CIS RAM v2.1 For IG3 Workbook 22.05
CIS RAM v2.1 For IG3 Workbook 22.05
1 for IG3
The CIS RAM for IG3 Workbook protects most cells in the Risk Register and lookup t
accidentally changing the formulas and lookups that automate the risk analysis.
If users are confident in their use of Microsoft® Excel and wish to modify values, such
Criteria, they may “unprotect” the document by going to the “Review” tab in the Excel
“Unprotect sheet” button. However, guidance for maintenance of the Workbook, form
cells is beyond the scope of this document.
Additionally, CIS RAM v2.1 for IG3 is customized to incorporate values from the CIS C
instances, enterprises may choose to deviate from the data inputs that are pre-popula
However, guidance for deviations is beyond the scope of this document.
r IG3
ster and lookup tables to prevent users from
k analysis.
dify values, such as Risk Acceptance
tab in the Excel menu and selecting the
Workbook, formulas, lookups, and protected
https://www.cisecurity.org/controls/v8/
This is a free tool with a dynamic list of the CIS Safeguards that can be filtered by Implementation Groups and mappings to multiple
frameworks.
https://www.cisecurity.org/controls/v8
Join our Community where you can discuss the CIS Controls with our global army of experts and volunteers!
https://workbench.cisecurity.org/dashboard
Overview: The CIS Controls® Self Assessment Tool, also known as CIS CSAT, enables organizations to assess and track their
implementation of the CIS Controls for Versions 8 and 7.1. The CIS Controls are a prioritized set of consensus-developed security best
practices used by organizations around the world to defend against cyber threats.
TWO TYPES:
CIS-Hosted CSAT: The CIS-hosted version of CIS CSAT is free to every organization for use in a non-commercial capacity to conduct
CIS Controls assessments of their organization. (released January 2019)
https://csat.cisecurity.org/
CIS CSAT Pro: The on-premises version of CIS CSAT is available exclusively for CIS SecureSuite Members. This version offers
additional features and benefits: Save time by using a simplified scoring method with a reduced number of questions, Decide whether to
opt in to share data and see how scores compare to industry average, Greater flexibility with organization trees for tracking
organizations, sub-organizations, and assessments, Assign users to different roles for different organizations/sub-organizations as well
as greater separation of administrative and non-administrative roles, Track multiple concurrent assessments in the same organization,
Easily access your tasks, assessments, and organizations from a consolidated home page, Includes CIS Controls Safeguard mappings
to NIST CSF, NIST SP 800-53, and PCI. (released August 2020)
https://www.cisecurity.org/controls/cis-controls-self-assessment-tool-cis-csat/
Prompt
How would you concisely describe the benefit that your
1 Mission enterprise provides your customers, clients, constituents, or the
public? This is why they engage in this risk with you.
Instructions: Imagine that your enterprise suffers a cybersecurity or information security incident. Describe i
determine that the impacts to your mission were acceptable, or unacceptable.
Prompt
Instructions: Imagine that your enterprise suffers a cybersecurity or information security incident. Describe i
determine that the impacts to your operational objectives were acceptable, or unacceptable.
Prompt
What are the unexpected cost outlays that your enterprise could
3 Financial Objectives or could not tolerate?
Instructions: Imagine that your enterprise suffers a cybersecurity or information security incident. Describe i
determine that the impacts to your financial objectives were acceptable, or unacceptable.
Prompt
Instructions: Imagine that your enterprise suffers a cybersecurity or information security incident. Describe i
determine that the impacts to your obligations (harm, to others) were acceptable, or unacceptable.
ecurity incident. Describe in the spaces provided below how you would
Response
The mission would remain intact.
This mission would not be perfectly achieved, but could be
recovered within normal operations.
Response
ecurity incident. Describe in the spaces provided below how you would
ceptable.
Response
Response
ecurity incident. Describe in the spaces provided below how you would
ptable.
Response
Response
ecurity incident. Describe in the spaces provided below how you would
or unacceptable.
Response
No harm could foreseeably result.
Any harm that could result would not require correction, repair,
or compensation to make the harmed parties "whole."
2 Impact Criteria
Impact Scores
Definition
1. Negligible
2. Acceptable
3. Unacceptable
4. High
5. Catastrophic
3 Expectancy Criteria
Expectancy Score
1
Expectancy Criteria
Safeguard would reliably prevent the
Remote
threat.
Safeguard would reliably prevent most
Unlikely
occurrences of the threat.
Safeguard would prevent as many threat
As likely as not
occurrences as it would miss.
Safeguard would prevent few threat
Likely
occurrences.
Safeguard would not prevent threat
Certain
occurrences.
Expectancy Impact
Remediate Detected
7.7 Applications Respond
Vulnerabilities
Establish and Maintain an Audit
8.1 Network Protect
Log Management Process
Restrict Unnecessary or
9.4 Unauthorized Browser and Email Applications Protect
Client Extensions
Centralize Network
12.5 Authentication, Authorization, Network Protect
and Auditing (AAA)
x x x No No
x x x No No
x x No No
x x No No
x No No
x x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x Yes Yes
x x Yes Yes
x x Yes Yes
x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x x No No
x x x No No
x x No No
x x No No
x x No No
x x Yes Yes
x x Yes Yes
x x Yes Yes
x No No
x No No
x x x Yes Yes
x x x Yes Yes
x x x No No
x x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x Yes Yes
x x No Yes
x x Yes Yes
x x No No
x No No
x x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x Yes Yes
x x No No
x x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x No No
x x No No
x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x Yes Yes
x x Yes Yes
x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x No No
x x No No
x x No No
x x No No
x x No No
x x Yes Yes
x x Yes Yes
x x No No
x No No
x x x Yes Yes
x x x Yes Yes
x x Yes Yes
x x Yes Yes
x x No No
x x Yes Yes
x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x No No
x x Yes Yes
x x No No
x x Yes Yes
x x x Yes No
x x x Yes No
x x x Yes Yes
x x x Yes Yes
x x Yes No
x x x Yes Yes
x x Yes Yes
x x No No
x x No No
x x No No
x x No No
x x Yes Yes
x Yes Yes
x x No No
x x Yes Yes
x x Yes Yes
x x Yes Yes
x x Yes Yes
x x No No
x Yes Yes
x Yes Yes
x No No
x Yes Yes
x No No
x x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x x Yes No
x x x Yes Yes
x x x No No
x x x No No
x x Yes Yes
x x x No No
x x No No
x x No No
x x No No
x No No
x No No
x Yes No
x x Yes Yes
x x Yes No
x x Yes No
x x Yes No
x x Yes No
x x No No
x x No No
x x Yes Yes
x x Yes Yes
x x Yes Yes
x x Yes No
x Yes No
x Yes Yes
x No No
x x x No No
x x x No No
x x x No No
x x No No
x x No No
x x No No
x x No No
x x No No
x No No
x x Yes Yes
x x Yes Yes
x x Yes Yes
x No No
x Yes Yes
Risks Associated Risks Associated with Risks Associated
with Web App Insider and Privilege with Targeted
Hacking Misuse Intrusions
0 0 0
0 0 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
Yes Yes Yes 5
No No No 0
Yes Yes No 4
No No Yes 2
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No Yes 1
No No No 0
No No No 0
No No No 0
Yes Yes Yes 5
Yes Yes Yes 5
No No Yes 1
No No No 0
Yes No No 3
No No Yes 3
Yes No No 3
No No No 0
No No No 0
No No No 0
No Yes Yes 3
No Yes Yes 3
No Yes Yes 3
Yes No Yes 4
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No Yes No 2
Yes Yes Yes 5
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
Yes Yes No 3
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
Yes No Yes 4
Yes Yes Yes 5
No No No 0
1
1
3
1
3
3
1
1
1
1
1
1
1
1
1
1
3
3
1
1
1
1
3
1
3
Risk Register Risk Treatment
Address Unauthorized
1.2
Assets
Ensure Authorized
2.2 Software is Currently
Supported
Address Unauthorized
2.3
Software
Utilize Automated Software
2.4
Inventory Tools
Allowlist Authorized
2.5
Software
Allowlist Authorized
2.6
Libraries
Encrypt Data on
3.9
Removable Media
Encrypt Sensitive Data in
3.10
Transit
Securely Manage
4.6 Enterprise Assets and
Software
Centralize Account
5.6
Management
Establish an Access
6.1
Granting Process
Establish an Access
6.2
Revoking Process
Perform Automated
7.5 Vulnerability Scans of
Internal Enterprise Assets
Perform Automated
Vulnerability Scans of
7.6
Externally-Exposed
Enterprise Assets
