CIO Influence
CIO Influence News Networking Security

Center for Internet Security (CIS) Releases Community Defense Model v2.0 for Cybersecurity

Center for Internet Security (CIS) Releases Community Defense Model v2.0 for Cybersecurity
CIS Critical Security Controls are highly effective against the top five attack types found in industry threat data, effectively defending against 86% of the ATT&CK (sub-)techniques in the MITRE ATT&CK framework

Enterprises naturally want to know how effective the CIS Critical Security Controls (CIS Controls) – 18 top-level Controls containing 153 Safeguards that provide a prioritized path to improve an enterprise’s cybersecurity posture – are against the most prevalent cyber-attacks. The Center for Internet Security, Inc. (CIS®) answers that question and more through its Community Defense Model (CDM) v2.0, released today.

The model shows that the CIS Controls defend against approximately 86% of all ATT&CK (sub) techniques found in the MITRE ATT&CK framework. Furthermore, Implementation Group 1 (IG1) of the Controls, the definition of essential cyber hygiene (formerly basic cyber hygiene), provides enterprises a high level of protection, positioning them to defend against the top five attack types – malware, ransomware, web application hacking, insider privilege and misuse, and targeted intrusions.

Top Automation News: Puppet Launches Turnkey Policy-as-Code Compliance Enforcement Modules

Implementation Group 1 (IG1), the group that is least costly and difficult to implement, are the Safeguards that every enterprise should deploy. For enterprises that face more sophisticated attacks or that must protect more critical data or systems, these Safeguards also provide the foundation for the other two Implementation Groups (IG2 and IG3).

“This year’s CDM findings strongly reinforce the value of a relatively small number of well-chosen and essential defensive steps found in IG1,” said Curtis Dukes, CIS Executive Vice President and General Manager, Security Best Practices. “As such, enterprises should aim to start with IG1 to obtain the highest value and work up to IG2 and IG3, as appropriate.”

The findings in the CDM demonstrate the security value of the CIS Safeguards against the top five attack types:

  • Malware: 77% of Malware ATT&CK (sub-)techniques can be defended through implementation of IG1.
  • Ransomware: 78% of Ransomware ATT&CK (sub-)techniques are defended through implementation of IG1.

Top Data Storage News: PAC Storage Launches New U.2 NVMe All Flash Scale Out NAS

  • Web Application Hacking: 86% of Web Application Hacking ATT&CK (sub-)techniques are defended through implementing IG1 Safeguards.
  • Insider Privilege and Misuse: IG1 defends against 86% of the Insider Privilege and Misuse ATT&CK (sub-)techniques.
  • Targeted Intrusions: IG1 defends against 83% of Targeted Intrusions ATT&CK (sub-)techniques.

CDM v2.0 also discovered that establishing and maintaining a secure configuration process (CIS Safeguard 4.1) is a linchpin Safeguard for all five attack types. CIS Safeguard 4.1 is most effective in defending against the top five attack types, reinforcing the importance of secure configurations, such as those contained within the CIS Benchmarks.

“CDM v2.0 brings another level of rigor and detail to support the development of the CIS Controls, while leveraging industry threat data,” added Dukes. “Our results this year increased our confidence that our conclusions from the first CDM were correct.”

Top iTechnology Cloud News: RingCentral Forges First Ever Partnership in Mexico with MCM Telecom

Related posts

Firstlogic’s Workflow IQ SDK: Empowered Data Management

Cision PRWeb

Liferay Announces New Offering to Help Companies Accelerate Innovation in Digital Experiences

BetterCloud Granted Second Patent For Data Analysis, Real-time Policy Enforcement Across All SaaS Applications

CIO Influence News Desk

Leave a Comment