the only evidence of a successful attack. Attackers
know that many enterprises keep audit logs for compliance purposes, but rarely analyze
them. They know there’s very little risk of being exposed through the audit logs if the logs
are never analyzed. As a result, attackers use this knowledge to hide their location, malicious
software, and activities on victim machines. Due to poor or nonexistent log analysis processes,
attackers sometimes control victim machines for months or years without anyone in the target
enterprise knowing. Logging records are critical for incident response. After an attack has
been detected, log analysis can help enterprises understand the extent of an attack.
Safeguards
SAFEGUARD NIST CSF SECURITY FUNCTION TITLE/DESCRIPTION
CIS Benchmarks™ Secure configuration guidelines for 100+ technologies, including operating systems, applications, 8.1, 8.2, 8.3
and network devices
CIS SecureSuite® Membership No-cost membership to SLTTs, with access to CIS-CAT Pro Assessor, CIS Build Kits, CIS 8.1, 8.2, 8.3
Benchmarks, and more
CIS-CAT® Pro Tool to scan for proper CIS Benchmark configurations for applications, operating systems, and 8.1, 8.2, 8.3
network devices
CIS Build Kits ZIP files that contain a GPO for each profile within the corresponding CIS Benchmark 8.1, 8.2, 8.3
Active Directory Microsoft Windows® directory service for account management and access control 8.1, 8.2, 8.3
Local Group Policy Editor Microsoft Management Console (MMC) snap-in used to configure or modify Group Policy settings 8.1, 8.2, 8.3
with Group Policy Objects (GPOs)
OpenSCAP Ecosystem providing many tools to assist with assessment, measurement, and enforcement of 8.1, 8.2, 8.3
baselines
OpenVAS Framework for vulnerability scanning and management 8.1, 8.2, 8.3
DISA STIGs A set of configuration guides developed and maintained by the U.S. Department of Defense (DoD) 8.1, 8.2, 8.3
ELK Stack™ Acronym for three open source projects (Elasticsearch®, Logstash®, Kibana®) used for log 8.1, 8.2, 8.3
aggregation
Syslog-ng® Log management solution for Unix and Unix-like systems 8.1, 8.2, 8.3
AlienVault® OSSIM Open-source security information and event management (SIEM) system 8.1, 8.2, 8.3
Establishing Essential Cyber Hygiene CIS Control 08: Audit Log Management 12
CIS CONTROL
09 Email and Web Browser
Protections
Overview Improve protections and detections of threats from email and web vectors, as these are
opportunities for attackers to manipulate human behavior through direct engagement.
Why It Matters? Web browsers and email clients are very common points of entry for attackers because of
their direct interaction with users inside an enterprise. Content can be crafted to entice or
spoof users into disclosing credentials, providing sensitive data, or providing an open channel
to allow attackers to gain access, thus increasing risk to the enterprise. Since email and web
are the main means that users interact with external and untrusted users and environments,
these are prime targets for both malicious code and social engineering. Additionally, as
enterprises move to web-based email, or mobile email access, users no longer use traditional
full-featured email clients, which provide embedded security controls like connection
encryption, strong authentication, and phishing reporting buttons. Defenders must ensure
that browsers and email clients are kept up to date and that other activities, such as using
DNS filtering services, are implemented to reduce the risk of a system communicating with a
malicious domain.
Safeguards
SAFEGUARD NIST CSF SECURITY FUNCTION TITLE/DESCRIPTION
9.1 Protect Ensure Use of Only Fully Supported Browsers and Email Clients
Ensure only fully supported browsers and email clients are allowed to execute in the enterprise, only using the latest version of
browsers and email clients provided through the vendor.
9.2 Protect Use DNS Filtering Services
Use DNS filtering services on all enterprise assets to block access to known malicious domains.
U.S. National Vulnerability Database (NVD) Repository of standards based on vulnerability management data 9.1
Nmap® Scripting Engine (NSE) Tool used for vulnerability scanning (including identified Common Vulnerabilities and 9.1
Exposures (CVEs))
Lynis Security audit tool used for system hardening 9.1
NIST SP 800-40 Rev. 4 Guide to Enterprise Patch Management Planning: Preventive Maintenance for Technology 9.1
Comodo Dragon Virtualized browser 9.1
NIST SP 800-177 Rev. 1 Trustworthy Email 9.1, 9.2
MS-ISAC® and EI-ISAC® Service: Malicious MS- and EI-ISAC DNS filtering service that prevents IT systems from connecting to harmful 9.2
Domain Blocking and Reporting (MDBR) web domains
Quad9® Domain Name System (DNS) filtering service 9.2
OpenDNS® Domain Name System (DNS) filtering service 9.2
Establishing Essential Cyber Hygiene CIS Control 09: Email and Web Browser Protections 13
CIS CONTROL
10 Malware
Defenses
Overview Prevent or control the installation, spread, and execution of malicious applications, code,
or scripts on enterprise assets.
