SANS 20 Security Controls
What They Are & How Businesses Should Follow Them
Name
*
Email
*
Phone
-
Back
Next
Previous
Next
CIS Control 1: Inventory and Control of Hardware Assets
Does your company perform quarterly inventory checks?
Yes
No
Partial
Do your company provide ”work from home” systems?
Yes
No
Partial
Do you have a policy for employees to use their own devices?
Yes
No
Partial
Calculation
Actively manage (inventory, track, and correct) all hardware devices on the network so that only authorized devices are given access, and unauthorized and unmanaged devices are found and prevented from gaining access.
Previous
Next
CIS Control 2: Inventory and Control of Software Assets
Do you have an inventory of all your software?
Yes
No
Partially
Do you manage your software subscription usage and renewals?
Yes
No
Partial
Are your employees allowed to install software onto their work computers?
Yes
No
Sometimes
Calculation
Actively manage (inventory, track, and correct) all software on the network so that only authorized software is installed and can execute, and that all unauthorized and unmanaged software is found and prevented from installation or execution.
Previous
Next
CIS Control 3: Continuous Vulnerability Management
Do you know what Continuous Vulnerability Management is?
Yes
No
Partially
Is your company required to be Payment Card Industry (PCI) Compliant?
Yes
No
Sometimes
Do you have plans to perform a Network Penetration Test?
Yes
No
Calculation
Continuously acquire, assess, and take action on new information in order to identify vulnerabilities, remediate, and minimize the window of opportunity for attackers.
Previous
Next
CIS Control 4: Controlled Use of Administrative Privileges
Do you grant administrative privileges only to users who require them?
Yes
No
Unsure
Do you restrict users access to only what they need?
Yes
No
Unsure
Do you allow users to have local administrator rights?
Yes
No
Do you have a password complexity and age policy?
Yes
No
Sometimes
Calculation
The processes and tools used to track/control/prevent/correct the use, assignment, and configuration of administrative privileges on computers, networks, and applications.
Previous
Next
CIS Control 5: Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers
Does your company have a secure configuration policy for computers, servers, and mobile devices?
Yes
No
Do you use actively manage configurations and operating system updates?
Yes
No
Sometimes
Calculation
Establish, implement, and actively manage (track, report on, correct) the security configuration of mobile devices, laptops, servers, and workstations using a rigorous configuration management and change control process in order to prevent attackers from exploiting vulnerable services and settings.
Previous
Next
CIS Control 6: Maintenance, Monitoring and Analysis of Audit Logs
Does your company enable login auditing and review failed login attempts?
Yes
No
Sometimes
Does your company use centralized log servers?
Yes
No
Partially
Would you have an audit log in case of a network hack?
Yes
No
Partially
Calculation
Collect, manage, and analyze audit logs of events that could help detect, understand, or recover from an attack.
Previous
Next
Previous
Next
CIS Control 7: Email and Web Browser Protections
Does your company use email, spam, and virus filters?
Yes
No
If a user clicks on a malicious link will your firewall block them?
Yes
No
Unsure
Calculation
Minimize the attack surface and the opportunities for attackers to manipulate human behavior through their interaction with web browsers and email systems.
Previous
Next
CIS Control 8: Malware Defenses
Do you run up-to-date antivirus software on all your devices and is real-time scanning enabled?
Yes
No
Unsure
Will you receive an alert if one of your systems becomes infected?
Yes
No
Unsure
Calculation
Control the installation, spread, and execution of malicious code at multiple points in the enterprise, while optimizing the use of automation to enable rapid updating of defense, data gathering, and corrective action.
Previous
Next
CIS Control 9: Limitation and Control of Network Ports, Protocols, and Services
Do you use a layer 3 Firewall to restrict network ports?
Yes
No
Unsure
Do you deny remote desktop port 3389?
Yes
No
Unsure
Do you have policies to open or restrict ports on your firewall?
Yes
No
Unsure
Calculation
Manage (track/control/correct) the ongoing operational use of ports, protocols, and services on networked devices in order to minimize windows of vulnerability available to attackers.
Previous
Next
CIS Control 10: Data Recovery Capabilities
Does your company utilize +3 separate backup strategies?
Yes
No
Unsure
Do you have a business continuity plan?
Yes
No
Unsure
Would you know how to restore from backup?
