<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-6569213714636569218</id><updated>2026-03-01T22:00:37.244-05:00</updated><category term="CIS Controls"/><category term="Center for Internet Security"/><category term="CIS"/><category term="Information Security"/><category term="Cybersecurity"/><category term="Email"/><category term="Access Control"/><category term="Audit"/><category term="CISSP"/><category term="Certifications"/><category term="Coronavirus"/><category term="Cyber Criminals"/><category term="Data Security"/><category term="Emergency Fund"/><category term="Encryption"/><category term="Hackers"/><category term="Information Technology"/><category term="Outlook"/><category term="Penn State"/><category term="Ransomware"/><category term="Signed Email"/><category term="Smartcard"/><category term="Account Management"/><category term="Account Reviews"/><category term="Active Directory"/><category term="Alerting"/><category term="Animal Sounds"/><category term="Anti-malware"/><category term="Anti-virus"/><category term="Application Development"/><category term="Asset Allocation"/><category term="Asset Inventory"/><category term="Browser"/><category term="CIS Benchmarks"/><category term="CISA"/><category term="Calendar"/><category term="Career"/><category term="Credit Cards"/><category term="DAST"/><category term="DNS Filtering"/><category term="Data Backup"/><category term="Data Loss Protection"/><category term="Data Recovery"/><category term="Dave Ramsey"/><category term="Debit Cards"/><category term="EDR"/><category term="Elm Trees"/><category term="Encrypted Email"/><category term="Facebook"/><category term="Fall Foliage"/><category term="Finances"/><category term="Financial Fraud"/><category term="Financial Goals"/><category term="Google"/><category term="How To"/><category term="IT"/><category term="Incident Response"/><category term="InfoSec"/><category term="Insider Threat"/><category term="Investor Policy Statement"/><category term="Logging"/><category term="Logs"/><category term="Lotus Notes"/><category term="MFA"/><category term="Malware"/><category term="Malware Prevention"/><category term="Mel Torres"/><category term="Network Architecture"/><category term="Network Monitoring"/><category term="OSSEC"/><category term="OWASP"/><category term="Old Botany Building"/><category term="Passwords"/><category term="Pattee Library"/><category term="Pattee Mall"/><category term="Pen Testing"/><category term="Phishing"/><category term="PowerShell"/><category term="SAST"/><category term="SIEM"/><category term="STIG"/><category term="Salary"/><category term="Security Awareness"/><category term="Security Tools"/><category term="Separate Accounts"/><category term="Service Provider Management"/><category term="Software Inventory"/><category term="TV"/><category term="The Elms"/><category term="Training"/><category term="Travel Points"/><category term="Video"/><category term="Virus"/><category term="Vulnerability Management"/><category term="WAF"/><category term="YouTube"/><title type='text'>Notes from the Field of Information Security</title><subtitle type='html'>by Greg Halpin</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://www.greghalpin.net/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://www.greghalpin.net/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Greg Halpin</name><uri>http://www.blogger.com/profile/17719118542703009589</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3-t4qOKvt4VAXacR2IW5Cxa1LkMpWAiHeVhAwVAvu78I7MyzoHJkjLlFOITeM-okQwWq9iCwZL8aqvw-95-UaJrfotaoBgl6QmHYFHA1oxn5yQy31sp12ZGTZqWASjA/s220/IMG_4976+copy.png'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>32</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-6569213714636569218.post-1669922529247116710</id><published>2024-03-02T15:15:00.002-05:00</published><updated>2024-03-02T15:16:43.869-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CIS"/><category scheme="http://www.blogger.com/atom/ns#" term="CIS Controls"/><category scheme="http://www.blogger.com/atom/ns#" term="OWASP"/><category scheme="http://www.blogger.com/atom/ns#" term="Pen Testing"/><title type='text'>Notes from the Field - CIS Control 18 - Penetration Testing</title><content type='html'>&lt;p&gt;&lt;span style=&quot;white-space-collapse: preserve;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;While working with clients I will review their latest penetration test report. Penetration tests are a great way to obtain independent and unfiltered information about your organization’s vulnerabilities The tests are usually performed by an outside information security firm, giving you an outsider’s view of what’s going on at your company. That view is valuable as outsiders provide another perspective.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span id=&quot;docs-internal-guid-0b54acbc-7fff-1c9f-4771-f444d9220643&quot;&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The first thing I look to see is if it’s a real pen test or a typical vulnerability scan. Unfortunately, &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisfTNm9O8hijiTYCdN8o4wmNV3xp0MTcoMVK6r29kddRir0Gddb3Oy8fUXQWM2pbUP6iSf17WH4kJIdd6VNCo2zn8YMVYksxHfVMfX4jHWxiKUj6Ca3_sa-5CNF6rla8LeQFgte7i-UUrAwanVa_EvshVXbt89KP7vh_YHt58F-di9iIK9TvrNBW5g7zGw/s4032/IMG_4762.jpg&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;3024&quot; data-original-width=&quot;4032&quot; height=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisfTNm9O8hijiTYCdN8o4wmNV3xp0MTcoMVK6r29kddRir0Gddb3Oy8fUXQWM2pbUP6iSf17WH4kJIdd6VNCo2zn8YMVYksxHfVMfX4jHWxiKUj6Ca3_sa-5CNF6rla8LeQFgte7i-UUrAwanVa_EvshVXbt89KP7vh_YHt58F-di9iIK9TvrNBW5g7zGw/w400-h300/IMG_4762.