Yesterday, the Center for Internet Security (CIS) published an update to their popular list of Critical Security Controls. The Critical Security Controls have been used by organizations both large and small. By adopting these sets of controls, organizations can prevent the majority of attacks.
The twenty Critical Security Controls are divided into three groups. The first group is called the “basic controls”. They are essential to success and should be considered among the very first things to be done. These six controls are as follows:
- Inventory and Control of Hardware Assets
- Inventory and Control of Software Assets
- Continuous Vulnerability Assessment and Remediation
- Controlled Use of Administrative Privileges
- Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers
- Maintenance, Monitoring and Analysis of Audit Logs
As the number of connected “things” on enterprise networks increases, security managers need to ensure that their security controls provide visibility to those devices. Many security products fail to do this. They were designed for an age long ago when everything of interest connected to our networks via an IP address. Those days are long gone.
Enterprises that deploy Armis have complete visibility to all devices in their enterprise environment – both on and off their network. With Armis, there is no “shadow network” that is unmonitored.
Armis is effective against Critical Security Controls 1, 2, 3, 8, 12 and 15. If you’re interested in learning the full skinny, download this solution brief.