Remediate Detected
7.7
Vulnerabilities
Establish and Maintain an
8.1 Audit Log Management
Process
Restrict Unnecessary or
9.4 Unauthorized Browser and
Email Client Extensions
Enable Anti-Exploitation
10.5
Features
Perform Automated
11.2
Backups
11.3 Protect Recovery Data
Centralize Network
Authentication,
12.5
Authorization, and Auditing
(AAA)
Deploy a Host-Based
13.2 Intrusion Detection
Solution
Conduct Role-Specific
14.9 Security Awareness and
Skills Training
Securely Decommission
15.7
Service Providers
Train Developers in
Application Security
16.9
Concepts and Secure
Coding
Conduct Application
16.13
Penetration Testing
Designate Personnel to
17.1
Manage Incident Handling
Conduct Post-Incident
17.8
Reviews
Remediate Penetration
18.3
Test Findings
18.4 Validate Security Measures
Perform Periodic Internal
18.5
Penetration Tests
Risk Treatment
Safeguard Description
Establish and maintain an accurate, detailed, and up-to-date inventory of all enterprise assets with the
potential to store or process data, to include: end-user devices (including portable and mobile), network
devices, non-computing/IoT devices, and servers. Ensure the inventory records the network address (if
static), hardware address, machine name, enterprise asset owner, department for each asset, and
whether the asset has been approved to connect to the network. For mobile end-user devices, MDM type
tools can support this process, where appropriate. This inventory includes assets connected to the
infrastructure physically, virtually, remotely, and those within cloud environments. Additionally, it includes
assets that are regularly connected to the enterprise’s network infrastructure, even if they are not under
control of the enterprise. Review and update the inventory of all enterprise assets bi-annually, or more
frequently.
Ensure that a process exists to address unauthorized assets on a weekly basis. The enterprise may
choose to remove the asset from the network, deny the asset from connecting remotely to the network, or
quarantine the asset.
Utilize an active discovery tool to identify assets connected to the enterprise’s network. Configure the
active discovery tool to execute daily, or more frequently.
Use DHCP logging on all DHCP servers or Internet Protocol (IP) address management tools to update the
enterprise’s asset inventory. Review and use logs to update the enterprise’s asset inventory weekly, or
more frequently.
Use a passive discovery tool to identify assets connected to the enterprise’s network. Review and use
scans to update the enterprise’s asset inventory at least weekly, or more frequently.
Establish and maintain a detailed inventory of all licensed software installed on enterprise assets. The
software inventory must document the title, publisher, initial install/use date, and business purpose for
each entry; where appropriate, include the Uniform Resource Locator (URL), app store(s), version(s),
deployment mechanism, and decommission date. Review and update the software inventory bi-annually,
or more frequently.
Ensure that only currently supported software is designated as authorized in the software inventory for
enterprise assets. If software is unsupported, yet necessary for the fulfillment of the enterprise’s mission,
document an exception detailing mitigating controls and residual risk acceptance. For any unsupported
software without an exception documentation, designate as unauthorized. Review the software list to
verify software support at least monthly, or more frequently.
Ensure that unauthorized software is either removed from use on enterprise assets or receives a
documented exception. Review monthly, or more frequently.
Utilize software inventory tools, when possible, throughout the enterprise to automate the discovery and
documentation of installed software.
Use technical controls, such as application allowlisting, to ensure that only authorized software can
execute or be accessed. Reassess bi-annually, or more frequently.
Use technical controls to ensure that only authorized software libraries, such as specific .dll, .ocx, .so,
etc., files, are allowed to load into a system process. Block unauthorized libraries from loading into a
system process. Reassess bi-annually, or more frequently.
Use technical controls, such as digital signatures and version control, to ensure that only authorized
scripts, such as specific .ps1, .py, etc., files, are allowed to execute. Block unauthorized scripts from
executing. Reassess bi-annually, or more frequently.
Establish and maintain a data management process. In the process, address data sensitivity, data owner,
handling of data, data retention limits, and disposal requirements, based on sensitivity and retention
standards for the enterprise. Review and update documentation annually, or when significant enterprise
changes occur that could impact this Safeguard.
Establish and maintain a data inventory, based on the enterprise’s data management process. Inventory
sensitive data, at a minimum. Review and update inventory annually, at a minimum, with a priority on
sensitive data.
Configure data access control lists based on a user’s need to know. Apply data access control lists, also
known as access permissions, to local and remote file systems, databases, and applications.
Retain data according to the enterprise’s data management process. Data retention must include both
minimum and maximum timelines.
Securely dispose of data as outlined in the enterprise’s data management process. Ensure the disposal
process and method are commensurate with the data sensitivity.
Encrypt data on end-user devices containing sensitive data. Example implementations can include:
Windows BitLocker®, Apple FileVault®, Linux® dm-crypt.
Establish and maintain an overall data classification scheme for the enterprise. Enterprises may use
labels, such as “Sensitive,” “Confidential,” and “Public,” and classify their data according to those labels.
Review and update the classification scheme annually, or when significant enterprise changes occur that
could impact this Safeguard.
Document data flows. Data flow documentation includes service provider data flows and should be based
on the enterprise’s data management process. Review and update documentation annually, or when
significant enterprise changes occur that could impact this Safeguard.
Encrypt sensitive data at rest on servers, applications, and databases containing sensitive data. Storage-
layer encryption, also known as server-side encryption, meets the minimum requirement of this
Safeguard. Additional encryption methods may include application-layer encryption, also known as client-
side encryption, where access to the data storage device(s) does not permit access to the plain-text data.
Segment data processing and storage based on the sensitivity of the data. Do not process sensitive data
on enterprise assets intended for lower sensitivity data.
Implement an automated tool, such as a host-based Data Loss Prevention (DLP) tool to identify all
sensitive data stored, processed, or transmitted through enterprise assets, including those located onsite
or at a remote service provider, and update the enterprise's sensitive data inventory.
Establish and maintain a secure configuration process for network devices. Review and update
documentation annually, or when significant enterprise changes occur that could impact this Safeguard.
Configure automatic session locking on enterprise assets after a defined period of inactivity. For general
purpose operating systems, the period must not exceed 15 minutes. For mobile end-user devices, the
period must not exceed 2 minutes.
Implement and manage a firewall on servers, where supported. Example implementations include a virtual
firewall, operating system firewall, or a third-party firewall agent.
Implement and manage a host-based firewall or port-filtering tool on end-user devices, with a default-deny
rule that drops all traffic except those services and ports that are explicitly allowed.
Securely manage enterprise assets and software. Example implementations include managing
configuration through version-controlled-infrastructure-as-code and accessing administrative interfaces
over secure network protocols, such as Secure Shell (SSH) and Hypertext Transfer Protocol Secure
(HTTPS). Do not use insecure management protocols, such as Telnet (Teletype Network) and HTTP,
unless operationally essential.
Manage default accounts on enterprise assets and software, such as root, administrator, and other pre-
configured vendor accounts. Example implementations can include: disabling default accounts or making
them unusable.