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;i&gt;Circles in the Sand at Bandon Beach, Oregon&lt;/i&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;span style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;clients often pay for a pen test and receive a vulnerability scan report that they could have produced themselves without having paid tens of thousands of dollars.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;div&gt;&lt;span&gt;&lt;span style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span&gt;&lt;span style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;A true pen test report will include the scope of the test. The report lists the tools and procedures performed. The pen testers will attempt manual exploitations of vulnerabilities that were identified by scans. Tests should also include phishing and spear-phishing attempts, other social engineering, and physical penetration attempts. Unlike vulnerability scans, which may only take a few hours, pen tests may take several days or weeks, depending on the size and complexity of the organization.&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;In this post I discuss Center for Internet Security Control 18 - Penetration Testing. This is the 18th and final post in a series on the &lt;/span&gt;&lt;a href=&quot;https://www.cisecurity.org/controls&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;span style=&quot;color: #1155cc; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Center for Internet Security Controls&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;. The document consists of 18 critical information security controls that all organizations and information security professionals should be familiar with and implement to protect their networks and data. The document contains high level information that executives can understand and also has specific details about tools and procedures for technical staff to run with. I recommend it to all my clients for information security guidance.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; font-weight: 700; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;The Overview for Control 18 - Penetration Testing is -&lt;/span&gt;&lt;span style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;font-style: italic; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Test the effectiveness and resiliency of enterprise assets through identifying and exploiting weaknesses in controls (people, processes, and technology), and simulating the objectives and actions of an attacker&lt;/span&gt;&lt;span style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; font-weight: 700; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Why is this Control Critical?&lt;/span&gt;&lt;span style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt; No company is completely secure, even organizations with mature information security policies, tools, procedures, and well trained staff. Existing technologies continuously change. New technologies are released daily. Systems are very complex. New vulnerabilities are discovered every day. Attackers leverage these factors to bypass your company&#39;s security controls and trick your employees into giving up their credentials.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;It is imperative that your organization periodically undergo penetration tests by qualified independent internal or external parties. Pen tests can identify gaps in your company’s security tools, configurations or staff training. Use the identified gaps to make adjustments to your environment and provide the additional training needed to improve your organization’s security posture.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; font-weight: 700; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;CIS Control 18 has 5 safeguards&lt;/span&gt;&lt;span style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt; in support of incident response. They are:&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; font-weight: 700; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;18.1 Establish and Maintain a Penetration Testing Program -&lt;/span&gt;&lt;span style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt; this one is pretty clear in which your organization creates its pen test program, defining the scope of testing. That can include specific networks, web applications, APIs, hosted services, social engineering, physical security.