WELCOME !

THANK YOU FOR VISITING THIS SITE. I HAVE BEEN USING BOTH SWAHILI AND ENGLISH LANGUAGE TO EXPRESS ISSUES - I HAVE ATTACHED ENGLISH VERSION TO SOME OF THE SWAHILI NEWS/STORY AT THE END.

Friday, 25 April 2014

AWARENESS: CRITICAL SECURITY CONTROLS FOR EFFECTIVE CYBER DEFENSE.


Over the years, many security standards and requirements frameworks have been developed in attempts to address risks to enterprise systems and the critical data in them. However, most of these efforts have essentially become exercises in reporting on compliance and have actually diverted security program resources from the constantly evolving attacks that must be addressed. In 2008, this was recognized as a serious problem by the U.S. National Security Agency (NSA), and they began an effort that took an "offense must inform defense" approach to prioritizing a list of the controls that would have the greatest impact in improving risk posture against real-world threats.
A consortium of U.S. and international agencies quickly grew, and was joined by experts from private industry and around the globe. Ultimately, recommendations for what became the Critical Security Controls (the Controls) were coordinated through the SANS Institute. In 2013, the stewardship and sustainment of the Controls was transferred to the Council on CyberSecurity (the Council), an independent, global non-profit entity committed to a secure and open Internet.
The Critical Security Controls focuses first on prioritizing security functions that are effective against the latest Advanced Targeted Threats, with a strong emphasis on "What Works" - security controls where products, processes, architectures and services are in use that have demonstrated real world effectiveness. Standardization and automation is another top priority, to gain operational efficiencies while also improving effectiveness.
The actions defined by the Controls are demonstrably a subset of the comprehensive catalog defined by the National Institute of Standards and Technology (NIST) SP 800-53. The Controls do not attempt to replace the work of NIST, including the Cybersecurity Framework developed in response to Executive Order 13636. The Controls instead prioritize and focus on a smaller number of actionable controls with high-payoff, aiming for a "must do first" philosophy. Since the Controls were derived from the most common attack patterns and were vetted across a very broad community of government and industry, with very strong consensus on the resulting set of controls, they serve as the basis for immediate high-value action.
TOP 20 CRITICAL SECURITY CONTROLS - VERSION 5



 1: Inventory of Authorized and Unauthorized Devices
  2: Inventory of Authorized and Unauthorized Software
 3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
  4: Continuous Vulnerability Assessment and Remediation
  5: Malware Defenses
  6: Application Software Security
  7: Wireless Access Control
  8: Data Recovery Capability
  9: Security Skills Assessment and Appropriate Training to Fill Gaps
10: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches
11: Limitation and Control of Network Ports, Protocols, and Services
12: Controlled Use of Administrative Privileges
13: Boundary Defense
14: Maintenance, Monitoring, and Analysis of Audit Logs
15: Controlled Access Based on the Need to Know
16: Account Monitoring and Control
17: Data Protection
18: Incident Response and Management
19: Secure Network Engineering
20: Penetration Tests and Red Team Exercises


14 comments:

  1. If you are looking for information on Cyber Security Foundations then you should definitely visit the cyber security expert. cyber security training in hyderabad

    ReplyDelete
  2. I truly like you're composing style, incredible data, thank you for posting.

    Data Science Training

    ReplyDelete
  3. Yes i am completely concurred with this article and i simply need say this article is extremely pleasant and exceptionally instructive article.I will make a point to be perusing your blog more. You made a decent point however I can't resist the urge to ponder, shouldn't something be said about the other side? !!!!!!THANKS!!!!!! cybersecurity

    ReplyDelete
  4. Really nice and interesting post. I was looking for this kind of information and enjoyed reading this one. Keep posting. Thanks for sharing.
    data science training

    ReplyDelete
  5. These tests not only sharpen their knowledge but also provide the students with realistic simulations of CCNA certification exams through their CCNA tests. Such tests cover all aspects of the actual exam through modules such as planning and designing, implementation and operation, and troubleshooting and technology. CCNA Training in Pune

    ReplyDelete