Uninstall or disable unnecessary services on enterprise assets and software, such as an unused file
sharing service, web application module, or service function.
Configure trusted DNS servers on enterprise assets. Example implementations include: configuring assets
to use enterprise-controlled DNS servers and/or reputable externally accessible DNS servers.
Enforce automatic device lockout following a predetermined threshold of local failed authentication
attempts on portable end-user devices, where supported. For laptops, do not allow more than 20 failed
authentication attempts; for tablets and smartphones, no more than 10 failed authentication attempts.
Example implementations include Microsoft® InTune Device Lock and Apple® Configuration Profile
maxFailedAttempts.
Remotely wipe enterprise data from enterprise-owned portable end-user devices when deemed
appropriate such as lost or stolen devices, or when an individual no longer supports the enterprise.
Ensure separate enterprise workspaces are used on mobile end-user devices, where supported. Example
implementations include using an Apple® Configuration Profile or Android™ Work Profile to separate
enterprise applications and data from personal applications and data.
Establish and maintain an inventory of all accounts managed in the enterprise. The inventory must include
both user and administrator accounts. The inventory, at a minimum, should contain the person’s name,
username, start/stop dates, and department. Validate that all active accounts are authorized, on a
recurring schedule at a minimum quarterly, or more frequently.
Use unique passwords for all enterprise assets. Best practice implementation includes, at a minimum, an
8-character password for accounts using MFA and a 14-character password for accounts not using MFA.
Delete or disable any dormant accounts after a period of 45 days of inactivity, where supported.
Restrict administrator privileges to dedicated administrator accounts on enterprise assets. Conduct
general computing activities, such as internet browsing, email, and productivity suite use, from the user’s
primary, non-privileged account.
Establish and maintain an inventory of service accounts. The inventory, at a minimum, must contain
department owner, review date, and purpose. Perform service account reviews to validate that all active
accounts are authorized, on a recurring schedule at a minimum quarterly, or more frequently.
Establish and maintain an inventory of the enterprise’s authentication and authorization systems, including
those hosted on-site or at a remote service provider. Review and update the inventory, at a minimum,
annually, or more frequently.
Centralize access control for all enterprise assets through a directory service or SSO provider, where
supported.
Define and maintain role-based access control, through determining and documenting the access rights
necessary for each role within the enterprise to successfully carry out its assigned duties. Perform access
control reviews of enterprise assets to validate that all privileges are authorized, on a recurring schedule
at a minimum annually, or more frequently.
Establish and maintain a documented vulnerability management process for enterprise assets. Review
and update documentation annually, or when significant enterprise changes occur that could impact this
Safeguard.
Establish and maintain a risk-based remediation strategy documented in a remediation process, with
monthly, or more frequent, reviews.
Perform operating system updates on enterprise assets through automated patch management on a
monthly, or more frequent, basis.
Perform application updates on enterprise assets through automated patch management on a monthly, or
more frequent, basis.
Perform automated vulnerability scans of internal enterprise assets on a quarterly, or more frequent,
basis. Conduct both authenticated and unauthenticated scans, using a SCAP-compliant vulnerability
scanning tool.
Remediate detected vulnerabilities in software through processes and tooling on a monthly, or more
frequent, basis, based on the remediation process.
Establish and maintain an audit log management process that defines the enterprise’s logging
requirements. At a minimum, address the collection, review, and retention of audit logs for enterprise
assets. Review and update documentation annually, or when significant enterprise changes occur that
could impact this Safeguard.
Collect audit logs. Ensure that logging, per the enterprise’s audit log management process, has been
enabled across enterprise assets.
Ensure that logging destinations maintain adequate storage to comply with the enterprise’s audit log
management process.
Standardize time synchronization. Configure at least two synchronized time sources across enterprise
assets, where supported.
Configure detailed audit logging for enterprise assets containing sensitive data. Include event source,
date, username, timestamp, source addresses, destination addresses, and other useful elements that
could assist in a forensic investigation.
Collect DNS query audit logs on enterprise assets, where appropriate and supported.
Collect URL request audit logs on enterprise assets, where appropriate and supported.
Collect command-line audit logs. Example implementations include collecting audit logs from
PowerShell®, BASH™, and remote administrative terminals.
Centralize, to the extent possible, audit log collection and retention across enterprise assets.
Retain audit logs across enterprise assets for a minimum of 90 days.
Conduct reviews of audit logs to detect anomalies or abnormal events that could indicate a potential
threat. Conduct reviews on a weekly, or more frequent, basis.
Collect service provider logs, where supported. Example implementations include collecting authentication
and authorization events, data creation and disposal events, and user management events.
Ensure only fully supported browsers and email clients are allowed to execute in the enterprise, only using
the latest version of browsers and email clients provided through the vendor.
Use DNS filtering services on all enterprise assets to block access to known malicious domains.
Enforce and update network-based URL filters to limit an enterprise asset from connecting to potentially
malicious or unapproved websites. Example implementations include category-based filtering, reputation-
based filtering, or through the use of block lists. Enforce filters for all enterprise assets.
Restrict, either through uninstalling or disabling, any unauthorized or unnecessary browser or email client
plugins, extensions, and add-on applications.
To lower the chance of spoofed or modified emails from valid domains, implement DMARC policy and
verification, starting with implementing the Sender Policy Framework (SPF) and the DomainKeys
Identified Mail (DKIM) standards.
Block unnecessary file types attempting to enter the enterprise’s email gateway.
Deploy and maintain email server anti-malware protections, such as attachment scanning and/or
sandboxing.
Configure automatic updates for anti-malware signature files on all enterprise assets.
Disable autorun and autoplay auto-execute functionality for removable media.
Enable anti-exploitation features on enterprise assets and software, where possible, such as Microsoft®
Data Execution Prevention (DEP), Windows® Defender Exploit Guard (WDEG), or Apple® System
Integrity Protection (SIP) and Gatekeeper™.
Establish and maintain a data recovery process. In the process, address the scope of data recovery
activities, recovery prioritization, and the security of backup data. Review and update documentation
annually, or when significant enterprise changes occur that could impact this Safeguard.
Perform automated backups of in-scope enterprise assets. Run backups weekly, or more frequently,
based on the sensitivity of the data.
Protect recovery data with equivalent controls to the original data. Reference encryption or data
separation, based on requirements.
Establish and maintain an isolated instance of recovery data. Example implementations include, version
controlling backup destinations through offline, cloud, or off-site systems or services.
Test backup recovery quarterly, or more frequently, for a sampling of in-scope enterprise assets.
Ensure network infrastructure is kept up-to-date. Example implementations include running the latest
stable release of software and/or using currently supported network-as-a-service (NaaS) offerings. Review
software versions monthly, or more frequently, to verify software support.
Establish and maintain a secure network architecture. A secure network architecture must address
segmentation, least privilege, and availability, at a minimum.
Use secure network management and communication protocols (e.g., 802.1X, Wi-Fi Protected Access 2
(WPA2) Enterprise or greater).
Require users to authenticate to enterprise-managed VPN and authentication services prior to accessing
enterprise resources on end-user devices.
Establish and maintain dedicated computing resources, either physically or logically separated, for all
administrative tasks or tasks requiring administrative access. The computing resources should be
segmented from the enterprise's primary network and not be allowed internet access.
Centralize security event alerting across enterprise assets for log correlation and analysis. Best practice
implementation requires the use of a SIEM, which includes vendor-defined event correlation alerts. A log
analytics platform configured with security-relevant correlation alerts also satisfies this Safeguard.
Deploy a host-based intrusion detection solution on enterprise assets, where appropriate and/or
supported.
Deploy a network intrusion detection solution on enterprise assets, where appropriate. Example
implementations include the use of a Network Intrusion Detection System (NIDS) or equivalent cloud
service provider (CSP) service.