Yes
No
Unsure
Calculation
The process and tools used to properly back up critical information with a proven methodology for timely recovery of it.
Previous
Next
CIS Control 11: Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches
Does your company actively monitor and manage the security configurations of your network infrastructure?
Yes
No
Unsure
Does your company have a secure configuration policy for Firewalls, routers, and switches?
Yes
No
Unsure
Does your company have a policy to upgrade network equipment firmware?
Yes
No
Unsure
Calculation
Established, implement, and actively manage (track, report on, correct) the security configuration of network infrastructure devices using a rigorous configuration management and change control process in order to prevent attackers from exploiting vulnerable services and settings.
Previous
Next
CIS Control 12: Boundary Defense
Are you segmenting your network into different security zones?
Yes
No
Unsure
Do you have a policy for protecting data from exiting employees?
Yes
No
Unsure
Do you have a way to protect what data is leaving your company?
Yes
No
Unsure
Calculation
Detect/prevent/correct the flow of information transferring across networks of different trust levels with a focus on security-damaging data.
Previous
Next
CIS Control 13: Data Protection
Does your company employ the use of tools and processes that mitigate the effects of data that employees might take with them?
Yes
No
Unsure
Calculation
The processes and tools used to prevent data exfiltration, mitigate the effects of exfiltrated data, and ensure the privacy and integrity of sensitive information.
Previous
Next
CIS Control 14: Controlled Access Based on the Need to Know
Does your company limit access based on need to know?
Yes
No
Partially
Calculation
The processes and tools used to track/control/prevent/correct secure access to critical assets (e.g., information, resources, systems) according to the formal determination of which persons, computers, and applications have a need and right to access these critical assets based on an approved classification.
Previous
Next
CIS Control 15: Wireless Access Control
Does your company restrict access from wireless networks?
Yes
No
Unsure
Does your company use Access Control List (ACL) for wireless networks?
Yes
No
Unsure
Do you have a policy for routine WIFI password changes?
Yes
No
Unsure
Does your company use multiple separate wireless networks?
Yes
No
Calculation
The processes and tools used to track/control/prevent/correct the secure use of wireless local area networks (WLANs), access points, and wireless client systems.
Previous
Next
CIS Control 16: Account Monitoring and Control
Does your company regularly review user accounts?
Yes
No
Unsure
Does your company have a policy to disable and ultimately delete unused user accounts?
Yes
No
Unsure
Calculation
Actively manage the life cycle of system and application accounts – their creation, use, dormancy, deletion – in order to minimize opportunities for attackers to leverage them.
Previous
Next
Previous
Next
CIS Control 17: Implement a Security Awareness and Training Program
Does your company have a security awareness training programs?
Yes
No
Does your company have procedures to warn users on new vulnerabilities?
Yes
No
Calculation
For all functional roles in the organization (prioritizing those mission-critical to the business and its security), identify the specific knowledge, skills, and abilities needed to support defense of the enterprise; develop and execute an integrated plan to assess, identify gaps, and remediate through policy, organizational planning, training, and awareness programs.
Previous
Next
CIS Control 18: Application Software Security
Does your company keep its in-house applications up-to-date?
Yes
No
Does your company manage a security lifecycle of the software you develop?
Yes
No
Calculation
Manage the security life cycle of all in-house developed and acquired software in order to prevent, detect, and correct security weaknesses.
Previous
Next
CIS Control 19: Incident Response and Management
Does your company use incidents response techniques?
Yes
No
Partially
After an incident, does your company review the what happened?
Yes
No
Partially
After an incident, does your company correct the cause of the problem?
Yes
No
Partially
Calculation
Protect the organization’s information, as well as its reputation, by developing and implementing an incident response infrastructure (e.g., plans, defined roles, training, communications, management oversight) for quickly discovering an attack and then effectively containing the damage, eradicating the attacker’s presence, and restoring the integrity of the network and systems.
Previous
Next
CIS Control 20: Penetration Tests and Red Team Exercises
Does your company schedule yearly penetration tests?
Yes
No
Partially
Calculation
Test the overall strength of an organization’s defense (the technology, the processes, and the people) by simulating the objectives and actions of an attacker.
Previous
Next
Thank you!
Your Score (Out of 100 Points):
*
SUBMIT
Should be Empty: