Amid much anticipation and press, a conglomerate of US agencies (incl. NSA, US-CERT, DoD) and the SANS Institute have released the
Consensus Audit Guidelines (CAG). John Gilligan, CAG project leader and former CIO for both the USAF and DOE, said:
We are in a war, a cyber war, and the federal government is one of many large organizations that are being targeted...
Our ability, at present, to be able to detect and defend against these attacks is really quite weak in many cases.
The CAG is comprised of 20 controls, with 1-15 being automatable.
- Inventory of Authorized and Unauthorized Hardware
- Inventory of Authorized and Unauthorized Software
- Secure Configurations for Hardware and Software For Which Such Configurations Are Available
- Secure Configurations of Network Devices Such as Firewalls And Routers
- Boundary Defense
- Maintenance and Analysis of Complete Security Audit Logs
- Application Software Security
- Controlled Use of Administrative Privileges
- Controlled Access Based On Need to Know
- Continuous Vulnerability Testing and Remediation
- Dormant Account Monitoring and Control
- Anti-Malware Defenses
- Limitation and Control of Ports, Protocols, and Services
- Wireless Device Control
- Data Leakage Protection
- Secure Network Engineering
- Red Team Exercises
- Incident Response Capability
- Assured Data Backups
- Security Skills Assessment and Training to Fill Gaps
Src: Defense agencies list top 20 security controls | CNET News
No comments:
Post a Comment