Manage access control for assets remotely connecting to enterprise resources. Determine amount of
access to enterprise resources based on: up-to-date anti-malware software installed, configuration
compliance with the enterprise’s secure configuration process, and ensuring the operating system and
applications are up-to-date.
Collect network traffic flow logs and/or network traffic to review and alert upon from network devices.
Deploy a host-based intrusion prevention solution on enterprise assets, where appropriate and/or
supported. Example implementations include use of an Endpoint Detection and Response (EDR) client or
host-based IPS agent.
Deploy a network intrusion prevention solution, where appropriate. Example implementations include the
use of a Network Intrusion Prevention System (NIPS) or equivalent CSP service.
Deploy port-level access control. Port-level access control utilizes 802.1x, or similar network access
control protocols, such as certificates, and may incorporate user and/or device authentication.
Perform application layer filtering. Example implementations include a filtering proxy, application layer
firewall, or gateway.
Tune security event alerting thresholds monthly, or more frequently.
Establish and maintain a security awareness program. The purpose of a security awareness program is to
educate the enterprise’s workforce on how to interact with enterprise assets and data in a secure manner.
Conduct training at hire and, at a minimum, annually. Review and update content annually, or when
significant enterprise changes occur that could impact this Safeguard.
Train workforce members to recognize social engineering attacks, such as phishing, pre-texting, and
tailgating.
Train workforce members on authentication best practices. Example topics include MFA, password
composition, and credential management.
Train workforce members on how to identify and properly store, transfer, archive, and destroy sensitive
data. This also includes training workforce members on clear screen and desk best practices, such as
locking their screen when they step away from their enterprise asset, erasing physical and virtual
whiteboards at the end of meetings, and storing data and assets securely.
Train workforce members to be aware of causes for unintentional data exposure. Example topics include
mis-delivery of sensitive data, losing a portable end-user device, or publishing data to unintended
audiences.
Train workforce members to be able to recognize a potential incident and be able to report such an
incident.
Train workforce to understand how to verify and report out-of-date software patches or any failures in
automated processes and tools. Part of this training should include notifying IT personnel of any failures in
automated processes and tools.
Train workforce members on the dangers of connecting to, and transmitting data over, insecure networks
for enterprise activities. If the enterprise has remote workers, training must include guidance to ensure
that all users securely configure their home network infrastructure.
Conduct role-specific security awareness and skills training. Example implementations include secure
system administration courses for IT professionals, OWASP® Top 10 vulnerability awareness and
prevention training for web application developers, and advanced social engineering awareness training
for high-profile roles.
Establish and maintain an inventory of service providers. The inventory is to list all known service
providers, include classification(s), and designate an enterprise contact for each service provider. Review
and update the inventory annually, or when significant enterprise changes occur that could impact this
Safeguard.
Establish and maintain a service provider management policy. Ensure the policy addresses the
classification, inventory, assessment, monitoring, and decommissioning of service providers. Review and
update the policy annually, or when significant enterprise changes occur that could impact this Safeguard.
Classify service providers. Classification consideration may include one or more characteristics, such as
data sensitivity, data volume, availability requirements, applicable regulations, inherent risk, and mitigated
risk. Update and review classifications annually, or when significant enterprise changes occur that could
impact this Safeguard.
Ensure service provider contracts include security requirements. Example requirements may include
minimum security program requirements, security incident and/or data breach notification and response,
data encryption requirements, and data disposal commitments. These security requirements must be
consistent with the enterprise’s service provider management policy. Review service provider contracts
annually to ensure contracts are not missing security requirements.
Assess service providers consistent with the enterprise’s service provider management policy.
Assessment scope may vary based on classification(s), and may include review of standardized
assessment reports, such as Service Organization Control 2 (SOC 2) and Payment Card Industry (PCI)
Attestation of Compliance (AoC), customized questionnaires, or other appropriately rigorous processes.
Reassess service providers annually, at a minimum, or with new and renewed contracts.
Monitor service providers consistent with the enterprise’s service provider management policy. Monitoring
may include periodic reassessment of service provider compliance, monitoring service provider release
notes, and dark web monitoring.
Securely decommission service providers. Example considerations include user and service account
deactivation, termination of data flows, and secure disposal of enterprise data within service provider
systems.
Establish and maintain a secure application development process. In the process, address such items as:
secure application design standards, secure coding practices, developer training, vulnerability
management, security of third-party code, and application security testing procedures. Review and update
documentation annually, or when significant enterprise changes occur that could impact this Safeguard.
Establish and maintain a process to accept and address reports of software vulnerabilities, including
providing a means for external entities to report. The process is to include such items as: a vulnerability
handling policy that identifies reporting process, responsible party for handling vulnerability reports, and a
process for intake, assignment, remediation, and remediation testing. As part of the process, use a
vulnerability tracking system that includes severity ratings, and metrics for measuring timing for
identification, analysis, and remediation of vulnerabilities. Review and update documentation annually, or
when significant enterprise changes occur that could impact this Safeguard.
Third-party application developers need to consider this an externally-facing policy that helps to set
expectations for outside stakeholders.
Perform root cause analysis on security vulnerabilities. When reviewing vulnerabilities, root cause analysis
is the task of evaluating underlying issues that create vulnerabilities in code, and allows development
teams to move beyond just fixing individual vulnerabilities as they arise.
Establish and manage an updated inventory of third-party components used in development, often
referred to as a “bill of materials,” as well as components slated for future use. This inventory is to include
any risks that each third-party component could pose. Evaluate the list at least monthly to identify any
changes or updates to these components, and validate that the component is still supported.
Use up-to-date and trusted third-party software components. When possible, choose established and
proven frameworks and libraries that provide adequate security. Acquire these components from trusted
sources or evaluate the software for vulnerabilities before use.
Establish and maintain a severity rating system and process for application vulnerabilities that facilitates
prioritizing the order in which discovered vulnerabilities are fixed. This process includes setting a minimum
level of security acceptability for releasing code or applications. Severity ratings bring a systematic way of
triaging vulnerabilities that improves risk management and helps ensure the most severe bugs are fixed
first. Review and update the system and process annually.
Use standard, industry-recommended hardening configuration templates for application infrastructure
components. This includes underlying servers, databases, and web servers, and applies to cloud
containers, Platform as a Service (PaaS) components, and SaaS components. Do not allow in-house
developed software to weaken configuration hardening.
Ensure that all software development personnel receive training in writing secure code for their specific
development environment and responsibilities. Training can include general security principles and
application security standard practices. Conduct training at least annually and design in a way to promote
security within the development team, and build a culture of security among the developers.
Apply secure design principles in application architectures. Secure design principles include the concept
of least privilege and enforcing mediation to validate every operation that the user makes, promoting the
concept of "never trust user input." Examples include ensuring that explicit error checking is performed
and documented for all input, including for size, data type, and acceptable ranges or formats. Secure
design also means minimizing the application infrastructure attack surface, such as turning off
unprotected ports and services, removing unnecessary programs and files, and renaming or removing
default accounts.
Leverage vetted modules or services for application security components, such as identity management,
encryption, and auditing and logging. Using platform features in critical security functions will reduce
developers’ workload and minimize the likelihood of design or implementation errors. Modern operating
systems provide effective mechanisms for identification, authentication, and authorization and make those
mechanisms available to applications. Use only standardized, currently accepted, and extensively
reviewed encryption algorithms. Operating systems also provide mechanisms to create and maintain
secure audit logs.
Apply static and dynamic analysis tools within the application life cycle to verify that secure coding
practices are being followed.
Conduct application penetration testing. For critical applications, authenticated penetration testing is better
suited to finding business logic vulnerabilities than code scanning and automated security
testing. Penetration testing relies on the skill of the tester to manually manipulate an application as an
authenticated and unauthenticated user.
