PROACTIVE RISK
  • About
    • Our Manifesto
    • Capability Statement
    • Agreements >
      • Mutual Confidentiality and Non Disclosure Agreement
      • Master Agreement | Work Order
    • Request Support
    • Gorilla
    • Contact Us
  • SOLUTIONS
    • Fractional CIO/CISO
    • Cyber Recruiter
    • Threat Modeling
    • Policies and Plans
    • MonitorIT®
    • Software Development
    • Domains | DNS
    • PhishIT®
    • MeasureRISK®
    • Vendor Risk
    • CATSCAN®
    • Physical Security
    • ProtectIT®
    • ManageIT®
    • FINDIT® >
      • RAPTOR eDiscovery
  • RESOURCES
    • Tech News
    • GRAY BEARD BLOG
    • Events - Meet-Up
    • Videos
    • Store
    • Guides | Tools

GRAY BEARD BLOG

SHARING RANDOM THOUGHTS ON TECH

One Hundred sixty nine questions about your security program - By Tom brennan

4/10/2022

 
Commerically Reasonable Cyber Security in 169 Questions - By Tom Brennan

Mature organizations want to manage to "best practice" so that they can be proactive about the technical risks they face.  Below are 169 questions to start that discussion and just like eating a elephant, you have to start one bite at a time.
Picture
Question
  1. Do you remove sensitive data or systems not regularly accessed by your organization from the network?
  2. Are these systems only used as stand-alone systems (disconnected from the network) by the business unit for occasionally use?
  3. Can thes systems be completely virtualized and powered off until needed?
  4. Do you utilize approved whole disk encryption software to encrypt the hard drive of all mobile devices?
  5. Do you establish and maintain an overall data classification scheme for the enterprise?
  6. Do you document data flows? Does your data flow documentation include service provider data flows, and is it based on your data management process?
  7. Do you use enterprise software that can configure systems to allow the use of specific devices if USB storage devices are required? Do you maintain an inventory of such devices?
  8. Do you encrypt all sensitive information in transit?
  9. Do you encrypt all sensitive information at rest using a tool that requires a secondary authentication mechanism not integrated into your operating system, in order to access the information?
  10. Do you segment the network based on the label or classification level of the information stored on the servers and locate all sensitive information on separated Virtual Local Area Networks (VLANs)?
  11. Do you use an automated tool, such as host-based Data Loss Prevention, to enforce access controls to data even when data is copied off a system?
  12. Do you enforce detailed audit logging for access to sensitive data or changes to sensitive data (utilizing tools such as File Integrity Monitoring or Security Information and Event Monitoring)?
  13. Do you maintain documented, standard security configuration standards for all authorized operating systems and software?
  14. Do you maintain a standard, documented security configuration standard for all authorized network devices?
  15. Do you automatically lock workstation sessions after a standard period of inactivity?
  16. Do you ensure that only network ports, protocols, and services listening on a system with validated business needs are running on each system?
  17. Do you apply host-based firewalls or port filtering tools on end systems with a default-deny rule that drops all traffic except those services and ports that are explicitly allowed?
  18. Do you securely manage enterprise assets and software?
  19. Do you change all default passwords before deploying any new asset to have values consistent with administrative level accounts?
  20. Do you uninstall or disable unnecessary services on enterprise assets and software, such as an unused file sharing service, web application module, or service function?
  21. Do you configure trusted DNS servers on enterprise assets?
  22. Do you enforce automatic device lockout following a predetermined threshold of local failed authentication attempts on portable end-user devices? For laptops, do allow no more than 20 failed authentication attempts? For tablets and smartphones, do you allow no more than ten failed authentication attempts?
  23. Do you remotely wipe enterprise data from enterprise-owned portable end-user devices when deemed appropriate?
  24. Do you ensure separate enterprise workspaces are used on mobile end-user devices, where supported?
  25. Do you maintain an inventory of all accounts organized by the authentication system?
  26. Do you use passwords to accounts that are unique to the system where multi-factor authentication is not supported (such as local administrator, root, or service accounts)?
  27. Do you automatically disable dormant accounts after a set period of inactivity?
  28. Do you ensure that all users with administrative account access use a dedicated or secondary account for elevated activities?
  29. Do you only use this account for administrative operations and not internet browsing, email, or similar events?
  30. Do you establish and maintain an inventory of service accounts? Does your inventory, at a minimum, contain the department owner, review date, and purpose? Do you perform service account reviews to validate all active accounts are authorized, on a recurring schedule at a minimum quarterly, or more frequently?
  31. Do you configure access for all accounts through as few centralized points of authentication as possible, including network, security, and cloud systems?
  32. Do you establish and follow a process for granting access to enterprise assets upon new hire, rights grant, or user role change?
  33. Do you establish and follow an automated process for revoking system access by disabling accounts immediately upon termination or change of responsibilities of an employee or contractor?
  34. Do you Disable these accounts, instead of deleting accounts in order to preserve audit trails?
  35. Do you require all externally-exposed enterprise or third-party applications to enforce MFA, where supported?
  36. Do you require all remote login access to your organization's network to encrypt data in transit and use multi-factor authentication?
  37. Do you use multi-factor authentication and encrypted channels for all administrative account access?
  38. Do you maintain an inventory of each of your organization's authentication systems, including those located onsite or at a remote service provider?
