Essential Cybersecurity Controls
The following are the recommended Cybersecurity Technology Controls that organizations should implement at their environment. Implementing these controls will enhance the organization’s overall security posture.
1. Log Collection & and Monitoring:
- Control: Deploy a centralized Security Information and Event Management (SIEM) solution.
- Purpose: Collect, aggregate, and analyze logs from various systems, applications, and network devices. This ensures real-time monitoring, detection of suspicious activities, and compliance with regulatory requirements.
- Implementation Examples: Tools like Splunk, IBM Q-Radar, or Microsoft Sentinel. WAZUH is open-source tool but required some customization.
2. Endpoint Detection and Response (EDR):
- Control: Deploy Endpoint Detection and Response (EDR) solutions.
- Purpose: Provide visibility into endpoint activities and respond to endpoint threats such as malware and ransomware.
- Implementation Examples: CrowdStrike, Carbon Black, Microsoft Defender for Endpoint. Zoho Endpoint Central,
3. Intrusion Detection and Prevention Systems (IDPS) at Perimeter level:
- Control: Implement Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS).
- Purpose: Continuously monitor network traffic for signs of malicious activity or policy violations and actively block suspicious traffic.
- Implementation Examples: Snort, Palo Alto Networks, Cisco Firepower, or Fortinet. The firewall should be with appropriate subscriptions covering NextGen Firewall security controls including IPS & IDS.
4. Firewall and Network Security Controls:
- Control: Use advanced Next-Generation Firewalls (NGFWs) and Web Application Firewalls (WAFs).
- Purpose: Ensure network security by inspecting incoming and outgoing traffic, blocking unauthorized access, and protecting applications from web-based attacks.
- Implementation Examples: Palo Alto, Fortinet, or Cloudflare WAF.
5. Vulnerability Management and Patch Management:
- Control: Implement a vulnerability scanning and patch management system. Recommended to have Unified Endpoint Management solution.
- Purpose: Regularly identify and remediate vulnerabilities in software, applications, and infrastructure.
- Implementation Examples: Qualys, Tenable Nessus, or Microsoft Endpoint Manager for patch management, Zoho Endpoint Manager, VM Ware Workspace One.
6. Data Loss Prevention (DLP):
- Control: Install a Data Loss Prevention (DLP) solution.
- Purpose: Monitor and protect sensitive data from unauthorized access, leakage, or exfiltration.
- Implementation Examples: Symantec DLP, Microsoft DLP, or Forcepoint DLP.
7. Encryption and Secure Data Handling:
- Control: Enforce data encryption at rest and in transit.
- Purpose: Protect sensitive data from being intercepted or accessed during storage and transmission.
- Implementation Examples: Use TLS for data in transit, and encryption solutions like BitLocker, AWS KMS, or Azure Key Vault for data at rest.
8. Multi-Factor Authentication (MFA):
- Control: Implement multi-factor authentication (MFA) across all critical systems and applications.
- Purpose: Ensure that access to sensitive systems requires multiple forms of verification beyond just passwords.
- Implementation Examples: Duo Security, Google Authenticator, or Microsoft Azure MFA.
9. Incident Response and Forensics Tools:
- Control: Establish a cyber incident response plan and deploy forensics tools.
- Purpose: Ensure that there are predefined processes and tools to investigate, contain, and remediate security incidents quickly.
- Implementation Examples: X-Ways Forensics, EnCase, or any in-house developed incident response playbooks.
10. Access Control and Privileged Access Management (PAM):
- Control: Implement role-based access control (RBAC) and Privileged Access Management (PAM).
- Purpose: Restrict access to systems based on user roles, enforce least privilege, and manage/administer high-level accounts.
- Implementation Examples: CyberArk, BeyondTrust, or Thycotic.
11. Security Awareness Training:
- Control: Provide ongoing security awareness training for all employees.
- Purpose: Educate staff on phishing, social engineering, and secure online practices to reduce human risk factors.
- Implementation Examples: KnowBe4, Proofpoint Security Awareness, or in-house training platforms.
12. Threat Intelligence:
- Control: Utilize threat intelligence platforms to stay updated on emerging threats and vulnerabilities.
- Purpose: Incorporate global threat feeds to improve the detection and defense against advanced cyber threats.
- Implementation Examples: Recorded Future, ThreatConnect, or IBM X-Force Exchange.
13. Backup and Disaster Recovery:
- Control: Implement a robust backup solution with a clear disaster recovery plan.
- Purpose: Ensure that critical data and systems can be restored in the event of a cyber-attack (e.g., ransomware) or natural disaster.
- Implementation Examples: Veeam, Acronis, or AWS Backup.
14. Network Segmentation:
- Control: Use network segmentation to isolate sensitive systems and services from less critical parts of the network.
- Purpose: Limit the impact of a breach by controlling lateral movement across the network.
- Implementation Examples: VLANs, micro-segmentation via software-defined networking (SDN).
15. Secure Configuration Management:
- Control: Enforce secure configuration baselines for all devices, systems, and applications.
- Purpose: Reduce the attack surface by ensuring that all systems are hardened according to security best practices.
- Implementation Examples: CIS Benchmarks, automated tools like Chef, Puppet, or Ansible.