Conduct threat modeling. Threat modeling is the process of identifying and addressing application security
design flaws within a design, before code is created. It is conducted through specially trained individuals
who evaluate the application design and gauge security risks for each entry point and access level. The
goal is to map out the application, architecture, and infrastructure in a structured way to understand its
weaknesses.
Designate one key person, and at least one backup, who will manage the enterprise’s incident handling
process. Management personnel are responsible for the coordination and documentation of incident
response and recovery efforts and can consist of employees internal to the enterprise, third-party vendors,
or a hybrid approach. If using a third-party vendor, designate at least one person internal to the enterprise
to oversee any third-party work. Review annually, or when significant enterprise changes occur that could
impact this Safeguard.
Establish and maintain contact information for parties that need to be informed of security incidents.
Contacts may include internal staff, third-party vendors, law enforcement, cyber insurance providers,
relevant government agencies, Information Sharing and Analysis Center (ISAC) partners, or other
stakeholders. Verify contacts annually to ensure that information is up-to-date.
Establish and maintain an enterprise process for the workforce to report security incidents. The process
includes reporting timeframe, personnel to report to, mechanism for reporting, and the minimum
information to be reported. Ensure the process is publicly available to all of the workforce. Review
annually, or when significant enterprise changes occur that could impact this Safeguard.
Establish and maintain an incident response process that addresses roles and responsibilities,
compliance requirements, and a communication plan. Review annually, or when significant enterprise
changes occur that could impact this Safeguard.
Assign key roles and responsibilities for incident response, including staff from legal, IT, information
security, facilities, public relations, human resources, incident responders, and analysts, as applicable.
Review annually, or when significant enterprise changes occur that could impact this Safeguard.
Determine which primary and secondary mechanisms will be used to communicate and report during a
security incident. Mechanisms can include phone calls, emails, or letters. Keep in mind that certain
mechanisms, such as emails, can be affected during a security incident. Review annually, or when
significant enterprise changes occur that could impact this Safeguard.
Plan and conduct routine incident response exercises and scenarios for key personnel involved in the
incident response process to prepare for responding to real-world incidents. Exercises need to test
communication channels, decision making, and workflows. Conduct testing on an annual basis, at a
minimum.
Conduct post-incident reviews. Post-incident reviews help prevent incident recurrence through identifying
lessons learned and follow-up action.
Establish and maintain security incident thresholds, including, at a minimum, differentiating between an
incident and an event. Examples can include: abnormal activity, security vulnerability, security weakness,
data breach, privacy incident, etc. Review annually, or when significant enterprise changes occur that
could impact this Safeguard.
Establish and maintain a penetration testing program appropriate to the size, complexity, and maturity of
the enterprise. Penetration testing program characteristics include scope, such as network, web
application, Application Programming Interface (API), hosted services, and physical premise controls;
frequency; limitations, such as acceptable hours, and excluded attack types; point of contact information;
remediation, such as how findings will be routed internally; and retrospective requirements.
Perform periodic external penetration tests based on program requirements, no less than annually.
External penetration testing must include enterprise and environmental reconnaissance to detect
exploitable information. Penetration testing requires specialized skills and experience and must be
conducted through a qualified party. The testing may be clear box or opaque box.
Remediate penetration test findings based on the enterprise’s policy for remediation scope and
prioritization.
Validate security measures after each penetration test. If deemed necessary, modify rulesets and
capabilities to detect the techniques used during testing.
Perform periodic internal penetration tests based on program requirements, no less than annually. The
testing may be clear box or opaque box.
Risk Treatment Risk Treatment
Risk Treatment Risk Treatment
Our Planned Safeguard Safeguard Impact
Safeguard Safeguard Impact
Implementation Expectancy to Operational
Maturity Score to Mission
Score Objectives
Risk Treatment
Risk Treatment Risk Treatment
Safeguard Impact Reasonable and Risk Treatment
Safeguard Impact Safeguard Risk
to Financial Acceptable Safeguard Cost
to Obligations Score
Objectives
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
Reasonable Annual Cost
Impact to
Implementation Implementation
Financial Year Reasonable?
Quarter Year
Objectives
$ - 2021 Yes
$ - 2022 Yes
$ - 2023 Yes
$ - 2024 Yes
$ - 2025 Yes
$ - 2026 Yes
$ - 2027 Yes
$ - 2028 Yes
$ - 2029 Yes
$ - 2030 Yes
Color
Color Key
IG1
IG2
IG3
Asset Name
Expectancy Score
Impact to Mission
Impact to Operational Objectives
Impact to Financial Objectives
Impact to Obligations
Risk Score
Risk Level
Risk Treatment Option
Risk Treatment Safeguard
Risk Treatment
Safeguard Title
Risk Treatment
Safeguard Description
Our Planned Implementation
Risk Treatment Safeguard
Maturity Score
Risk Treatment
Safeguard Expectancy Score
Risk Treatment Safeguard
Impact to Mission
Meaning
The unique CIS Safeguard identifier, as published in the CIS Controls.
The title of the CIS Safeguard, as published in the CIS Controls.
The asset class, as published in the CIS Controls.
Mapping between the NIST CSF Security Functions and CIS Safeguards, as published in the CIS Controls.
An optional field used to input the name of an individual asset to distinguish its risks from other Asset Class
risks.
Fixed 'Y' or 'N' value that states whether the CIS Safeguard in a given row defends against the Attack Type.
Fixed 'Y' or 'N' value that states whether the CIS Safeguard in a given row defends against the Attack Type.
Fixed 'Y' or 'N' value that states whether the CIS Safeguard in a given row defends against the Attack Type.
Fixed 'Y' or 'N' value that states whether the CIS Safeguard in a given row defends against the Attack Type.
Fixed 'Y' or 'N' value that states whether the CIS Safeguard in a given row defends against the Attack Type.
An automatically calculated value, on a scale of '1' to '5' that states how many of the top five Attack Types the
CIS Safeguard in a given row defends against.
A brief description of how the Safeguard is already implemented and operated in the enterprise.
Proof to show how the Safeguard is implemented and operated in the enterprise.
An optional field used to record a vulnerability with a specific asset, such as a vulnerability in an application, as
an example.
A potential or foreseeable event that could compromise the security of information assets.
A score of '1' through '5' designating the reliability of a Safeguard's effectiveness against threats.
An automatically calculated value to represent how common the related threat is as a cause for reported
cybersecurity incidents.
An automatically calculated value to represent how commonly the related threat would be the cause of a
cybersecurity incident, given your current Safeguard and the reported commonality of the attack.
The magnitude of harm that a successful threat would cause to your Mission.
The magnitude of harm that a successful threat would cause to your Operational Objectives.
The magnitude of harm that a successful threat would cause to your Financial Objectives.
The magnitude of harm that a successful threat would cause to your Obligations.
The product of the Expectancy and the highest of the three Impacts.
An evaluation of the risk as negligible, acceptable, unacceptable, high, or catastrophic.
A statement about whether the enterprise will accept or reduce the risk.
The unique CIS Safeguard identifier, as published in the CIS Controls.
The title of the CIS Safeguard, as published in the CIS Controls.
The magnitude of harm that a successful threat would cause to your Operational Objectives.
The magnitude of harm that a successful threat would cause to your Financial Objectives.
The magnitude of harm that a successful threat would cause to your Obligations.
The product of the Expectancy and the highest of the three impacts, given the planned Safeguard.
A determination of whether the planned Safeguard is reasonable and acceptable.
An estimate of how much the Safeguard is expected to cost.
When the Safeguard is planned for completion of implementation (which quarter).
When the Safeguard is planned for completion of implementation (which year).
The total Risk Treatment Safeguard Cost for the year.
The year the total cost was incurred.
Whether or not the total cost falls above or below the acceptable limit, based on the Acceptable Criteria for the
enterprise's Financial Objectives.