  39. Do you centralize access control for all enterprise assets through a directory service or SSO provider?
  40. Do you define and maintain role-based access control by determining and documenting the access rights necessary for each role within the enterprise to carry out its assigned duties successfully?
  41. Do you establish and maintain a documented vulnerability management process for enterprise assets?
  42. Do you utilize a risk-rating process to prioritize the remediation of discovered vulnerabilities?
  43. Do you deploy automated software update tools to ensure that the operating systems are running the most recent security updates provided by the software vendor?
  44. Do you deploy automated software update tools to ensure that third-party software on all systems are running the most recent security updates provided by the software vendor?
  45. Do you perform authenticated vulnerability scanning with agents running locally on each system or with remote scanners that are configured with elevated rights on the system being tested?
  46. Do you utilize an up to date SCAP-compliant vulnerability scanning tool to automatically scan all systems on your network on a weekly or more frequent basis to identify all potential vulnerabilities on your organization's systems?
  47. Based on your remediation process, do you remediate any detected vulnerabilities in software through processes and tooling on a monthly or more frequent basis?
  48. Do you establish and maintain an audit log management process that defines the enterprise's logging requirements? At a minimum, do you address the collection, review, and retention of audit logs for enterprise assets?
  49. Do you ensure that local logging has been enabled on all systems and networking devices?
  50. Do you ensure that all systems that store logs have adequate storage space for the logs generated?
  51. Do you use at least three synchronized time sources from which all servers and network devices retrieve time information regularly so that timestamps in logs are consistent?
  52. Do you enable system logging to include detailed information such as an event source, date, user, timestamp, source addresses, destination addresses, and other useful elements?
  53. Do you enable Domain Name System (DNS) query logging to detect hostname lookups for known malicious domains?
  54. Do you log all URL requests from each of your organization's systems, whether onsite or on a mobile device, to identify potentially malicious activity and assist incident handlers with identifying potentially compromised systems?
  55. Do you enable command-line audit logging for command shells, such as Microsoft Powershell and Bash?
  56. Do you ensure that appropriate logs are being aggregated to a central log management system for analysis and review?
  57. Do you retain audit logs across enterprise assets for a minimum of 90 days?
  58. Do you review the logs to identify anomalies or abnormal events on a regular basis?
  59. Do you collect service provider logs where supported?
  60. Do you ensure that only fully supported web browsers and email clients are allowed to execute in your organization, ideally only using the latest version of the browsers and email clients provided by the vendor?
  61. Do you use DNS filtering services to help block access to known malicious domains?
  62. Do you have enforced network-based URL filters that limit a system's ability to connect to websites not approved by the organization?
  63. Do you have enforced filtering for each of the organization's systems, whether they are physically at an organization's facilities or not?
  64. Do you uninstall or disable any unauthorized browser or email client plugins or add-on applications?
  65. Do you implement a Domain-based Message Authentication, Reporting, and Conformance (DMARC) policy and verification to lower the chance of spoofed or modified emails from valid domains?
  66. Do you start by implementing the Sender Policy Framework (SPF) and the Domain Keys Identified Mail (DKIM) standards?
  67. Do you block all e-mail attachments entering your organization's e-mail gateway if the file types are unnecessary for your business?
  68. Do you deploy and maintain email server anti-malware protections, such as attachment scanning or sandboxing?
  69. Do you deploy and maintain anti-malware software on all enterprise assets?
  70. Do you ensure that your organization's anti-malware software updates its scanning engine and signature database on a regular basis?
  71. Do you configure devices to not auto-run content from removable media?
  72. Do you configure devices so that they automatically conduct an anti-malware scan of removable media when inserted or connected?
  73. Do you enable anti-exploitation features such as Data Execution Prevention (DEP) or Address Space Layout Randomization (ASLR) that are available in an operating system, or do you deploy appropriate toolkits that can be configured to apply protection to a broader set of applications and executables?
  74. Do you utilize centrally managed anti-malware software to continuously monitor and defend each of your organization's workstations and servers?
  75. Do you use behavior-based anti-malware software?
  76. Do you establish and maintain a data recovery process? Do you address the scope of data recovery activities, recovery prioritization, and the security of backup data?
  77. Do you ensure that all system data is automatically backed up on a regular basis?
  78. Do you ensure that backups are properly protected via physical security or encryption when they are stored, as well as when they are moved across the network?
  79. Does this include remote backups and cloud services?
  80. Do you ensure that all backups have at least one backup destination that is not continuously addressable through operating system calls?
  81. Do you test data integrity on backup media on a regular basis by performing a data restoration process to ensure that the backup is properly working?
  82. Do you install the latest stable version of any security-related updates on all network devices?
  83. Do you maintain an inventory of authorized wireless access points connected to the wired network?
  84. Do you manage all network devices using multi-factor authentication and encrypted sessions?
  85. Do you maintain an up-to-date inventory of all your organization's network boundaries?
  86. Do you centralize network AAA?
