CIS Controls Guide
CIS Controls Guide
READ NOW
Although the CIS Controls were originally developed by the Center for Internet Assess
Security (CIS) to guide enterprise IT cybersecurity and data protection, escalating which best practices are not fully
cyber threats to critical infrastructure operations are driving adoption by industrial implemented in your environment.
control system (ICS) operators. These controls focus on prioritizing “What Works”,
Prioritize
with a strong emphasis on security functions that have demonstrated real world implementation based on your
effectiveness against the latest advanced targeted threats. Standardization and organization’s business drivers.
automation is another top priority, to gain operational efficiencies while also
improving effectiveness. Evaluate
solutions against the controls
This CIS Controls implementation guide is a combination of security best practices you will implement when vetting
adapted for the unique needs of industrial control systems, along with tips from vendor(s).
ICS experts who have real-world experience using these controls in OT systems.
Some of the business benefits that implementing the CIS Controls can provide
include:
1 Reduce the ability • A secure database of all devices in your Traditional IT active scanners should never be
Inventory and of attackers to environment used in ICS, as some systems cannot deal with
Control find and exploit • Automated asset detection unexpected traffic and may cause denial of
of Hardware unauthorized, • Approval process for new configuration versions service.
Assets unprotected • The ability to capture and store secure
Instead, use a mixture of agent, agentless, native
systems. configuration data
ICS protocol polling and passive monitoring to
• The ability to report against a standard
create a realtime inventory safely.
• Ability to onboard assets to include useful
metadata such as location, owner and their
contact information
2 Mitigate or • Collection of asset software information, including Any patches on ICS systems should be approved
Inventory and root out attacks operating system, software and patch application, by the ICS providers and tested on a QA
Control by identifying and versions from the associated hardware assets environment before going live.
of Software vulnerable or in the inventory database
Make sure your inventory captures aren’t
Assets malicious software • Enforcement of an approval process to control
just standard Microsoft and Linux managed
- protect the good changes to the configuration of the assets
packages, but also the actual functional code
stuff. • Ability to create policies to alert on changes to a
repositories for the control system itself. File
system’s reference baseline
Integrity Management is a useful tool here.
4 To prevent routine • Comprehensive data collection Identifying and following a set of standards
Secure Configuration of misconfigurations from capabilities to monitor configuration is one way to mature a security program.
Enterprise Assets and providing an attack settings However, ICS systems need a lot of flexibility,
Software surface that can be • Ability to set policy (corporate standards) as the devices can have many technical
exploited or otherwise and baselines (actual approved device exceptions. Finding a solution that can be
cause operational configurations) firm enough to matter, but flexible enough to
downtime. • Alerts, dashboards and workflow tools live with is a key requirement for long term
to manage all the pieces success.
• Flexible permission model to allow for
alignment with your business processes
• Pre-built policies aligned with CIS Top
20 controls
6 Prevent attackers from • Centralized logging of access events Running process as user accounts with Domain
Access Control gaining access to highly • The ability to generate alerts based on Administrator privileges is bad enough. Make
Management sensitive data. consolidation and aggregation of access sure your engineers and operators aren’t doing
events this.
• The ability to generate reports on access
events
8 Log events that can help • Ability to absorb different event formats Using a system that can aggregate logs from
Audit Log Management you detect, understand from different IT and ICS devices and all ICS devices to filter and create a common
and recover from an normalize to a common specification format before forwarding to your SIEM will save
attack. • Ability to filter and highlight the most you time and money. Bonus points of it can
important events connect asset data with events data in a single
• Ability to forward to different channels, system.
e.g., IT SIEM in the SOC and HMI event
list for ICS operators and email to SMS
relay for the most critical of events
10 Block malicious • Protect your borders with the latest in ICS vendors are very wary of active blocking of
Malware Defenses code from adversely antimalware technologies malware in their systems. Any misidentification
affecting reliability and • Leverage a scanning station with access could lead to major consequences. Use more
performance standards, to multiple scanning engines to scan detective methods such as file integrity
tampering with system removable media management and change detection engines to
settings or capturing • Leverage industrial protocol aware provide indicators of compromise instead of
sensitive data. networkbased solutions inside the ICS more active measures.
