SlideShare uma empresa Scribd logo
1 de 14
Extending the 20 Critical Security Controls to
Gap Assessments & Security Maturity Modeling


          ShmooCon Fire Talks
          Hyatt Regency Washington
          400 New Jersey Avenue, NW
          Washington, DC 20001
          February 16, 2013

          John M. Willis, pINFOSEC
          2020 Pennsylvania Ave NW #400
          Washington DC 20006
          John.Willis@pINFOSEC.com
          LinkedIn.com/in/johnmwillis
          (202) 670-7179
Extending the 20 Critical Security Controls to
Gap Assessment & Security Maturity Modeling

Purpose:

Using the 20 Critical Security Controls, create Base
Practice Statements against which security engineering
and operations processes may be assessed for capability
and maturity.

Provide model framework to base Gap Assessments upon.

Facilitate focus of Remediation Planning.

Poll for interest in creating the model.

Call for volunteers to create the model.



                                                          2
20 Critical Security Controls
Attack-focused controls created by a consortium of
government agencies, major corporations, and many
others. Formerly known as the Consensus Audit
Guidelines, a complete copy of the controls may be found
on SANS Institute web site. Currently, the Consortium for
Cybersecurity Action is the organization engaged in
various projects pertaining to the controls.

1. Inventory of Authorized and Unauthorized Devices
2. Inventory of Authorized and Unauthorized Software
3. Secure Configurations for Hardware and Software on
Mobile Devices, Laptops, Workstations, and Servers
4. Continuous Vulnerability Assessment and Remediation
5. Malware Defenses
6. Application Software Security
7. Wireless Device Control
8. Data Recovery Capability
                                                            3
20 Critical Controls (cont'd)
9. Security Skills Assessment and Appropriate
Training to Fill Gaps
10. Secure Configurations for Network Devices
such as Firewalls, Routers, and Switches
11. Limitation and Control of Network
Ports, Protocols, and Services
12. Controlled Use of Administrative Privileges
13. Boundary Defense
14. Maintenance, Monitoring, and Analysis of
Audit Logs
15. Controlled Access Based on the Need to Know
16. Account Monitoring and Control
17. Data Loss Prevention
18. Incident Response and Management
19. Secure Network Engineering
20. Penetration Tests and Red Team Exercises
                                                  4
Each control has a short title, and a
 sentence describing the control
For example:
http://www.sans.org/critical-security-controls/control.php?id=1

“Critical Control 1: Inventory of Authorized and
Unauthorized Devices

“The processes and tools used to
track/control/prevent/correct network access by
devices (computers, network
components, printers, anything with an IP
address) based on an asset inventory of which
devices are allowed to connect to the network.”

Implementation information follows…
                                                                  5
Proposed Decomposed Base Practice
      Version of Critical Control 1

BP.01.01 – Manage inventory of authorized devices
(computers, network
components, printers, anything with IP addresses)

BP.01.02 – Limit network access to authorized
devices

All text under the Critical Control section, including
details from the referenced NIST SP 800-53
sections, should be taken into consideration when
crafting the Base Practice language.

                                                         6
Process Capability Maturity Levels

0 – No – No Process Exists

1 – Exists – Process Exists

2 – Defined – Defined Process of some sort Exists

3 – Practiced – Vetted Process is now a routine Practice

4 – Reviewed – The Process is formally Reviewed on a
Specified Periodic Basis

5 – Continuous – The Process is reviewed periodically
and is subjected to Continuous Improvement



                                                           7
Example of Tailoring Assessment
Category            Description                         Maturity
                                                         Level
Asset Management    List servers by type/function and
                                                           2
                    location.
Device              How to know device is authorized
Authentication      before admitting to network?
                    Validate device certificate?           1
                    Otherwise, scan for unauthorized
                    devices every 12 hours?
Network Admission   Control every switch port via NAC
                    (user ports controlled, audited.
                                                           0
                    Non-user ports verified and
                    audited).
                    Utilize network scanning tools to
                    identify unauthorized wireless         1
                    devices.
                                                                   8
Another Approach
One approach is to assign maturity levels to the
categories (Implementation Levels) listed under
"How to Implement, Automate, and Measure the
Effectiveness of this Control”:

•   Quick Wins
•   Visibility/Attribution
•   Configuration/Hygiene
•   Advanced

The information in these categories is
informative & through-provoking, but does not
define an assessment framework.

