The Center for Internet Security recently released version 8 of the CIS Controls, a list of 18 safeguards that mitigate the most prevalent cyber-attacks against systems and networks. With this 8th update, CIS aims to keep their security practices up to date with modern systems and software.
The goal of this update is to support an enterprise’s security as they move to cloud-based environments (fully cloud or hybrid), and it was prompted by various IT-related factors, such as:
- Transitions to Cloud-Based Computing
- Virtualisation
- Mobility
- Outsourcing
- Working From Home
- Changes in Cyberattack Tactics
What IT-related factors does CIS Controls Version 8 cover?
Previously, CIS Controls v7 covered 20 different aspects of cybersecurity pertaining to business operations. Since then, the latest update has consolidated this list into 18 points, which are:
- Inventory and Control of Enterprise Assets
- Inventory and Control of Software Assets
- Data Protection
- Secure Configuration of Enterprise Assets
- Account Management
- Access Control Management
- Continuous Vulnerability Management
- Audit Log Management
- Email and Web Browser Management
- Malware Defenses
- Data Recovery
- Network Infrastructure Management
- Network Monitoring and Defense
- Security Awareness and Skills Training
- Service Provider Management
- Application Software Security
- Incident Response Management
- Penetration Testing
These points cover the various ways in which a business can protect itself from cyber attacks, including:
- Anticipating cybersecurity threats
- Installing infrastructure and safeguards
- Securing data
- Setting up user accounts and regulating user accessibility
- Training important stakeholders (i.e. staff and security)
- Testing and monitoring for potential vulnerabilities
- Responding to cybersecurity threats
- Implementing pre-established processes for incident response
- Recovering lost data
- Logging threats and vulnerabilities, as well as the processes used to mitigate them
What are some common mistakes that businesses make regarding security solutions?
Not investing enough
Too many businesses make the mistake of thinking that securing their business ends at purchasing a firewall and some new antivirus software.
IT is a constantly changing landscape. As infrastructure and processes evolve with the times, so do cybersecurity risks. In order to prevent threats such as technology failure or cyberattacks, it is important to consistently invest in all of the aspects outlined in CIS Controls Version 8.
Not allocating funds correctly
Security involves three key aspects that all play into one another; people, processes and technology. Each of these aspects require adequate funding in order to function effectively and support each other.
- Internal staff require funding for training, while extra investing is also required for outsourcing experienced IT consultants that can provide help for less regular, larger scale IT tasks.
- Processes require funds so that they can be updated in order to keep up with changes across all aspects of IT. This funding goes into aspects such as planning, audits, implementation and documentation.
- Technology, regardless of whether it’s software or hardware, requires funding for aspects such as sourcing, evaluation, maintenance, repairs and updates.
Failing to invest enough in any of these aspects will have a negative impact on the others.
- Not investing in staff means that processes are conducted incorrectly, which can result in technological failure and the emergence of vulnerabilities that can be exploited
- Outdated or poorly planned processes, due to insufficient funds, are ineffective security solutions that serve only to drain energy and resources.
- Purchasing the wrong technology and refusing to adequately maintain or update it further increases the risk of it failing and leaving gigantic holes in your security that can be taken advantage of.
Failing to discern what security issues specifically relate to the IT department
A common misconception is that cyber security is solely the responsibility of the IT department. However, this is not the case. The primary objective of the IT department is to interact with technology, but people and processes are the responsibility of the business as a whole and should be addressed by upper management.
It’s important to keep this in mind because the IT department can only focus on technology. Neglecting the other areas increases the risk of security vulnerabilities.
Not properly assessing the risks facing the business
CIS is a globally recognised cybersecurity organisation that has spent over 20 years observing the IT landscape and compiling a comprehensive list of controls that cover all aspects of cybersecurity. While each version of the CIS controls has changed with the IT landscape, the content remains largely the same and can be enacted upon by practically any business.
Often it is not feasible for a business to implement all of the controls listed in the CIS framework. This can be due to a variety of constraints, from budget to time. That is why a preliminary assessment of the risks facing your business is important, as you can then determine which of the CIS controls to prioritise in order to effectively protect your business in the long run. Failure to properly assess the risks facing your business means wasting time and resources on security solutions that could potentially fail to mitigate any of those risks.
If you have any questions, or you want to start taking control of the cybersecurity of your business, contact us and we will provide you with high quality IT solutions.
- How To Build a Competitive Advantage With IT - 10 October 2022
- How To Measure Success In Your IT Department - 7 October 2022
- The Simple IT Strategy Framework for a Post COVID-19 Workplace - 6 October 2022