network
12 Prevent attackers from • Management of change information Control system devices are normally
Network Infrastructure exploiting vulnerable for software, patches, user accounts, preconfigured by vendors. The preconfigured
Management network services and firewall rules and configurations of state may lack robust security configurations
access points. network devices, including routers, and settings.
switches, firewalls, IDS and IPS systems
Relying only on Netflow to tell you about
• The ability to archive and backup most
open ports and services can leave you with
devices with text-based configuration
blind spots. A combination of Netflow mixed
files that can be used for restoration
with device inspection will give a much more
• Automated collection of information on
complete picture.
ports, protocols and services for assets
in the control network
14 Identify skill gaps and • Have an information repository Industrial organizations with the strongest
Security Awareness and design exercises and containing information on target assets safety cultures spend a lot of time training
Skills Training training to remediate. that can be used for training purposes employees on not only what to do, but why
• Asset management to automatically you should.
keep the database updated
The same rigor should apply to your
• A unified view of device security
cybersecurity as well, since cybersecurity can
for better understanding and
bleed over into physical events.
communication of security information
16 Manage the security of • An automated asset inventory designed You know it as HMI appliance version 1.4, and
Application Software in-house and 3rd party to track at the individual software it’s never been updated in 5 years. It is really
Security software to prevent, library level for better vulnerability an integration of a database, a webserver, a
detect and correct management protocol server, a Linux core and many other
security weaknesses. • Ability to identify custom executables, software components, all with their own
scripts and portable exe and track file configurations.
integrity
Know what you really have and map those to
a policy for the CIS Top 20 Controls with real
time reporting of exceptions.
18 Use of simulated • Continuously update dashboards Strong rules of engagement are a must.
Penetration Tests attacks will improve and reports of assets and asset Replicas are a good alternative to work in
organizational readiness, configurations to be used in penetration but are only good if they in fact replicate real
identify vulnerabilities testing life. Restoring from backups into a virtual
within an organization, • Reference baselines that can be environment can be a low cost alternative to
improve training for generated from the asset inventory being as close to real life as possible.
defensive practitioners • Produce reports on differences in assets
and inspect current after the penetration testing
performance levels. • Use log management to consolidate and
aggregate events during the pen testing
in order to simplify subsequent analysis.
Assess
Tackling these controls must be an ongoing program, not a one-time project. Assess
what you already have in place, prioritize controls you’d like to implement and evaluate
what you already have in place.
solutions against the business needs of your organization. Many cybersecurity
Prioritize
controls can be automated to reduce cost and improve operational efficiency. These
controls you’d like to improve
recommendations for implementing the CIS Controls outlined in this guide will help your
and/or implement based on your
organization better manage cyber risk for all the technologies in your ICS environment.
organization’s business drivers.
Industrial Defender has deep OT domain experience and a long history of supporting the
unique needs industrial companies from the control room to the boardroom, ensuring Evaluate
KPIs are being met every step of the way. solutions that can help you
manage it.
Schedule a demo with us below to see how we can help you build a solid foundation to
apply these controls effectively.
Since 2006, Industrial Defender has been solving the challenge of safely collecting, monitoring, and managing OT asset
data at scale, while providing cross-functional teams with a unified view of security. Their specialized solution is tailored to
complex industrial control system environments by engineers with decades of hands-on OT experience. Easy integrations
into the broader security and enterprise ecosystem empower IT teams with the same visibility, access, and situational
awareness that they’re accustomed to on corporate networks. They secure some of the largest critical control system
deployments with vendors such as GE, Honeywell, ABB, Siemens, Schneider Electric, Yokogawa and others to protect the
availability and safety of these systems, simplify standards and regulatory requirements, and unite OT and IT teams.