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; font-weight: 700; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;18.2 Perform Periodic External Penetration Tests - &lt;/span&gt;&lt;span style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;perform external pen tests at least annually. I recommend pen tests at least twice a year. People often say their environments are static and pen tests more than once a year are unnecessary. But are the environments truly static? Organizations install security updates monthly and deploy application code updates frequently. They also change configurations, sometimes inadvertently. Pen tests will help identify vulnerabilities not detected by regular vulnerability scans.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; font-weight: 700; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;18.3 Remediate Penetration Test Findings - &lt;/span&gt;&lt;span style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;this one is also pretty clear. Remediate the findings by updating vulnerable code, installing security patches, correcting configuration issues, better physical security controls, and providing better training for individuals who fell for social engineering efforts. Prioritize remediation according to the severity of the findings. For small environments, there may be a handful of findings that can be resolved quickly. For large environments with many applications and hundreds or thousands of systems, remediation is more involved and time consuming.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; font-weight: 700; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;18.4 Validate Security Measures - &lt;/span&gt;&lt;span style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;this involves tasks such as reviewing security controls and tools, WAF rules, and firewall rules. Determine if rules need to be more rigorous or additional tools added to protect your organization.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; font-weight: 700; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;18.5 Perform Periodic Internal Penetration Tests - &lt;/span&gt;&lt;span style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Similar to the frequency with performing external pen tests, do the same with internal pen tests. Again, you may likely meet your security framework requirements by performing internal pen tests annually. But you want to do them at least twice a year to identify code issues, vulnerabilities, and misconfigurations.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The CIS Control document states that internal and external pen tests should be performed by a qualified party. What is a qualified party? Do pen tests need to be performed by an external security firm? Pen tests do not need to be done by an external company. But the tests should be performed by an organizationally independent team.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Larger organizations often have internal security internal departments with pen test teams that are independent of the departments they test. Smaller organizations may need to engage a security firm to perform the testing. In any event, the person or team performing the testing should not be the same individual or team responsible for managing the systems. The pen test reports need to be delivered to the senior manager as well as the team that manages the systems as well as to the team. It’s important for senior management to be aware of the risks to the organization identified in the report and provide appropriate oversight. I’ve seen cases where the pen tests are only delivered to the individuals that manage the systems. Management is not information about the threats the company faces.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;The CIS Controls document lists as a resource the The PCI Security Standards Council. It discusses pen test methodology, scope, reports, case studies, and discusses the qualifications for pen testers in its &lt;/span&gt;&lt;a href=&quot;https://docs-prv.pcisecuritystandards.org/Guidance%20Document/Penetration%20Testing/Penetration-Testing-Guidance-v1_1.pdf&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;span style=&quot;color: #1155cc; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Penetration Test Guidance&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt; publications. The document also lists as an additional resource &lt;/span&gt;&lt;a href=&quot;https://www.isecom.org/OSSTMM.3.pdf&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;span style=&quot;color: #1155cc; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;OSSTMM 3 - the Open Source Security Testing Methodology Manua&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;l.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Penetration testing, combined with the other CIS Controls will help your organization better protect your company and customer data.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.greghalpin.net/feeds/1669922529247116710/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.greghalpin.net/2024/03/notes-from-field-cis-control-18.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/1669922529247116710'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/1669922529247116710'/><link rel='alternate' type='text/html' href='http://www.greghalpin.net/2024/03/notes-from-field-cis-control-18.html' title='Notes from the Field - CIS Control 18 - Penetration Testing'/><author><name>Greg Halpin</name><uri>http://www.blogger.com/profile/17719118542703009589</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3-t4qOKvt4VAXacR2IW5Cxa1LkMpWAiHeVhAwVAvu78I7MyzoHJkjLlFOITeM-okQwWq9iCwZL8aqvw-95-UaJrfotaoBgl6QmHYFHA1oxn5yQy31sp12ZGTZqWASjA/s220/IMG_4976+copy.