Why It Matters? Malicious software (sometimes categorized as viruses or Trojans) is an integral and dangerous
aspect of internet threats. They can have many purposes, from capturing credentials, stealing
data, identifying other targets within the network, and encrypting or destroying data. Malware
is ever-evolving and adaptive, as modern variants leverage machine learning techniques.
Malware defenses must be able to operate in this dynamic environment through automation,
timely and rapid updating, and integration with other processes like vulnerability management
and incident response. They must be deployed at all possible entry points and enterprise
assets to detect, prevent spread, or control the execution of malicious software or code.
Safeguards
SAFEGUARD NIST CSF SECURITY FUNCTION TITLE/DESCRIPTION
MS-ISAC® and EI-ISAC® Service: Malicious No-cost web-based sandbox to submit suspicious files to in a controlled and non-public fashion 10.1
Code Analysis Platform (MCAP)
European Institute for Computer Antivirus File used to test anti-malware appliances 10.1, 10.2
Research (EICAR) Anti-Virus Test File
ClamAV Antimalware toolkit for UNIX 10.1, 10.2
Bitdefender® Antivirus Free Antivirus for Android 10.1, 10.2
Windows® Defender Security Center Anti-malware application built into Windows® 10.1, 10.2
Active Directory Microsoft Windows® directory service for account management and access control 10.3
Local Group Policy Editor Microsoft Management Console (MMC) snap-in used to configure or modify Group Policy settings 10.3
with Group Policy Objects (GPOs)
OpenSCAP Ecosystem providing many tools to assist with assessment, measurement, and enforcement of 10.3
baselines
OpenVAS Framework for vulnerability scanning and management 10.3
DISA STIGs A set of configuration guides developed and maintained by the U.S. Department of Defense (DoD) 10.3
CIS Benchmarks™ Secure configuration guidelines for 100+ technologies, including operating systems, applications, 10.3
and network devices
CIS SecureSuite® Membership No-cost membership to SLTTs, with access to CIS-CAT Pro Assessor, CIS Build Kits, CIS 10.3
Benchmarks, and more
CIS-CAT® Pro Tool to scan for proper CIS Benchmark configurations for applications, operating systems, and 10.3
network devices
CIS Build Kits ZIP files that contain a GPO for each profile within the corresponding CIS Benchmark 10.3
Why It Matters? There has been an exponential rise in ransomware over the last few years. It is not a new
threat, though it has become more commercialized and organized as a reliable method
for attackers to make money. If an attacker encrypts an enterprise’s data and demands
ransom for its restoration, having a recent backup to recover to a known, trusted state can
be helpful. However, as ransomware has evolved, it has also become an extortion technique,
where data is exfiltrated before being encrypted, and the attacker asks for payment to
restore the enterprise’s data, as well as to keep it from being sold or publicized. In this case,
restoration would only solve the issue of restoring systems to a trusted state and continuing
operations. Leveraging the guidance within IG1 of the CIS Controls will help reduce the risk of
ransomware through improved cyber hygiene, as attackers usually use older or basic exploits
on insecure systems.