                                                   9
Proposed Model

The proposed model focuses on process capability maturity
using Base Practices restated from the Critical Controls.

Based on all such Base Practices, a formal or informal Gap
Assessment can be created and saved as a baseline.

For example:
• BP.01.01 – Manage Device Inventory, Maturity Level 2
• BP.01.02 – Limit Network Access, Maturity Level 1

Remediation planning is then focused on getting the
organization to the point where the Base Practices are least
Practiced, etc.




                                                               10
Extension of Proposed Model
In addition to process capability, consider including
measures for Robustness Levels.
Focus on security architecture and engineering
rigor, to include the following (for example):
• Visibility/Attribution
• Configuration/Hygiene
• Automation
• Breadth & Depth of coverage
• Integrity
• Resilience
• Ability to provide/consume situational awareness
   data
• Common Criteria Evaluation Assurance Level-like
   criteria
• and/or whatever makes sense
                                                        11
Poll for Interest / Call for Action
Does this approach make sense? Would anyone
use it? Who wants to help create such a Model, in
conjunction with the Consortium for Cybersecurity
Action?

Three key components:

  1. Create the Base Practice Statements for each
  Critical Control

  2. Define Robustness Levels, and assessment
  method

  3. Create Tailoring Guidelines
                                                    12
Credits & Legal

• Thanks to Tony Sager, Consortium for Cybersecurity
Action for his input and encouragement to promote
this Proposed Model

• Copyrights, Registration and Service Marks, etc., if
any, are property of their respective owners

• The current version of the 20 Critical Controls may
be found at http://www.sans.org/critical-security-
controls/, and is licensed under the Creative
Commons License
(http://creativecommons.org/licenses/by-nd/3.0/)


                                                         13
Contact Information


John M. Willis
pINFOSEC.com
2020 Pennsylvania Ave NW #400
Washington DC 20006
John.Willis@pINFOSEC.com
LinkedIn.com/in/johnmwillis
(202) 670-7179


                                14

Mais conteúdo relacionado

Mais procurados

Overview of the 20 critical controls
Overview of the 20 critical controlsOverview of the 20 critical controls
Overview of the 20 critical controls
EnclaveSecurity
 

Mais procurados (20)

Utilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare TechnologyUtilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare Technology
 
The Critical Security Controls and the StealthWatch System
The Critical Security Controls and the StealthWatch SystemThe Critical Security Controls and the StealthWatch System
The Critical Security Controls and the StealthWatch System
 
Cheatsheet for your cloud project
Cheatsheet for your cloud projectCheatsheet for your cloud project
Cheatsheet for your cloud project
 
Overview of the 20 critical controls
Overview of the 20 critical controlsOverview of the 20 critical controls
Overview of the 20 critical controls
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
 
Using an Open Source Threat Model for Prioritized Defense
Using an Open Source Threat Model for Prioritized DefenseUsing an Open Source Threat Model for Prioritized Defense
Using an Open Source Threat Model for Prioritized Defense
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #4
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #4SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #4
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #4
 
More practical insights on the 20 critical controls
More practical insights on the 20 critical controlsMore practical insights on the 20 critical controls
More practical insights on the 20 critical controls
 
Alien vault sans cyber threat intelligence
Alien vault sans cyber threat intelligenceAlien vault sans cyber threat intelligence
Alien vault sans cyber threat intelligence
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
 
Alienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworksAlienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworks
 
Improve threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usmImprove threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usm
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
NASA OIG Report
NASA OIG ReportNASA OIG Report
NASA OIG Report
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS Environments
 
Vulnerability Assesment
Vulnerability AssesmentVulnerability Assesment
Vulnerability Assesment
 
Information Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to MeasurementInformation Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to Measurement
 
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleWalk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
 

Semelhante a Extending the 20 critical security controls to gap assessments and security maturity modeling-john willis-pinfosec

Risk Oriented Testing of Web-Based Applications
Risk Oriented Testing of Web-Based ApplicationsRisk Oriented Testing of Web-Based Applications
Risk Oriented Testing of Web-Based Applications
Paxcel Technologies
 