  87. Do you ensure that wireless networks use authentication protocols, such as Extensible Authentication Protocol-Transport Layer Security (EAP/TLS), that require mutual, multi-factor authentication?
  88. Do you require users to authenticate to enterprise-managed VPN and authentication services before accessing enterprise resources on end-user devices?
  89. Do your administrators use a dedicated machine for all administrative tasks or tasks requiring administrative access?
  90. Do you segment the device from your primary network which is not allowed Internet access and not use the device for reading e-mail, composing documents, or browsing the Internet?
  91. Do you deploy Security Information and Event Management (SIEM) or log analytic tool for log correlation and analysis?
  92. Do you deploy a host-based intrusion detection solution on enterprise assets, where appropriate and supported?
  93. Do you deploy network-based Intrusion Detection Systems (IDS) sensors to look for unusual attack mechanisms and detect compromise of these systems at each of your organization's network boundaries?
  94. Do you enable firewall filtering betDo youen VLANs to ensure only authorized systems are able to communicate with other systems necessary to fulfill their specific responsibilities?
  95. Do you scan all enterprise devices remotely logging into your organization's network prior to accessing the network to ensure that each of your organization's security policies has been enforced in the same manner as local network devices?
  96. Do you enable the collection of NetFlow and logging data on all network boundary devices?
  97. Do you deploy a host-based intrusion prevention solution on enterprise assets, where appropriate and supported?
  98. Do you deploy network-based Intrusion Prevention Systems (IPS) to block malicious network traffic at each of your organization's network boundaries?
  99. Do you utilize the port level access control, following 802.1x standards, to control which devices can authenticate to your network?
  100. Do you tie the authentication system into the hardware asset inventory data to ensure only authorized devices can connect to your network?
  101. Do you ensure that all network traffic to or from the Internet passes through an authenticated application layer proxy that is configured to filter unauthorized connections?
  102. Do you tune your SIEM system to better identify actionable events and decrease event noise on a regular basis?
  103. Do you create a security awareness program for all workforce members to complete on a regular basis to ensure they understand and exhibit the necessary behaviors and skills to help ensure the security of your organization?
  104. Is your organization's security awareness program communicated in a continuous and engaging manner?
  105. Do you train the workforce on how to identify different forms of social engineering attacks, such as phishing, phone scams, and impersonation calls?
  106. Do you train workforce members on the importance of enabling and utilizing secure authentication?
  107. Do you train workforce on how to identify and properly store, transfer, archive, and destroy information?
  108. Do you train workforce members to be aware of causes for unintentional data exposures, such as losing their mobile devices or emailing the wrong person due to autocomplete in email?
  109. Do you train employees to be able to identify the most common indicators of an incident and be able to report such an incident?
  110. Do you train the workforce to verify and report out-of-date software patches or any failures in automated processes and tools? Does the training include notifying IT personnel of any failures in automated processes and tools?
  111. Do you train workforce members on the dangers of connecting to and transmitting data over insecure networks for enterprise activities? Does the training include guidance for remote workers to ensure that they securely configure their home network infrastructure?
  112. Do you deliver training to address the skills gap? It is identified to impact workforce members' security behavior positively?
  113. Do you establish and maintain an inventory of service providers? Does the inventory list all known service providers, include classification(s), and designate an enterprise contact for each service provider?
  114. Do you establish and maintain a service provider management policy? Do you ensure the policy addresses service providers' classification, inventory, assessment, monitoring, and decommissioning?
  115. Do you classify service providers?
  116. Do you ensure service provider contracts include security requirements consistent with our service provider management policy?
  117. Do you assess service providers consistent with the enterprise's service provider management policy?
  118. Do you monitor service providers consistent with the enterprise's service provider management policy?
  119. Do you securely decommission service providers?
  120. Do you establish secure coding practices appropriate to the programming language and development environment being used?
  121. Do you establish a process to accept and address reports of software vulnerabilities, including providing a means for external entities to contact your security group?
  122. Do you perform root cause analysis on security vulnerabilities?
  123. Do you verify that the version of all software acquired from outside your organization is supported by the developer or appropriately hardened based on developer security recommendations?
  124. Do you only use up-to-date and trusted third-party components for the software developed by your organization?
  125. Do you establish and maintain a severity rating system and process for application vulnerabilities that facilitate the prioritization order to fix discovered vulnerabilities? Do you set a minimum level of security acceptability for releasing code or applications?
  126. Do you use standard hardening configuration templates for applications that rely on a database? Do you test all systems that are part of critical business processes?
  127. Do you maintain separate environments for production and nonproduction systems? Developers do not have unmonitored access to production environments?
  128. Do you ensure that all software development personnel receive training in writing secure code for their specific development environment and responsibilities?