Safeguards
SAFEGUARD NIST CSF SECURITY FUNCTION TITLE/DESCRIPTION
DHS CISA & MS-ISAC® Joint Ransomware best practices and recommendations are based on operational insight from CISA 11.1, 11.2, 11.3, 11.4
Ransomware Guide (Cybersecurity and Infrastructure Security Agency) and the Multi-State Information Sharing and
Analysis Center (MS-ISAC)
VeraCrypt On-the-fly encryption 11.1, 11.2, 11.3, 11.4
Microsoft® Backup and Restore Built-in backup utility tool 11.1, 11.2, 11.3, 11.4
Microsoft® Volume Shadow Copy Tool to create backup copies or snapshots of files or volumes 11.1, 11.2, 11.3, 11.4
Service (VSS)
Bacula® Network backup and recovery solution 11.1, 11.2, 11.3, 11.4
Amanda Network Backup Backup tool 11.1, 11.2, 11.3, 11.4
Apple Time Machine Built-in backup utility tool for macOS 11.1, 11.2, 11.3, 11.4
No More Ransom Website to help victims of ransomware retrieve their data, report a crime, and more 11.1, 11.2, 11.3, 11.4
Clonezilla® Disk imaging and cloning tool 11.1, 11.2, 11.3, 11.4
Redo™ Backup and disaster recovery tool 11.1, 11.2, 11.3, 11.4
DHS CISA & MS-ISAC® Joint Ransomware best practices and recommendations are based on operational insight from CISA 11.1, 11.2, 11.3, 11.4
Ransomware Guide (Cybersecurity and Infrastructure Security Agency) and the Multi-State Information Sharing and
Analysis Center (MS-ISAC)
VeraCrypt On-the-fly encryption 11.1, 11.2, 11.3, 11.4
Microsoft® Backup and Restore Built-in backup utility tool 11.1, 11.2, 11.3, 11.4
Why It Matters? Secure network infrastructure is an essential defense against attacks. Network infrastructure
includes devices such as physical and virtualized gateways, firewalls, wireless access points,
routers, and switches. Default configurations for network devices are geared for ease-of-
deployment and ease-of-use—not security. Potential default vulnerabilities include open
services and ports, default accounts and passwords (including service accounts), support for
older vulnerable protocols, and pre-installation of unnecessary software. Attackers search for
vulnerable default settings, gaps or inconsistencies in firewall rule sets, routers, and switches
and use those holes to penetrate defenses. They exploit flaws in these devices to gain access
to networks, redirect traffic on a network, and intercept data while in transmission. Ensuring
that network infrastructure is kept up to date as well as establishing secure configurations
(Safeguard 4.2) is an important line of defense to mitigate the risk of an attack.
Safeguards
SAFEGUARD NIST CSF SECURITY FUNCTION TITLE/DESCRIPTION
Establishing Essential Cyber Hygiene CIS Control 12: Network Infrastructure Management 16
CIS CONTROL
14 Security Awareness
and Skills Training
Overview Establish and maintain a security awareness program to influence behavior among the
workforce to be security conscious and properly skilled to reduce cybersecurity risks to
the enterprise.
Why It Matters? The actions of people play a critical part in the success or failure of an enterprise’s security
program. It is easier for an attacker to entice a user to click a link or open an email attachment
to install malware in order to get into an enterprise, than to find a network exploit to do it
directly. Users themselves, both intentionally and unintentionally, can cause incidents as
a result of mishandling sensitive data, sending an email with sensitive data to the wrong
recipient, losing a portable end-user device, using weak passwords, or using the same
password they use on public sites. No security program can effectively address cyber risk
without a means to address this fundamental human vulnerability. An enterprise’s training
material should be reviewed and updated regularly. This will increase the culture of security
and discourage risky workarounds.
Safeguards
SAFEGUARD NIST CSF SECURITY FUNCTION TITLE/DESCRIPTION
Establishing Essential Cyber Hygiene CIS Control 14: Security Awareness and Skills Training 17
NAME DESCRIPTION CIS SAFEGUARD(S)
MS-ISAC® Newsletter Subscription Newsletters, advisories, and webinars on cybersecurity threats 14.1, 14.2, 14.3, 14.4,
14.5, 14.6, 14.7, 14.8
MS-ISAC® Cybersecurity Awareness Toolkit Features educational materials designed to raise cybersecurity awareness. Digital materials are 14.1, 14.2, 14.3, 14.4,
aggregated for your use. 14.5, 14.6, 14.7, 14.8
Federal Virtual Training Environment Free online cybersecurity training to State, Local, Tribal, and Territorial (SLTT) governments 14.1, 14.2, 14.3, 14.4,
(FedVTE) Online Courses 14.5, 14.6, 14.7, 14.8
National Cyber Security Alliance (NCSA®) Nonprofit promoting cybersecurity awareness and education 14.1, 14.2, 14.3, 14.4,
14.5, 14.6, 14.7, 14.8
Security Awareness Toolbox Security awareness training resources 14.1, 14.2, 14.3, 14.4,
14.5, 14.6, 14.7, 14.8
YouTube: StaySafeOnline.org Educational videos 14.1, 14.2, 14.3, 14.4,
14.5, 14.6, 14.7, 14.8
Establishing Essential Cyber Hygiene CIS Control 14: Security Awareness and Skills Training 18
CIS CONTROL
15 Service Provider
Management
Overview Develop a process to evaluate service providers who hold sensitive data, or are
responsible for an enterprise’s critical IT platforms or processes, to ensure these providers
are protecting those platforms and data appropriately.