Risk oriented testing of web-based applications
Risk oriented testing of web-based applicationsRisk oriented testing of web-based applications
Risk oriented testing of web-based applications
sarikagrov
 
Verifikasi dan Validasi keamanan informasi
Verifikasi dan Validasi keamanan informasiVerifikasi dan Validasi keamanan informasi
Verifikasi dan Validasi keamanan informasi
rizqiariy
 

Semelhante a Extending the 20 critical security controls to gap assessments and security maturity modeling-john willis-pinfosec (20)

White Paper: Six-Step Competitive Device Evaluation
White Paper: Six-Step Competitive Device EvaluationWhite Paper: Six-Step Competitive Device Evaluation
White Paper: Six-Step Competitive Device Evaluation
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation Style
 
Risk Oriented Testing of Web-Based Applications
Risk Oriented Testing of Web-Based ApplicationsRisk Oriented Testing of Web-Based Applications
Risk Oriented Testing of Web-Based Applications
 
Risk oriented testing of web-based applications
Risk oriented testing of web-based applicationsRisk oriented testing of web-based applications
Risk oriented testing of web-based applications
 
NSA and PT
NSA and PTNSA and PT
NSA and PT
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s Missing
 
Web application testing
Web application testing Web application testing
Web application testing
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation Firewalls
 
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdfThick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
 
Verifikasi dan Validasi keamanan informasi
Verifikasi dan Validasi keamanan informasiVerifikasi dan Validasi keamanan informasi
Verifikasi dan Validasi keamanan informasi
 
PCI and Vulnerability Assessments - What’s Missing?
PCI and Vulnerability Assessments - What’s Missing?PCI and Vulnerability Assessments - What’s Missing?
PCI and Vulnerability Assessments - What’s Missing?
 
Security Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdfSecurity Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdf
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Web application vulnerability assessment
Web application vulnerability assessmentWeb application vulnerability assessment
Web application vulnerability assessment
 
I Series User Management
I Series User ManagementI Series User Management
I Series User Management
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous Monitoring
 
Open Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob CowlesOpen Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob Cowles
 
Web applications security conference slides
Web applications security  conference slidesWeb applications security  conference slides
Web applications security conference slides
 
5 Steps to an Effective Vulnerability Management Program
5 Steps to an Effective Vulnerability Management Program5 Steps to an Effective Vulnerability Management Program
5 Steps to an Effective Vulnerability Management Program
 
Lets talk about soc2s, baby! BSidesLV 2021
Lets talk about soc2s, baby! BSidesLV 2021Lets talk about soc2s, baby! BSidesLV 2021
Lets talk about soc2s, baby! BSidesLV 2021
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Último (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 

Extending the 20 critical security controls to gap assessments and security maturity modeling-john willis-pinfosec

