Episode 132 - Beginner’s Guide to Implementing CIS Controls
Aug 25, 2023
auto_awesome
The podcast episode delves into the implementation of CIS Controls, specifically focusing on IG1. The hosts discuss the benefits of the CIS Controls framework and how to rate your security using the CIS Workbook. They also explore various security controls that need to be implemented, including audit logs and MFA. The episode touches on the experience of attending a conference and utilizing the IG1 workbook. The hosts introduce a new sponsor, Jupiter, and discuss emergency preparedness in schools.
Conducting a cybersecurity tabletop exercise with administrative staff helps educate them about potential risks and facilitates conversations about response plans and backup systems.
Establishing and maintaining a detailed inventory of enterprise assets enables informed decision-making, effective network management, and anticipation of potential risks.
Implementing multi-factor authentication (MFA) for externally exposed applications and administrative access significantly enhances security posture and reduces the risk of unauthorized access.
Deep dives
Importance of Cybersecurity Training for Admin Staff
One of the main ideas covered in this podcast episode is the importance of conducting a cybersecurity tabletop exercise with the administrative staff. The host and guest speakers discuss how this exercise can help the staff understand the impact of a cyber event on the school's day-to-day functions. They emphasize that the tabletop exercise can facilitate conversations about response plans, backup systems, emergency contact information, and other critical aspects in case of a cyber attack or disruption. The goal is to educate administrators about potential risks, improve their understanding of technology-related challenges, and enable them to make informed decisions to mitigate potential threats.
Identification and Control of Enterprise Assets
Another key point addressed in the podcast is the significance of establishing and maintaining a detailed inventory of enterprise assets. The host and speakers discuss the need to identify and control all devices, software, and network equipment in the school district. They emphasize the importance of utilizing active and passive discovery tools to monitor the network and collect accurate inventory data. By having a comprehensive inventory, administrators can make informed decisions, enforce protocols, manage network devices effectively, and anticipate potential risks.
Implementing Multi-Factor Authentication
The episode highlights the significance of implementing multi-factor authentication (MFA) for externally exposed applications and administrative access. The speakers underline the importance of protecting sensitive information and mitigating security risks by requiring MFA for account authentication. They mention that MFA should be applied not only to external applications but also for remote network access and administrative accounts. By enforcing MFA, schools can significantly enhance their security posture and reduce the risk of unauthorized access.
The Value of Policy and Procedure Documentation
The podcast underscores the importance of having robust policies and procedures in place. The host and guest speakers emphasize the need to establish granting processes for access rights and develop automated backups to ensure data integrity and availability. They also discuss the significance of having detailed documentation and procedures for various scenarios, such as network downtime, intercom system failures, and lunch line management when technology is disrupted. Having comprehensive policies and procedures helps schools respond effectively to emergencies and maintain continuity in critical operations.
Prioritizing Risk Management with Implementation Groups
The podcast introduces the concept of Implementation Groups (IG) within the CIS controls framework. The speakers discuss how different controls and actions are categorized into different IGs based on the level of maturity and complexity. They emphasize that schools should prioritize implementing controls from IG1, which includes essential controls for lower risk environments, like K-12 schools. By focusing on IG1, schools can address high-impact risks and gradually progress towards more advanced controls and risk management strategies.
It was past Josh's bed time when this episode was recorded, so he let's Mark do all the talking. Mark shows off his Google Sheet skills by walking us through the CIS controls, specifically IG1. IG1 was mentioned at the White House Convening on K12 Cybersecurity a few weeks ago and we thought it was a good idea to delve into what that means and how to get started with implementation. Mark also talks about the CIS Workbook to help you rate your current security posted against CIS Controls. After completing the Workbook, you are presented with a report that gives you starting points for your weakest ratings.
Here is a spreadsheet with IG1, IG2 and IG3. For the sake of this episode, we only focused on IG1.