Impact Criteria
Impact Scores Mission
Definition Required
Risk Levels
Red Red indicates that the risk is “urgent.”
Yellow indicates that the risk is
Yellow
“unacceptably high, but not urgent.”
Green indicates that the risk evaluates
Green
as “acceptable.”
Impact Criteria
Operational Objectives Financial Objectives
Required Optional
Required
Asset Classes
Applications
Data
Devices
Enterprise
Network
Users
Maturity Scores
Maturity Scores
1
2
3
4
5
Expectancy Criteria
Expectancy Scores
1
2
3
4
5
VCDB Index
Incident Count
Asset Class
Enterprise
Applications
Data
Devices
Network
Users
Unknown
Definition
Safeguard is not implemented or is inconsistently implemented.
Safeguard is implemented fully on some assets or partially on all
assets.
Safeguard is implemented on all assets.
Safeguard is tested and inconsistencies are corrected.
Safeguard has mechanisms that ensure consistent implementation
over time.
Expectancy
Remote
Unlikely
As likely as not
Likely
Certain
Maturity
5
5
5
5
5
4
4
4
4
4
3
3
3
3
3
2
2
2
2
2
1
1
1
1
1
Criteria
Safeguard would reliably prevent the threat.
Safeguard would reliably prevent most occurrences of the
threat.
Safeguard would prevent as many threat occurrences as it
would miss.
Safeguard would prevent few threat occurrences.
Safeguard would not prevent threat occurrences.
As of 7/29/2021
Percentage Index
50% 3
14% 1
50% 3
9% 1
1% 1
50% 3
10% 1
1.1
1.2
1.3
1.4
1.5
2.1
2.2
2.3
2.4
2.5
2.6
2.7
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
3.9
3.10
3.11
3.12
3.13
3.14
4.1
4.2
4.3
4.4
4.5
4.6
4.7
4.8
4.9
4.10
4.11
4.12
5.1
5.2
5.3
5.4
5.5
5.6
6.1
6.2
6.3
6.4
6.5
6.6
6.7
6.8
7.1
7.2
7.3
7.4
7.5
7.6
7.7
8.1
8.2
8.3
8.4
8.5
8.6
8.7
8.8
8.9
8.10
8.11
8.12
9.1
9.2
9.3
9.4
9.5
9.6
9.7
10.1
10.2
10.3
10.4
10.5
10.6
10.7
11.1
11.2
11.3
11.4
11.5
12.1
12.2
12.3
12.4
12.5
12.6
12.7
12.8
13.1
13.2
13.3
13.4
13.5
13.6
13.7
13.8
13.9
13.10
13.11
14.1
14.2
14.3
14.4
14.5
14.6
14.7
14.8
14.9
15.1
15.2
15.3
15.4
15.5
15.6
15.7
16.1
16.2
16.3
16.4
16.5
16.6
16.7
16.8
16.9
16.10
16.11
16.12
16.13
16.14
17.1
17.2
17.3
17.4
17.5
17.6
17.7
17.8
17.9
18.1
18.2
18.3
18.4
18.5
Instructions for Importing CIS CSAT Pro Scores into
CIS RAM
1) In CIS CSAT Pro, filter on IG1, IG2, and IG3 and Export Filtered CSV.
a. Go to the Assessment Summary page for the assessment of interest (this is reachable from the Assessment Summary tab at
the top of the Assessment Dashboard for that assessment).
b. All three IGs should be displayed by default when navigating to the Assessment Summary page without needing filtering.
Maturity Scores
2
3
4
5
lease ensure that your enterprise's method for scoring Safeguards in CSAT Pro
closely enough with the CIS RAM Maturity Scores (defined below). Adjustments
may need to be made based on your current scoring.
Definition
1) In CIS-Hosted CSAT, filter on IG1, IG2, and IG3 and export the filtered Safeguards.
a. Go to the All Controls page for the assessment of interest (this is reachable from the All Controls link on the menu on t
Assessment”).
b. Click the Filter button.
c. Select “Group 1,” “Group 2,” and “Group 3” for the Implementation Group filter and click Filter.
d. Check to see if any of these Safeguards are in the blue (Not Assessed) state. You can see this in the “#” column – ther
each row by the Safeguard number. Any Safeguards that have a blue circle there will not export; if you have any blue Safe
continue these steps, one way to get them out of the blue state is to:
i. Select the checkbox next to each blue Safeguard.
ii. Select “Mark as Applicable” from the Bulk Action option dropdown and click the “Save” butt
Please note: If any of the selected Safeguards were not applicable, this will make them applicable.
e. Click the Download Report button to export the report.
2) Copy your scores from the exported CIS-Hosted CSAT XLSX file to the CIS RAM for IG3 Workbook.
a. In the CIS-Hosted CSAT XLSX file, copy the contents of columns E through H (labeled Policy Defined, Control Implem
and Control Reported) excluding the heading row.
b. Go to the “CIS-Hosted CSAT” tab in the CIS RAM for IG3 Workbook.
c. Paste the copied data into the appropriate section of the “CIS-Hosted CSAT” tab.
d. For instance, for Controls v8, you might copy the cells from E2:E154 over to H2:H154 from the CIS-Hosted CSAT XLS
“CIS-Hosted CSAT” tab in the CIS RAM for IG3 Workbook and paste them there.
3) Note: Adjustments may need to be made based on your scoring from CSAT to CIS RAM.
4) Once scores are final, go to the tab, “3a. Risk Register Controls v8,” for v8 of the CIS Controls.
5) Copy the scores in the “CIS RAM Maturity Score Final” column into the “Safeguard Maturity Score” column of the tab, “3a. Risk
of the CIS Controls.
a. Right-click to copy and “Paste Special” as “Values” (e.g., 1,2,3).
b. Note: Values of ‘N’ and ‘DIV/0!’ may copy over from the “CIS CSAT Pro” and “CIS-Hosted CSAT” tabs, if present. If co
deleted from the “Safeguard Maturity Score” cell and will not affect the functionality of the CIS RAM Risk Register.
Note: This method will average the four scoring categories in CIS-Hosted CSAT for each Safegu
those averages with the CIS RAM Maturity Scores. Please review the CIS RAM Maturity Scores, a
to ensure this method aligns closely enough for your enterprise's scoring practice
Maturity Scores
2
3
4
5
is method will average the four scoring categories in CIS-Hosted CSAT for each Safeguard and aligns
ages with the CIS RAM Maturity Scores. Please review the CIS RAM Maturity Scores, as defined below,
to ensure this method aligns closely enough for your enterprise's scoring practices.
Definition
Instructions: Imagine that your enterprise suffers a cybersecurity or information security incident. Descr
determine that the impacts to your mission were acceptable, or unacceptable.
Impact Magnitude
Negligible
Acceptable
Unacceptable
High
Catastrophic
Operational
2
Objectives
Instructions: Imagine that your enterprise suffers a cybersecurity or information security incident. Descr
determine that the impacts to your operational objectives were acceptable, or unacceptable.
Impact Magnitude
Negligible
Acceptable
Unacceptable
High
Catastrophic
3 Financial Objectives
Instructions: Imagine that your enterprise suffers a cybersecurity or information security incident. Descr
determine that the impacts to your financial objectives were acceptable, or unacceptable.
Impact Magnitude
Negligible
Acceptable
Unacceptable
High
Catastrophic
4 Obligations
Instructions: Imagine that your enterprise suffers a cybersecurity or information security incident. Descr
determine that the impacts to your obligations (harm, to others) were acceptable, or unacceptable.
Impact Magnitude
Negligible
Acceptable
Unacceptable
High
Catastrophic
Prompt
How would you concisely describe the benefit that your enterprise
provides your customers, clients, constituents, or the public? This is
why they engage in this risk with you.
agine that your enterprise suffers a cybersecurity or information security incident. Describe in the spaces provided below how you would
he impacts to your mission were acceptable, or unacceptable.
Prompt
What observable evidence would you have that your mission - as you
defined it above - would be unaffected?
What observable evidence would you have that your mission would be
compromised, but it would not require correction?
What observable evidence would you have that your mission would be
compromised in a way that would require correction, but the correction
could be achieved through the normal course of business?
What observable evidence would you have that your mission would be
compromised so badly that extraordinary efforts would be required to
restore it?
What observable evidence would you have that your mission would be
compromised so badly that it could not be achieved?
Prompt
agine that your enterprise suffers a cybersecurity or information security incident. Describe in the spaces provided below how you would
he impacts to your operational objectives were acceptable, or unacceptable.
Prompt
What observable evidence would you have that your operational
objectives - as you defined them above - would be unaffected?
Prompt
What are the unexpected cost outlays that your enterprise could or
could not tolerate?
agine that your enterprise suffers a cybersecurity or information security incident. Describe in the spaces provided below how you would
he impacts to your financial objectives were acceptable, or unacceptable.
Prompt
What observable evidence would you have that your financial objectives
- as you defined them above - would be unaffected?
What observable evidence would you have that your financial objectives
would be compromised, but it would not require correction?
What observable evidence would you have that your financial objectives
would be compromised in a way that would require correction, but the
correction could be achieved through the normal course of business?
What observable evidence would you have that your financial objectives
would be compromised so badly that extraordinary efforts would be
required to restore them?
Leave this blank
Prompt
agine that your enterprise suffers a cybersecurity or information security incident. Describe in the spaces provided below how you would
he impacts to your obligations (harm, to others) were acceptable, or unacceptable.
Prompt
Describe a condition where others would not be harmed.
Response
Response
Ranked as #1 in all categories in annual "Custom Widget
World" Magazine poll.
Response
Response
$1,000
This enterprise could
tolerate a loss up to
$500,000 $500,000.
If this enterprise loses
more than $2,500,000,
$2,500,000 they could not recover.
$5,000,000
Response
Response
No customer would suffer a loss of competitive
advantage.
2 Impact Criteria
Impact Scores
Definition
1. Negligible
2. Acceptable
3. Unacceptable
4. High
5. Catastrophic
3 Expectancy Criteria
Expectancy Score
1
2
3
4
5
Mission
Reliably produce just-in-time, custom widgets that meet
demanding resiliency and design specifications, and
within market-leading turnaround times.
All orders would be produced within specifications and on
time and without unplanned effort.
All orders would be produced within specifications and on
time, but some may require unplanned effort to stay within
tolerance metrics.
Few orders each quarter (outside of our tolerance
metrics) may miss targets, but could be corrected with
adjustments or discounts.
Expectancy
Remote
Unlikely
As likely as not
Likely
Certain
Expectancy
3
Acceptable Risk is less than …
Example Manufacturer
Enterprise
31-Jul-21
Operational Objectives
Criteria
Safeguard would reliably prevent the threat.
Safeguard would reliably prevent most occurrences of the
threat.
Safeguard would prevent as many threat occurrences as
it would miss.
Safeguard would prevent few threat occurrences.
Safeguard would not prevent threat occurrences.
Impact
3
9
Financial Objectives
$ 1,000.00
$ 500,000.00
$ 2,500,000.00
$ 5,000,000.00
All data on this page is considered
one individual organization's
demo
Obligations
Remediate Detected
7.7 Applications Respond
Vulnerabilities
Standardize Time
8.4 Network Protect
Synchronization
Restrict Unnecessary or
9.4 Unauthorized Browser and Email Applications Protect
Client Extensions
Centralize Network
12.5 Authentication, Authorization, Network Protect
and Auditing (AAA)
x x x No No
x x x No No
x x No No
x x No No
x No No
x x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x Yes Yes
x x Yes Yes
x x Yes Yes
x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x x No No
x x x No No
x x No No
x x No No
x x No No
x x Yes Yes
x x Yes Yes
x x Yes Yes
x No No
x No No
x x x Yes Yes
x x x Yes Yes
x x x No No
x x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x Yes Yes
x x Yes No
x x Yes Yes
x x No No
x No No
x x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x Yes Yes
x x No No
x x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x No No
x x No No
x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x Yes Yes
x x Yes Yes
x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x No No
x x No No
x x No No
x x No No
x x No No
x x Yes Yes
x x Yes Yes
x x No No
x No No
x x x Yes Yes
x x x Yes Yes
x x Yes Yes
x x Yes Yes
x x No No
x x Yes Yes
x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x No No
x x Yes Yes
x x No No
x x Yes Yes
x x x No Yes
x x x No Yes
x x x Yes Yes
x x x Yes Yes
x x No Yes
x x x Yes Yes
x x Yes Yes
x x No No
x x No No
x x No No
x x No No
x x Yes Yes
x Yes Yes
x x No No
x x Yes Yes
x x Yes Yes
x x Yes Yes
x x Yes Yes
x x No No
x Yes Yes
x Yes Yes
x No No
x Yes Yes
x No No
x x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x x Yes Yes
x x x No Yes
x x x Yes Yes
x x x No No
x x x No No
x x Yes Yes
x x x No No
x x No No
x x No No
x x No No
x No No
x No No
x No Yes
x x Yes Yes
x x No Yes
x x No Yes
x x No Yes
x x No Yes
x x No No
x x No No
x x Yes Yes
x x Yes Yes
x x Yes Yes
x x No Yes
x No Yes
x Yes Yes
x No No
x x x No No
x x x No No
x x x No No
x x No No
x x No No
x x No No
x x No No
x x No No
x No No
x x Yes Yes
x x Yes Yes
x x Yes Yes
x No No
x Yes Yes
Risks Associated with Risks Associated
Risks Associated with
Insider and Privilege with Targeted
Web App Hacking
Misuse Intrusions
12 12 15
6.66666666666667 8.75 8.75
3 3 4
Defends
Defends Against Web Defends Against Insider Defends Against
Against All
Application Hacking and Privilege Misuse Targeted Intrusions
Attack Types
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
Yes Yes Yes 5
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
Yes Yes No 4
No No Yes 2
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No Custom Yes 1
No No No 0
No No No 0
No No No 0
No No No 0
Yes No No 3
No No Yes 3
Yes No No 3
No No No 0
Yes Yes No 4
No No No 0
No No No 0
No Yes Yes 3
No Yes Yes 3
Yes No Yes 4
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
Yes Yes Yes 5
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
Yes Yes No 3
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
No No No 0
Yes No Yes 4
No No No 0
Evidence of
Our Implementation Vulnerabilities Threats
Implementation
Recently published threats
Alerts and correlation in the
The "Log Management that are detectable by
SIEM have not been fine-
Standard" applies to all evaluating correlated
tuned to threats in our
systems in the enterprise. indicators may exploit
specific networks.
systems undetected.
Impact to Impact to
Safeguard Expectancy Impact to
VCDB Index Operational Financial
Maturity Score Score Mission
Objectives Objectives
1
1
3
1
1
1
3
3
1
1
2 1 3 3 4 4
5 1 1 3 4 4
5 1 1 3 4 4
5 1 1 3 4 4
2 1 3 3 4 5
1
1
1
1
3
1
1
3
3
3
3
1
1
1
1
3
3
3
sed for demonstration purposes.