  • 1. Extending the 20 Critical Security Controls to Gap Assessments & Security Maturity Modeling ShmooCon Fire Talks Hyatt Regency Washington 400 New Jersey Avenue, NW Washington, DC 20001 February 16, 2013 John M. Willis, pINFOSEC 2020 Pennsylvania Ave NW #400 Washington DC 20006 John.Willis@pINFOSEC.com LinkedIn.com/in/johnmwillis (202) 670-7179
  • 2. Extending the 20 Critical Security Controls to Gap Assessment & Security Maturity Modeling Purpose: Using the 20 Critical Security Controls, create Base Practice Statements against which security engineering and operations processes may be assessed for capability and maturity. Provide model framework to base Gap Assessments upon. Facilitate focus of Remediation Planning. Poll for interest in creating the model. Call for volunteers to create the model. 2
  • 3. 20 Critical Security Controls Attack-focused controls created by a consortium of government agencies, major corporations, and many others. Formerly known as the Consensus Audit Guidelines, a complete copy of the controls may be found on SANS Institute web site. Currently, the Consortium for Cybersecurity Action is the organization engaged in various projects pertaining to the controls. 1. Inventory of Authorized and Unauthorized Devices 2. Inventory of Authorized and Unauthorized Software 3. Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers 4. Continuous Vulnerability Assessment and Remediation 5. Malware Defenses 6. Application Software Security 7. Wireless Device Control 8. Data Recovery Capability 3
  • 4. 20 Critical Controls (cont'd) 9. Security Skills Assessment and Appropriate Training to Fill Gaps 10. Secure Configurations for Network Devices such as Firewalls, Routers, and Switches 11. Limitation and Control of Network Ports, Protocols, and Services 12. Controlled Use of Administrative Privileges 13. Boundary Defense 14. Maintenance, Monitoring, and Analysis of Audit Logs 15. Controlled Access Based on the Need to Know 16. Account Monitoring and Control 17. Data Loss Prevention 18. Incident Response and Management 19. Secure Network Engineering 20. Penetration Tests and Red Team Exercises 4
  • 5. Each control has a short title, and a sentence describing the control For example: http://www.sans.org/critical-security-controls/control.php?id=1 “Critical Control 1: Inventory of Authorized and Unauthorized Devices “The processes and tools used to track/control/prevent/correct network access by devices (computers, network components, printers, anything with an IP address) based on an asset inventory of which devices are allowed to connect to the network.” Implementation information follows… 5
  • 6. Proposed Decomposed Base Practice Version of Critical Control 1 BP.01.01 – Manage inventory of authorized devices (computers, network components, printers, anything with IP addresses) BP.01.02 – Limit network access to authorized devices All text under the Critical Control section, including details from the referenced NIST SP 800-53 sections, should be taken into consideration when crafting the Base Practice language. 6
  • 7. Process Capability Maturity Levels 0 – No – No Process Exists 1 – Exists – Process Exists 2 – Defined – Defined Process of some sort Exists 3 – Practiced – Vetted Process is now a routine Practice 4 – Reviewed – The Process is formally Reviewed on a Specified Periodic Basis 5 – Continuous – The Process is reviewed periodically and is subjected to Continuous Improvement 7
  • 8. Example of Tailoring Assessment Category Description Maturity Level Asset Management List servers by type/function and 2 location. Device How to know device is authorized Authentication before admitting to network? Validate device certificate? 1 Otherwise, scan for unauthorized devices every 12 hours? Network Admission Control every switch port via NAC (user ports controlled, audited. 0 Non-user ports verified and audited). Utilize network scanning tools to identify unauthorized wireless 1 devices. 8
  • 9. Another Approach One approach is to assign maturity levels to the categories (Implementation Levels) listed under "How to Implement, Automate, and Measure the Effectiveness of this Control”: • Quick Wins • Visibility/Attribution • Configuration/Hygiene • Advanced The information in these categories is informative & through-provoking, but does not define an assessment framework. 9
  • 10. Proposed Model The proposed model focuses on process capability maturity using Base Practices restated from the Critical Controls. Based on all such Base Practices, a formal or informal Gap Assessment can be created and saved as a baseline. For example: • BP.01.01 – Manage Device Inventory, Maturity Level 2 • BP.01.02 – Limit Network Access, Maturity Level 1 Remediation planning is then focused on getting the organization to the point where the Base Practices are least Practiced, etc. 10
  • 11. Extension of Proposed Model In addition to process capability, consider including measures for Robustness Levels. Focus on security architecture and engineering rigor, to include the following (for example): • Visibility/Attribution • Configuration/Hygiene • Automation • Breadth & Depth of coverage • Integrity • Resilience • Ability to provide/consume situational awareness data • Common Criteria Evaluation Assurance Level-like criteria • and/or whatever makes sense 11
  • 12. Poll for Interest / Call for Action Does this approach make sense? Would anyone use it? Who wants to help create such a Model, in conjunction with the Consortium for Cybersecurity Action? Three key components: 1. Create the Base Practice Statements for each Critical Control 2. Define Robustness Levels, and assessment method 3. Create Tailoring Guidelines 12
  • 13. Credits & Legal • Thanks to Tony Sager, Consortium for Cybersecurity Action for his input and encouragement to promote this Proposed Model • Copyrights, Registration and Service Marks, etc., if any, are property of their respective owners • The current version of the 20 Critical Controls may be found at http://www.sans.org/critical-security- controls/, and is licensed under the Creative Commons License (http://creativecommons.org/licenses/by-nd/3.0/) 13
  • 14. Contact Information John M. Willis pINFOSEC.com 2020 Pennsylvania Ave NW #400 Washington DC 20006 John.Willis@pINFOSEC.com LinkedIn.com/in/johnmwillis (202) 670-7179 14