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisfTNm9O8hijiTYCdN8o4wmNV3xp0MTcoMVK6r29kddRir0Gddb3Oy8fUXQWM2pbUP6iSf17WH4kJIdd6VNCo2zn8YMVYksxHfVMfX4jHWxiKUj6Ca3_sa-5CNF6rla8LeQFgte7i-UUrAwanVa_EvshVXbt89KP7vh_YHt58F-di9iIK9TvrNBW5g7zGw/s72-w400-h300-c/IMG_4762.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6569213714636569218.post-3860099409733755893</id><published>2024-01-14T16:48:00.006-05:00</published><updated>2024-01-28T16:28:34.491-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CIS"/><category scheme="http://www.blogger.com/atom/ns#" term="CIS Controls"/><category scheme="http://www.blogger.com/atom/ns#" term="Incident Response"/><title type='text'> Notes from the Field - CIS Control 17 - Incident Response Management</title><content type='html'>&lt;p&gt;&lt;span style=&quot;font-family: arial; white-space-collapse: preserve;&quot;&gt;The client I was working with had a SaaS application hosted in AWS. When we discussed how they would respond if their data were compromised, they said that wasn’t a serious concern as the data the company collected was of little value. Nobody would want it. It didn’t have personally identifiable information (PII), such as social security numbers, license numbers or medical information. When I raised the prospect of a ransomware attack and the damage it could do to their operations and reputation, they began to realize the potential consequences of their lack of preparation. Most companies understand that they could be the target of an attack. Some don’t. But all need incident response processes in place for when an incident occurs.&lt;/span&gt;&lt;/p&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhtB6q1ioZgKkmczKotZ75YHtYMRTbMij4PZjvOnhMFoanlM3X6julJZvp1XtH6RYuKw1vhZ_PEuq9ZATJcUwJgX_OGP2-vzy4oJ8XdpJN46qGD8jYaa4c3Rq4Nw3k7RTjSnCzz_nCGrFxx2of5E9t_-EGCxMixG0kOPvmoV9x9vDp3fQy6v_JtYkdhs0A/s4032/IMG_6464.jpg&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;3024&quot; data-original-width=&quot;4032&quot; height=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhtB6q1ioZgKkmczKotZ75YHtYMRTbMij4PZjvOnhMFoanlM3X6julJZvp1XtH6RYuKw1vhZ_PEuq9ZATJcUwJgX_OGP2-vzy4oJ8XdpJN46qGD8jYaa4c3Rq4Nw3k7RTjSnCzz_nCGrFxx2of5E9t_-EGCxMixG0kOPvmoV9x9vDp3fQy6v_JtYkdhs0A/w400-h300/IMG_6464.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;i&gt;Castillo San Felipe del Morro, San Juan, Puerto Rico&lt;/i&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;In this post I discuss the Center for Internet Security Control 17 - Incident Response Management. The &lt;/span&gt;&lt;a href=&quot;https://www.cisecurity.org/controls&quot; style=&quot;font-family: arial; text-decoration-line: none;&quot;&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;color: #1155cc; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Center for Internet Security Controls&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: arial; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt; are 18 critical information security controls that all organizations and information security professionals should be familiar with and implement to protect their networks and data. The document contains high level information that executives can understand and also has specific details about tools and procedures for technical staff to run with. I recommend it to all my clients for information security guidance.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;span id=&quot;docs-internal-guid-634ec128-7fff-cd6f-d6ed-d905ed94a119&quot; style=&quot;font-family: arial;&quot;&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; font-weight: 700; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;The Overview for Control 17 is &lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;- &lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-style: italic; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Establish a program to develop and maintain an incident response capability (e.g., policies, plans, procedures, defined roles, training, and communications) to prepare, detect, and quickly respond to an attack&lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;.&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; font-weight: 700; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Why is this Control Critical?&lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt; Companies often don&#39;t have incident response and recovery capabilities even when they have detection and prevention controls in place. If such a company does have a compromise or other incident, they may not have people with the appropriate skills and experience to contain the incident and keep it from spreading. Without a full understanding of such attacks, incident responders will be in a perpetual state of being a step behind attackers. Even with a good plan and people, it&#39;s important that that regular training be provided to staff that will respond to incidents.