Address Unauthorized
1.2
Assets
Ensure Authorized
2.2 Software is Currently
Supported
Address Unauthorized
2.3
Software
Allowlist Authorized
2.5
Software
Allowlist Authorized
2.6
Libraries
Encrypt Data on
3.9
Removable Media
Configure Automatic
4.3 Session Locking on
Enterprise Assets
Securely Manage
4.6 Enterprise Assets and
Software
Uninstall or Disable
Unnecessary Services on
4.8
Enterprise Assets and
Software
Separate Enterprise
4.12 Workspaces on Mobile
End-User Devices
Restrict Administrator
5.4 Privileges to Dedicated
Administrator Accounts
Establish and Maintain an
5.5 Inventory of Service
Accounts
Centralize Account
5.6
Management
Establish an Access
6.1
Granting Process
Establish an Access
6.2
Revoking Process
Perform Automated
7.3 Operating System Patch
Management
Perform Automated
7.4 Application Patch
Management
Perform Automated
7.5 Vulnerability Scans of
Internal Enterprise Assets
Perform Automated
Vulnerability Scans of
7.6
Externally-Exposed
Enterprise Assets
Remediate Detected
7.7
Vulnerabilities
Standardize Time
4 4 Accept 8.4
Synchronization
Collect Command-Line
8.8
Audit Logs
Restrict Unnecessary or
9.4 Unauthorized Browser and
Email Client Extensions
Enable Anti-Exploitation
10.5
Features
Perform Automated
11.2
Backups
Ensure Network
12.1
Infrastructure is Up-to-Date
Centralize Network
Authentication,
12.5
Authorization, and Auditing
(AAA)
Deploy a Host-Based
13.7 Intrusion Prevention
Solution
Conduct Role-Specific
14.9 Security Awareness and
Skills Training
Securely Decommission
15.7
Service Providers
Train Developers in
Application Security
16.9
Concepts and Secure
Coding
Implement Code-Level
16.12
Security Checks
Conduct Application
16.13
Penetration Testing
16.14 Conduct Threat Modeling
Designate Personnel to
17.1
Manage Incident Handling
Conduct Post-Incident
17.8
Reviews
Establish and Maintain
17.9 Security Incident
Thresholds
Remediate Penetration
18.3
Test Findings
Use DHCP logging on all DHCP servers or Internet Protocol (IP) address
management tools to update the enterprise’s asset inventory. Review and
use logs to update the enterprise’s asset inventory weekly, or more
frequently.
Collect audit logs. Ensure that logging, per the enterprise’s audit log
management process, has been enabled across enterprise assets.
Develop scenarios in
Configure detailed audit logging for enterprise assets containing sensitive which personnel abuse
data. Include event source, date, username, timestamp, source access. Develop SIEM
addresses, destination addresses, and other useful elements that could alerts based on those
assist in a forensic investigation. scenarios. Update
annually.
Collect DNS query audit logs on enterprise assets, where appropriate and
supported.
Collect URL request audit logs on enterprise assets, where appropriate
and supported.
Collect command-line audit logs. Example implementations include
collecting audit logs from PowerShell®, BASH™, and remote
administrative terminals.
Centralize, to the extent possible, audit log collection and retention across
enterprise assets.
Retain audit logs across enterprise assets for a minimum of 90 days.
Conduct reviews of audit logs to detect anomalies or abnormal events
that could indicate a potential threat. Conduct reviews on a weekly, or
more frequent, basis.
Ensure only fully supported browsers and email clients are allowed to
execute in the enterprise, only using the latest version of browsers and
email clients provided through the vendor.
Use DNS filtering services on all enterprise assets to block access to
known malicious domains.
Enforce and update network-based URL filters to limit an enterprise asset
from connecting to potentially malicious or unapproved websites.
Example implementations include category-based filtering, reputation-
based filtering, or through the use of block lists. Enforce filters for all
enterprise assets.
Apply static and dynamic analysis tools within the application life cycle to
verify that secure coding practices are being followed.
Designate one key person, and at least one backup, who will manage the
enterprise’s incident handling process. Management personnel are
responsible for the coordination and documentation of incident response
and recovery efforts and can consist of employees internal to the
enterprise, third-party vendors, or a hybrid approach. If using a third-party
vendor, designate at least one person internal to the enterprise to
oversee any third-party work. Review annually, or when significant
enterprise changes occur that could impact this Safeguard.
4 1 2 2 2
Risk Treatment Risk Treatment
Reasonable and Risk Treatment Implementation
Safeguard Impact Safeguard Risk
Acceptable Safeguard Cost Quarter
to Obligations Score
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
3 3 Yes $ 150,000 Q3
Yes
Yes
Yes
3 3 Yes Q3
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
Reasonable Annual Cost
Impact to
Implementation
Financial Year Reasonable?
Year
Objectives
$ - 2021 Yes
$ - 2023 Yes
$ - 2024 Yes
$ - 2025 Yes
$ - 2026 Yes
$ - 2027 Yes
$ - 2028 Yes
$ - 2029 Yes
$ - 2030 Yes
2022
2022
All data on this
CIS CSAT Pro only, and is not m
organization's CS
for de
CIS CSAT Pro for CIS Controls v8.0
CIS RAM
CSAT Pro Export CSAT Pro Score Maturity
v8 Safeguard #
Score (Stripped) Score
1.1 5 (81-100%) 5 Final
5
1.2 3 (41-60%) 3 3
1.3 4 (61-80%) 4 4
1.4 3 (41-60%) 3 3
1.5 2 (21-40%) 2 2
2.1 4 (61-80%) 4 4
2.2 4 (61-80%) 4 4
2.3 2 (21-40%) 2 2
2.4 2 (21-40%) 2 2
2.5 5 (81-100%) 5 5
2.6 2 (21-40%) 2 2
2.7
3.1 Not Applicable N N
3.2
3.3 Not Available N N
3.4
3.5
3.6
3.7
3.8
3.9
3.10
3.11
3.12
3.13
3.14
4.1
4.2
4.3
4.4
4.5
4.6
4.7
4.8
4.9 5 (81-100%) 5 5
4.10
4.11
4.12
5.1
5.2 5 (81-100%) 5 5
5.3
5.4 3 (41-60%) 3 3
5.5 3 (41-60%) 3 3
5.6 2 (21-40%) 2 2
6.1 4 (61-80%) 4 4
6.2 4 (61-80%) 4 4
6.3 2 (21-40%) 2 2
6.4 2 (21-40%) 2 2
6.5 5 (81-100%) 5 5
6.6 4 (61-80%) 4 4
6.7 2 (21-40%) 2 2
6.8 2 (21-40%) 2 2
7.1 5 (81-100%) 5 5
7.2
7.3
7.4
7.5
7.6
7.7
8.1
8.2
8.3
8.4
8.5
8.6
8.7
8.8
8.9
8.10
8.11
8.12
9.1
9.2
9.3
9.4
9.5
9.6
9.7
10.1
10.2
10.3
10.4
10.5
10.6
10.7
11.1
11.2
11.3
11.4
11.5
12.1
12.2
12.3
12.4
12.5
12.6
12.7
12.8
13.1
13.2
13.3
13.4
13.5
13.6
13.7
13.8
13.9
13.10
13.11
14.1
14.2
14.3
14.4
14.5
14.6
14.7
14.8
14.9
15.1
15.2
15.3
15.4
15.5
15.6
15.7
16.1
16.2
16.3
16.4
16.5
16.6
16.7
16.8
16.9
16.10
16.11
16.12
16.13
16.14
17.1
17.2
17.3
17.4
17.5
17.6
17.7
17.8
17.9
18.1
18.2
18.3
18.4
18.5
l data on this page is considered sample data
y, and is not meant to reflect any one individual
anization's CSAT/RAM scoring. Only to be used
for demonstration purposes.
C
CIS-Hosted CSAT
Policy Defined Control Implemented
Maturity Scores
1 No Policy Not Implemented
2 Informal Policy Parts of Policy Implemented
3 Partially Written Policy Implemented on Some Systems
4 Written Policy Implemented on Most Systems
5 Approved Written Policy Implemented on All Systems
Unknown - Unscored None None
Unknown - N/A Not Applicable Not Applicable