Why It Matters? In our modern, connected world, enterprises rely on vendors and partners to help manage
their data or rely on third-party infrastructure for core applications or functions. There
have been numerous examples where third-party breaches have significantly impacted an
enterprise; for example, as early as the late 2000s, payment cards were compromised after
attackers infiltrated smaller third-party vendors in the retail industry. More recent examples
include ransomware attacks that impact an enterprise indirectly, due to one of their service
providers being locked down, causing disruption to business. Or worse, if directly connected,
a ransomware attack could encrypt data on the main enterprise. Third-party providers
serve as attractive targets for cyber-attacks due to the level of access they afford actors
into the clients’ networks and the ease with which actors can affect multiple victims by
compromising one entity.
Safeguards
SAFEGUARD NIST CSF SECURITY FUNCTION TITLE/DESCRIPTION
CIS Companion Guide—Establishing Guideline questionnaire to ensure that the enterprise’s essential cyber hygiene needs are met by 15.1
Essential Cyber Hygiene Through a their MSP
Managed Service Provider (MSP)
FedRAMP Standardized approach to security and risk assessment for cloud technologies and federal 15.1
agencies
Establishing Essential Cyber Hygiene CIS Control 15: Service Provider Management 19
CIS CONTROL
17 Incident Response
Management
Overview Establish a program to develop and maintain an incident response capability (e.g., policies,
plans, procedures, defined roles, training, and communications) to prepare, detect, and
quickly respond to an attack.
Why It Matters? A comprehensive cybersecurity program includes protections, detections, response, and
recovery capabilities. Often, the final two get overlooked in immature enterprises, or the
response technique to compromised systems is just to re-image them to original state,
and move on. The primary goal of incident response is to identify threats on the enterprise,
respond to them before they can spread, and remediate them before they can cause harm.
Without understanding the full scope of an incident, how it happened, and what can be
done to prevent it from happening again, defenders will just be in a perpetual “whack-a-
mole” pattern.
Safeguards
SAFEGUARD NIST CSF SECURITY FUNCTION TITLE/DESCRIPTION
MS-ISAC® and EI-ISAC® Service: Cyber SLTT governments can report incidents to the MS-ISAC Call 866-787-4722 or email soc@ 17.1, 17.2, 17.3
Incident Response Team (CIRT) cisecurity.org for assistance from the MS-ISAC/EI-ISAC Security Operations Center (SOC) and
Cyber Incident Response Team (CIRT)
NIST SP 800-61 Rev. 2 Computer Security Incident Handling Guide 17.1, 17.2, 17.3
NIST SP 800-184 Guide for Cybersecurity Event Recovery 17.1, 17.2, 17.3
Guide for Cybersecurity Incident Recovery Guide for Cybersecurity Incident Recovery 17.1, 17.2, 17.3
Establishing Essential Cyber Hygiene CIS Control 17: Incident Response Management 20
Conclusion
IG1 (essential cyber hygiene) is a foundational set of cyber defense Safeguards that every
enterprise (especially those with limited resources or expertise) should apply to guard against
the most common attacks, and represents a minimum standard of information security
for all enterprises. Essential cyber hygiene is the on-ramp to the CIS Controls. From there,
enterprises may find that they need to implement higher-level CIS Safeguards, such as those
found in IG2 and IG3, as their risk profiles increase. Each IG builds upon the previous one: IG2
includes IG1, and IG3 includes all CIS Safeguards in IG1 and IG2.
This guide aims to provide essential cyber hygiene activities from the CIS Controls, as well as
their relationship to the NIST Cybersecurity Framework. Implementation of these practices
through an MS- and EI-ISAC membership, a SecureSuite Membership, and other additional
tools and resources will lead to a more formalized cybersecurity program to mitigate
common threats.
Policy Templates
The MS-ISAC provides (Courtesy of the State of New York and the State of California) the following policy templates that can be
customized and used as an outline of an organizational policy, with additional details to be added by the enterprise.