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;&lt;b&gt;Control 17 has 9 safeguards in support of incident response&lt;/b&gt;. They are:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;span id=&quot;docs-internal-guid-634ec128-7fff-cd6f-d6ed-d905ed94a119&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;17.1 Designate Personnel to Manage Incident Handling&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;span&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;white-space-collapse: preserve;&quot;&gt;17.2 Establish and Maintain Contact Information for Reporting&amp;nbsp;&lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;white-space-collapse: preserve;&quot;&gt;Security Incidents&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;/span&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;span&gt;&lt;p style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;17.3 Establish and Maintain an Enterprise Process for Reporting Incidents&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;span&gt;&lt;div style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;17.4 Establish and Maintain an Incident Response Process&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;17.5 Assign Key Role and Responsibilities&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;span&gt;&lt;p style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;17.6 Define Mechanisms for Communicating During Incident Response&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;span&gt;&lt;p style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;17.7 Conduct Routine Incident Response Exercises&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;span&gt;&lt;p style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;17.8 Conduct Post-Incident Reviews&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;span&gt;&lt;p style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;17.9 Establish and Maintain Security Incident Thresholds&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Let&#39;s take a look at a few of these starting with &lt;b&gt;17.1 Designate Personnel to Manage Incident Handling&lt;/b&gt;. Smaller and mid-size companies I&#39;ve worked with often don&#39;t have a dedicated Security Operations Center (SOC). Incident response falls to the DevOps or IT teams. But the roles are not formally assigned. The individuals who must respond often don&#39;t know they are responsible until there is an incident. Their regular duties don&#39;t include responding to incidents. When one happens they are unprepared to take appropriate action.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;&lt;b&gt;17.4 Establish and Maintain an Incident Response Process and 17.5 Assign Key Roles and Responsibilities -&lt;/b&gt; you can combine these two safeguards and potentially the first five safeguards. This is where you document an incident response policy and process. You identify the specific roles and responsibilities for responding to incidents. Establish processes for how individuals will report incidents and the activities to respond.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;&lt;b&gt;17.7 Conduct Routine Incident Response Exercises&lt;/b&gt; is key for all companies, particularly those without a SOC or other personnel who routinely respond to incidents. It&#39;s important for teams to engage in monthly or quarterly training to run through attack scenarios and how they would respond. Each team member would become more and more familiar with their role in incident response processes and what action to take. While not a replacement for actual experience, the individuals involved will understand what to do rather than try to figure it out during an actual incident.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;&lt;b&gt;17.8 Conduct Post-Incident Reviews&lt;/b&gt; is where teams use lessons learned from an incident to determine how to improve their response procedures in advance of the next incident. What could they have done differently or would the response have been better if the tasks were performed in a different order? Did any steps slow down the response process? What controls can they put in place now to prevent or mitigate this same type of attack from occurring in the future?&amp;nbsp; What tools do they need to better respond? Agree among the team on next steps going forward, such as updating the incident response checklist or playbook.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;CIS Control 17 is a good way to get started with incident response management. In the next post, I will cover the final control, Center for Internet Security Control 18 - Penetration Testing.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.greghalpin.net/feeds/3860099409733755893/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.greghalpin.net/2024/01/notes-from-field-cis-control-17.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/3860099409733755893'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/3860099409733755893'/><link rel='alternate' type='text/html' href='http://www.greghalpin.net/2024/01/notes-from-field-cis-control-17.html' title=' Notes from the Field - CIS Control 17 - Incident Response Management'/><author><name>Greg Halpin</name><uri>http://www.blogger.com/profile/17719118542703009589</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3-t4qOKvt4VAXacR2IW5Cxa1LkMpWAiHeVhAwVAvu78I7MyzoHJkjLlFOITeM-okQwWq9iCwZL8aqvw-95-UaJrfotaoBgl6QmHYFHA1oxn5yQy31sp12ZGTZqWASjA/s220/IMG_4976+copy.