  129. Do you ensure that explicit error checking for in-house developed software is performed and documented for all input, including for size, data type, and acceptable ranges or formats?
  130. Do you only use standardized and extensively reviewed encryption algorithms?
  131. Do you apply static and dynamic analysis tools to verify that secure coding practices are being adhered to for internally developed software?
  132. Do you conduct application penetration testing?
  133. Do you conduct threat modeling?
  134. Do you designate management personnel, as well as backups, who support the incident handling process by acting in key decision-making roles?
  135. Do you assemble and maintain information on third-party contact information to be used to report a security incident, such as Law Enforcement, relevant government departments, vendors, and ISAC partners?
  136. Do you devise organization-wide standards for the time required for system administrators and other workforce members to report anomalous events to the incident handling team, the mechanisms for such reporting, and do you include this kind of information in the incident notification?
  137. Do you ensure that there are written incident response plans that define the roles of personnel as well as phases of incident handling/management?
  138. Do you assign job titles and duties for handling computer and network incidents to specific individuals and ensure tracking and documentation throughout the incident and to resolution?
  139. Do you determine which primary and secondary mechanisms will be used to communicate and report during a security incident?
  140. Do you have plan and conduct routine incident response exercises and scenarios for the workforce involved in the incident response to maintain awareness and comfort in responding to real-world threats?
  141. Do you test the exercises' communication channels, decision making, and incident responders technical capabilities using tools and data available to them?
  142. Do you conduct post-incident reviews?
  143. Do you create incident scoring and prioritization schema based on the known or potential impact on your organization?
  144. Do you utilize incident scoring to define the frequency of status updates and escalation procedures?
  145. Do you establish a program for penetration tests that include a full scope of blended attacks, such as wireless, client-based, and web application attacks?
  146. Do you perform periodic external penetration tests based on program requirements, no less than annually?
  147. Do you remediate penetration test findings based on the enterprise's policy for remediation scope and prioritization?
  148. Do you validate security measures after each penetration test? If deemed necessary, do you modify rulesets and capabilities to detect the techniques used during testing?
  149. Do you perform periodic internal penetration tests based on program requirements, no less than annually?
  150. Do you maintain an accurate and up-to-date inventory of all technology assets with the potential to store or process information?
  151. Do you ensure that the hardware asset inventory records the network address, hardware address, machine name, data asset owner, and department for each asset and whether the hardware asset has been approved to connect to your network?
  152. Do you ensure that unauthorized assets are either removed from your network or quarantined, or the inventory is updated in a timely manner?
  153. Do you utilize an active discovery tool to identify devices connected to your organization's network and update the hardware asset inventory?
  154. Do you use the Dynamic Host Configuration Protocol (DHCP) logging on all DHCP servers or IP address management tools to update your organization's hardware asset inventory?
  155. Do you utilize a passive discovery tool to identify devices connected to your organization's network and automatically update the organization's hardware asset inventory?
  156. Do you maintain an up-to-date list of all authorized software that is required in the enterprise for any business purpose on any business system?
  157. Do you ensure that only software applications or operating systems currently supported by the software's vendor are added to your organization's authorized software inventory?
  158. Do you ensure that unauthorized software is either removed, or the inventory is updated in a timely manner?
  159. Do you utilize software inventory tools throughout your organization to automate the documentation of all software on business systems?
  160. Do you utilize application whitelisting technology on all assets to ensure that only authorized software executes, and all unauthorized software is blocked from executing on assets?
  161. Do you ensure that only authorized software libraries (such as *?dll, *?ocx, *?so, etc?) of the organization's application whitelisting software are allowed to load into a system process?
  162. Do you ensure that only authorized, digitally signed scripts (such as *?ps1, *?py, macros, etc?) of your organization's application whitelisting software are allowed to run on a system?
  163. Do you establish and maintain a data management process? In the process, do you address data sensitivity, data owner, data handling, data retention limits, and disposal requirements based on sensitivity and retention standards for the enterprise?
  164. Do you maintain an inventory of all sensitive information stored, processed, or transmitted by your organization's technology systems, including those located onsite or at a remote service provider?
  165. Do you protect all information stored on systems with file system, network share, claims, application, or database-specific access control lists?
  166. Do these control lists enforce the principle that only authorized individuals should have access to the information based on their need to access the data as a part of their responsibilities?
  167. Do you retain data according to the enterprise's data management process? Does your data retention include both minimum and maximum timelines?
  168. These are are just some of the things that need to be considered for your business to demostrate commicatelly reasonable security contrtols.  Second we have to look at the maturity of those controls ultimatly arriving with a score.  For more information, talk to a member of our team.  Call 973-298-1160 today and become proactive about the risks you face.