Identify
Security Assessment and Authorization Policy Computer Security Threat Response Policy
Protect
System and Information Integrity Policy Security Assessment and Authorization Policy
Respond
Recover
CIS Critical Security Controls (CIS Controls) v8: Learn more CIS Build Kits: ZIP files that contain a Group Policy
about the CIS Controls, including how to get started, why Object (GPO) for each profile within the corresponding
each Control is critical, procedures and tools to use during CIS Benchmark.
implementation, and a complete listing of Safeguards for
CIS Hardened Images®: Virtual machine images securely
each Control.
pre-configured to the CIS Benchmarks.
CIS Controls v8 Mapping to NIST CSF: To provide the
CIS WorkBench: Get involved in one of our many
connection between the CIS Controls v8 and NIST CSF
communities.
frameworks.
CIS Password Policy Guide: CIS Guidance for secure usage
CIS Controls Assessment Specification: Provides an
of passwords in an enterprise
understanding of what should be measured in order to verify
that the Safeguards are properly implemented. MS-ISAC Membership: Free for all 50 states, the District
of Columbia, U.S. territories, local and tribal governments,
CIS Controls Navigator: Learn more about the Controls
public K-12 education entities, public institutions of higher
and Safeguards and see how they map to other security
education, authorities, and any other non-federal public
standards (e.g., CMMC, NIST SP 800-53 Rev. 5, PCI DSS,
entity in the U.S.
MITRE ATT&CK).
EI-ISAC Membership: Free for all SLTT government
CIS Controls Self Assessment Tool (CIS CSAT): Enables
organizations that support the elections officials of the U.S.,
enterprises to assess and track their implementation of the
and associations thereof.
CIS Controls for Versions 8 and 7.1.
MS-ISAC Cybersecurity Resources Guide: Mapping of
CIS Community Defense Model (CDM) v2: A guide
various resources to NIST CSF.
published by CIS that leverages the open availability of
comprehensive summaries of attacks and security incidents, Malicious Domain Blocking and Reporting: MS- and
and the industry-endorsed ecosystem that is developing EI-ISAC DNS filtering service that prevents IT systems from
around the MITRE ATT&CK (Adversarial Tactics, Techniques, connecting to harmful web domains.
and Common Knowledge) Model.
Nationwide Cybersecurity Review (NCSR): No-cost,
CIS Risk Assessment Method (CIS RAM) v2.1: An anonymous, annual self-assessment designed to evaluate
information security risk assessment method that helps cybersecurity maturity.
enterprises implement and assess their security posture
NIST CSF Policy Template Guide: Resource to assist with
against the CIS Controls.
the application and advancement of cybersecurity policies.
CIS SecureSuite Membership: No-cost membership to
No-Cost and Fee-Based Listing of MS-ISAC/EI-ISAC
SLTTs, with access to CIS-CAT Pro Assessor, CIS Build Kits,
Services: Overview of available services. Contact
CIS Benchmarks, and more.
[email protected] for more information.
CIS Benchmarks: Secure configuration guidelines for 100+
technologies, including operating systems, applications, and
network devices.
CIS: Center for Internet Security LDAP: Lightweight Directory Access Protocol
CIS-CAT: CIS Configuration Assessment Tool MCAP: Malicious Code Analysis Platform
CIS CDM: CIS Community Defense Model MDM: Mobile Device Management
CIS CSAT: CIS Controls Self Assessment Tool MFA: Multi-Factor Authentication
CISA: Cybersecurity and Infrastructure Security Agency MMC: Microsoft Management Console
CMMC: Cybersecurity Maturity Model Certification MS-ISAC: Multi-State Information Sharing and
Analysis Center
CVEs: Common Vulnerabilities and Exposures
MSP: Managed Service Provider
DNS: Domain Name System
NAC: Network Access Control
DoD: U.S. Department of Defense
NaaS: Network as a Service
EI-ISAC: Elections Infrastructure Information Sharing and
Analysis Center NCSR: Nationwide Cybersecurity Review
FedVTE: Federal Virtual Training Environment NIST: National Institute of Standards and Technology
GUI: Graphical User Interface PCI DSS: Payment Card Industry Data Security Standard
IG: Implementation Group SLTT: State, Local, Tribal, and Territorial governments
cisecurity.org
[email protected]
518-266-3460
Center for Internet Security
@CISecurity
TheCISecurity
cisecurity