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhtB6q1ioZgKkmczKotZ75YHtYMRTbMij4PZjvOnhMFoanlM3X6julJZvp1XtH6RYuKw1vhZ_PEuq9ZATJcUwJgX_OGP2-vzy4oJ8XdpJN46qGD8jYaa4c3Rq4Nw3k7RTjSnCzz_nCGrFxx2of5E9t_-EGCxMixG0kOPvmoV9x9vDp3fQy6v_JtYkdhs0A/s72-w400-h300-c/IMG_6464.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6569213714636569218.post-8059178117900974487</id><published>2023-12-03T13:01:00.002-05:00</published><updated>2026-03-01T22:00:37.046-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Application Development"/><category scheme="http://www.blogger.com/atom/ns#" term="CIS Controls"/><category scheme="http://www.blogger.com/atom/ns#" term="DAST"/><category scheme="http://www.blogger.com/atom/ns#" term="SAST"/><title type='text'>Notes from the Field - CIS Control 16 - Application Software Security</title><content type='html'>&lt;span style=&quot;font-family: arial;&quot;&gt;Working recently with a small Software as a Services (SaaS) company, it quickly became clear they didn&#39;t have much in place by way of security. They didn&#39;t have a documented policy. They didn&#39;t do code reviews. New code releases were deployed on the fly. They didn&#39;t do secure scans of code or the web application. They didn&#39;t have a WAF. The application database was hosted on the same server as the application server. There were a handful of developers who had many years of experience. They were supposedly knowledgeable in software development best practices and didn&#39;t need what they considered rigid and unnecessary security controls.&lt;br /&gt;&lt;br /&gt;That&#39;s when I discussed some basics around application security from CIS Control 16. The &lt;a href=&quot;https://www.cisecurity.org/controls&quot;&gt;Center for Internet Security Controls&lt;/a&gt; are 18 critical information security controls that all organizations and information security professionals should be familiar with and implement to protect their networks and data. The document contains high level information that executives can understand and also has specific details about tools and procedures that technical staff to run with. I recommend it to all my clients for information security guidance.&amp;nbsp;&lt;br /&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right; margin-left: 1em; text-align: right;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4G4Mm1P31VTUCAmfmyK2-7IFRubFzTqvg_h5AolWqycXAQ-GwesxBBaxMHgGYkjsAxud6x5778X0AwHRRZCgCWxtiCA4_Yrh0fraqw9qFcFMLDO9dHRAOeICAe2RPzj9u9aFpqUdpR5XYpPiaymSOAVq97CCV0dv5BNMZPrGfdJ73_duvySAg-Rz5VYYb/s4032/IMG_8424.jpg&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;3024&quot; data-original-width=&quot;4032&quot; height=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4G4Mm1P31VTUCAmfmyK2-7IFRubFzTqvg_h5AolWqycXAQ-GwesxBBaxMHgGYkjsAxud6x5778X0AwHRRZCgCWxtiCA4_Yrh0fraqw9qFcFMLDO9dHRAOeICAe2RPzj9u9aFpqUdpR5XYpPiaymSOAVq97CCV0dv5BNMZPrGfdJ73_duvySAg-Rz5VYYb/w400-h300/IMG_8424.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;i&gt;Warning Sign at Colyer Lake in Central PA&lt;/i&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/span&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;The Overview for Control 16 -&amp;nbsp;Application Software Security is&lt;/b&gt; -&lt;i&gt;&amp;nbsp;Manage the security life cycle of in-house developed, hosted, or acquired software to prevent, detect, and remediate security weaknesses before they can impact the enterprise.&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;Why is this control critical? &lt;/b&gt;Attackers can use a company&#39;s own public-facing applications to bypass network security tools to compromise company and customer data. Attackers can also use applications to steal user credentials and install malware on user systems. Today&#39;s applications are complex and are designed to be accessible from many different platforms - web browsers, mobiles apps, API calls. Development cycles are much more frequent than they used to be, as much as multiple times per day or week compared to a release once or twice a year. Additionally, developers use many open-source libraries that need to be updated. These elements make application security very challenging. That makes it imperative to implement and maintain proper security controls in support of in-house developed and off-the-shelf applications.