Strengthening Business Security – Embracing and Applying the Unique Advantages of the CIS Controls Framework
Image by Michael Parascandola

Strengthening Business Security – Embracing and Applying the Unique Advantages of the CIS Controls Framework

The rapid innovation of various forms of technology has led to a drastic increase in cyberattacks worldwide. According to data published by Check Point, these malicious attacks rose by 7% in the first quarter of 2023 alone. Because information is arguably the most valuable resource on the planet, bolstering cybersecurity practices for any organization, large or small, should be a top priority.

Implementing solid security practices, such as the controls listed in the CIS Critical Security Controls (the CIS Controls) Framework, can be a step towards maintaining a healthy cybersecurity posture and a thriving business model. This article will outline details of the CIS Controls as well as the unique advantages that they can bring to any business.

Overview of the CIS Controls

The CIS Critical Security Controls (the CIS Controls) are a recommended set of best practices to protect your environment against the most common cyber attacks. They have been mapped to multiple security frameworks and standards across the globe. They are also regularly updated as and when technology trends change. The CIS Controls can encompass everything from laptops, workstations, servers, and any mobile devices, making these controls versatile for any business environment.

For organizations serious about mitigating cyber risk, it is recommended that the CIS Controls be put in place to deter malicious actors and minimize the threats of the most damaging attacks. Many businesses that hold important information, whether this be customer’s payment information or even supply chain data, should already be following some type of cyber standard from a legal standpoint. This could be something such as NIST CSF or ISO 27000. Although the CIS Controls are capable of being a standalone benchmark they are best applied in conjunction with other standards to maximize the security capabilities and drive cybersecurity teams to fully protect all aspects of data confidentiality, availability, and integrity.

Version 8 of the CIS Controls covers 18 of the most critical activities to be addressed. Previous versions had a more full list, but the team of developers and those collaborating within the global cyber community believe that these updated controls should be simplified as much as possible, allowing for minimal confusion and clear interpretation.

Leveraging the Distinctive Strengths of the CIS Controls

The CIS Controls, structured in a list of 18, can adapt to emerging technology as well as a variety of unique security challenges that any organization might face. The controls are there not to impede innovation and agility, but rather to help guide security professionals in looking at various angles that might not have previously been viewed as vulnerabilities. The versatile framework takes a proactive stance to help protect against various threats and open vulnerabilities. The CIS Framework allows for collaboration between security professionals across the globe and provides a community whose members can share insider knowledge with others to ultimately attempt to stay one step ahead of any adversaries and emerging threats.

Most businesses don’t realize that an insider threat can be more dangerous than an outside entity. This is due to the ease of access to information residing on systems, as well as ample opportunity during the workday to follow through on any malicious intent, with little suspicion from coworkers. In addition, some insider threats are due simply to negligence among employees. For example, employees can share data, disregard security policies, and leave devices unsecured. Businesses pay the ultimate price in the form of remediation costs for major incidents. Even those events tied to negligent employees are estimated to cost organizations around $500,000 per incident.

Organizations must then take into account any service disruptions and added lack of trust from customers or vendors, which could harm the reputation of those organizations. Instead, taking a proactive stance by implementing the CIS Controls can drastically change the culture and security mindset within all levels of the organization, thereby minimizing damage. One of the 18 controls is the Security Awareness and Skills Training section. Starting by creating new policies, as well as training all end-users on organization-specific security measures, can be a simple step towards maintaining a positive security health posture.

Building Trust through Transparency and Accountability

Building a solid foundation with a customer base and outside vendor partnerships is an important aspect of any business. These outside entities are more apt to remain in a partnership when they feel confident in the security practices and privacy regulations the organization upholds. The CIS Controls offer just that. The 18 controls provide a minimum standard to be achieved within each category.

All parties involved with any organization, whether they be stakeholders, customers, board members, or employees, will have a continuous feeling of trust when there is open communication and evidence based on factual reporting. The CIS Controls act as safeguards and layers of defense. If they are implemented properly and maintained as the business develops over time, there will be tangible documentation, metrics, and quantitative evidence that can be pointed out and shared with members of the organization.

Justifying the Cost of CIS Implementation within the Organization

The Center for Internet Security (CIS) has made these 18 controls free and available for anyone in the public to utilize. Ultimately, there should be little to no reason for a business to not be interested in adding the CIS Controls to its local cybersecurity plan. CIS also offers a wide range of additional solutions with the purchase of a membership for those that need extra assistance.

These additional solutions provided by CIS can significantly assist the organization and might be worth the investment. With cyberattacks becoming such a common occurrence, additional layers of defense protection should be added whenever possible. With the rising costs that data breaches create, as well as ransomware and regulatory penalties, organizations should begin viewing cybersecurity as an insurance policy. Investing time, effort, and resources into a solid cybersecurity plan will drastically minimize the damages caused by malicious actors, insider threats, or data leaks.

The Future of Business Security – Adaptation and Innovation

Many of us aren’t certain what lies ahead for new technology. What is certain is that malicious actors are not sitting around working on old attack methods. The threat landscape is continuously evolving and becoming more brutal for businesses. Staying one step ahead by leveraging the CIS Controls, collaborating with other cybersecurity professionals, and considering both ethical and responsible security practices might be what keeps attacks at bay.

CIS developers and the community of cybersecurity-minded individuals are continuously looking at the CIS Controls to ensure that they remain a tool that can be used in a scalable environment and sustain their value over time.

Conclusion

The CIS Controls can be a simple and extremely effective first step in creating a solid cybersecurity foundation for any organization. They offers numerous benefits including bolstering internal security posture, deterring malicious attacks, creating a transparent and trustworthy partnership with customers, vendors, and stakeholders, and minimizing the overall financial risk. It is unknown where the future of cybersecurity will be heading in the coming years. However, we do know that malicious actors will be ready to try and gain access and capture important business data, effectively interrupting the confidentiality, integrity, and availability of data within an organization. Strong deterrence measures such as the CIS Controls will make organizations stronger.

References



Michelle Jones

Secure By Design Practitioner | Value with Velocity Professional | MSc IT (Distinction) | BSc MIS (Hons) | Solution Architect | Application Security Engineer | DevSecOps Specialist | Multi-Skilled Analyst

1 年

Great article again Michael! I like the practicality of your approach in highlighting main areas where businesses need to place particular emphasis on with respect to cybersecurity and how the CIS Framework can provide a springboard to achieving that. I cannot stress how tired and exasperated I am with the thinking that security is just a bunch of firewalls, IDS, WAFs and DMZs. Keep ‘‘em coming!

Robert Janista

IT Management and Delivery Consultant

1 年

Great article Michael!

Richea Perry

Cybersecurity & GRC Professional: ISO 27005 ISRM| OCEG-GRCP | Cybersecurity Content Creator (Udemy Courses) | IAM Governance | Podcaster(CyberJA) | Aspiring CISO

1 年

Very useful article for those thinking of establishing a security baseline across their enterprise. Ofcourse these controls should be applied and tested according to risks identified and agree upon by senior management, ensuring that the application of these controls do not impede the business or organization's operations.

Jorge Omar Gonzalez

Product Management Professional

1 年

Great article! Protecting your company or those you work for means so much more than what was previously thought of. These controls are a necessary addition to your operation.

Lisa Shaw

Let's talk about #cybersecurity #cyberresilience #cr-maps #cyberinsurance #cyberriskmanagement #cyberpolicies #cyberprocesses #networking

1 年

Lots of differing opinions here. Hopefully we all stay friends!

回复

要查看或添加评论,请登录

社区洞察

其他会员也浏览了