Comments are closed.
    View my profile on LinkedIn

    Tom Brennan

    This is my blog, there are many like it but this one is mine. Enjoy.

    BLOG Archives

    February 2023
    January 2023
    December 2022
    November 2022
    August 2022
    April 2022
    August 2021
    March 2021
    January 2021
    August 2020

    Categories

    All
    CMMC
    COMMUNITY
    TECHTIP

    RSS Feed

Contact Info

Proactive Risk Inc.
Tel: +1 (973) 298-1160
Web: www.proactiverisk.com
eMail: sales(at)proactiverisk.com

CONTACT US
Picture
© COPYRIGHT 2023. ALL RIGHTS RESERVED.
  • About
    • Our Manifesto
    • Capability Statement
    • Agreements >
      • Mutual Confidentiality and Non Disclosure Agreement
      • Master Agreement | Work Order
    • Request Support
    • Gorilla
    • Contact Us
  • SOLUTIONS
    • Fractional CIO/CISO
    • Cyber Recruiter
    • Threat Modeling
    • Policies and Plans
    • MonitorIT®
    • Software Development
    • Domains | DNS
    • PhishIT®
    • MeasureRISK®
    • Vendor Risk
    • CATSCAN®
    • Physical Security
    • ProtectIT®
    • ManageIT®
    • FINDIT® >
      • RAPTOR eDiscovery
  • RESOURCES
    • Tech News
    • GRAY BEARD BLOG
    • Events - Meet-Up
    • Videos
    • Store
    • Guides | Tools