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;Control 16 includes 14 sub-controls or safeguards. They are:&lt;/span&gt;&lt;/div&gt;&lt;blockquote style=&quot;border: medium; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;16.1  Establish and Maintain a Secure Application Development Process&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;16.2 Establish and Maintain a Process to Accept and Address Software Vulnerabilities&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;16.3 Perform Root Cause Analysis on Security Vulnerabilities Applications&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;16.4 Establish and Manage an Inventory of Third-Party Software Components&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;16.5 Use Up-to-Date and Trusted Third-Party Software Components&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;16.6 Establish and Maintain a Severity Rating System and Process for Application Vulnerabilities&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;16.7 Use Standard Hardening Configuration Templates for Application Infrastructure&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;16.8 Separate Production and Non-Production Systems&lt;br /&gt; &lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;16.9 Train Developers in Application Security Concepts and Secure Coding&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;16.10 Train Developers in Application Security Concepts and Secure Coding&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;16.11 Leverage Vetted Modules or Services for Application Security Components&lt;br /&gt; &lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;16.12 Implement Code-Level Security Checks&lt;br /&gt; &lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;16.13 Conduct Application Penetration Testing&lt;br /&gt; &lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;16.14 Conduct Threat Modeling&lt;/span&gt;&lt;/blockquote&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Let&#39;s discuss some of the above controls. The very first one, &lt;b&gt;Control 16.1 - Establish and Maintain a Secure Application Development Process&lt;/b&gt; lays the groundwork for the entire control and the safeguards that follow it. Document a policy and implement procedures at your organization that establishes development requirements - such as restricting access to code repositories; code reviews by a peer or a team lead before code advances in the code pipeline; DAST scans of code and libraries to identify vulnerabilities; SAST scans of applications. QA testing and user acceptance testing should be defined.&amp;nbsp;The document should also state how new versions of code are released. It is an automated process after code has passed a series of manual and automated testing or is there a team that must sign off on release of the new version.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The security standard the company follows should also be listed, such as OWASP Top 10 with at least annual refresher training for developers on common application security concerns.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;Control 16.10 - Apply Secure Design Principles in Application Architectures &lt;/b&gt;is so important to get right as it&#39;s difficult to correct if you get it wrong. It&#39;s important to design your application and supporting infrastructure to minimize the attack surface. Some companies put their servers and databases directly on the internet facing the public. The companies I&#39;ve worked with that do have good controls in place generally use Cloudflare&#39;s DDOS and WAF protection to filter all traffic before it reaches AWS load balancers. This protects their systems, putting web, application and other servers on private IPs, not directly accessible to the internet. The company also benefits by freeing up resources instead of implementing complex and expensive security controls that they can obtain from Cloudflare or other vendors.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;For Control 16.12 - Implement Code Level Security Checks -&lt;/b&gt;&amp;nbsp;Companies with good development practices use code analysis tools such as BurpSuite, Brakeman, Qualys, and SonarQube to name a few. There are many different tools for specific programming languages. Some of these can be used for DAST scanning of the actual application. In any event, it&#39;s necessary to use such tools to find vulnerabilities in your own code, the libraries your code is built upon, and at the application level.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;Control 16.13 - Conduct Application Penetration Testing - &lt;/b&gt;helps identify vulnerabilities in your applications that could not be identified using automated tools. If your organization does not have internal resources that can perform a pen test, engage a security firm to do so. First make sure you know in advance what you will receive from the firm as to what their pen test entails. Clients unfamiliar&amp;nbsp;with pen tests have shown me reports that were basically vulnerability scans with some narrative details about the scope ad&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;ded. No actual manual testing by a skilled offensive security professional was performed. And they paid a lot of money for a vulnerability&amp;nbsp;scan.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Ask to see a sample report before deciding on a company. If they decline to provide one, that&#39;s a red flag and you should move on until you find a pen test firm you are confident will conduct a detailed scan. A thorough pen test will include a discussion with your team and the pen testers about your environment. The report should include actionable recommendations to better secure your application and environment.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Implementing the guidance from CIS Control 16 will go a long way to protecting your company&#39;s in-house and third-party applications as well as your company and customer data.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;In the next post, I discuss CIS Control 17 - Incident Response Management.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.greghalpin.net/feeds/8059178117900974487/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.greghalpin.net/2023/12/notes-from-field-cis-control-16.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/8059178117900974487'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/8059178117900974487'/><link rel='alternate' type='text/html' href='http://www.greghalpin.net/2023/12/notes-from-field-cis-control-16.html' title='Notes from the Field - CIS Control 16 - Application Software Security'/><author><name>Greg Halpin</name><uri>http://www.blogger.com/profile/17719118542703009589</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3-t4qOKvt4VAXacR2IW5Cxa1LkMpWAiHeVhAwVAvu78I7MyzoHJkjLlFOITeM-okQwWq9iCwZL8aqvw-95-UaJrfotaoBgl6QmHYFHA1oxn5yQy31sp12ZGTZqWASjA/s220/IMG_4976+copy.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4G4Mm1P31VTUCAmfmyK2-7IFRubFzTqvg_h5AolWqycXAQ-GwesxBBaxMHgGYkjsAxud6x5778X0AwHRRZCgCWxtiCA4_Yrh0fraqw9qFcFMLDO9dHRAOeICAe2RPzj9u9aFpqUdpR5XYpPiaymSOAVq97CCV0dv5BNMZPrGfdJ73_duvySAg-Rz5VYYb/s72-w400-h300-c/IMG_8424.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6569213714636569218.post-5874598072237411976</id><published>2023-10-14T15:35:00.007-04:00</published><updated>2024-01-14T17:05:58.846-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Audit"/><category scheme="http://www.blogger.com/atom/ns#" term="CIS Controls"/><category scheme="http://www.blogger.com/atom/ns#" term="CISSP"/><category scheme="http://www.blogger.com/atom/ns#" term="Cybersecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="Service Provider Management"/><title type='text'>Notes from the Field - CIS Control 15 - Service Provider Management</title><content type='html'>&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The client I was conducting a gap analysis for had an incredibly detailed Service Provider Management Policy. It required the company compliance team to conduct due diligence on all prospective service providers, including a risk analysis of each. The&amp;nbsp; policy required the compliance team to review the prospective vendor&#39;s SOC 2 audit report, research the vendor&#39;s financial stability, and reputation. The compliance team was to conduct annual reviews of each vendor that included many of the same steps. Great stuff.&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8nqhg164BcXOmr1p21BAjVmarXo38rPhav1yFs0B2vozSX1P93MdttL-YSVcr1oc1Ybu7w9spQzn8UQtvNLX4VqFdh1flGpWuPJzAFDkVXG33edeYhLIjSRecQriuyR0wn9kybt0-X6pmPE6i2YBiKmUAfsZdbmIHRByz9fucrGMRDhyLzKP2k-qvkaTH/s4032/IMG_4452.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;3024&quot; data-original-width=&quot;4032&quot; height=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8nqhg164BcXOmr1p21BAjVmarXo38rPhav1yFs0B2vozSX1P93MdttL-YSVcr1oc1Ybu7w9spQzn8UQtvNLX4VqFdh1flGpWuPJzAFDkVXG33edeYhLIjSRecQriuyR0wn9kybt0-X6pmPE6i2YBiKmUAfsZdbmIHRByz9fucrGMRDhyLzKP2k-qvkaTH/w400-h300/IMG_4452.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;i&gt;Fraley&#39;s Robot Repair Shop, Pittsburgh, PA&amp;nbsp; Airport&lt;/i&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/span&gt;&lt;/div&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;When I asked them to provide evidence of activity in support of due diligence of their newly added service providers from the past year and evidence of the reviews of current vendors, they provided a couple of emails listing questions about the service and references to a completed demo of the services. They didn&#39;t have the completed risk analyses or any documentation that they performed reviews of the audit reports or any of the work required by their policy and by industry standards. Why? They found a template policy on the internet and used that as their own. They didn&#39;t actually do much in support of service provider management or think it was important. Like many clients, they thought having a policy was sufficient.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;I referred them to the Center for Internet Security Control 15 - Service Provider Management.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The &lt;/span&gt;&lt;a href=&quot;https://www.cisecurity.org/controls&quot; style=&quot;font-family: arial;&quot; target=&quot;_blank&quot;&gt;Center for Internet Security Controls &lt;/a&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;are 18 critical information security controls that all organizations and information security professionals should be familiar with and implement to protect their networks and data. The free but valuable document contains high level information that executives can understand and also has specific details about tools and procedures for technical staff to run with. I recommend it to all of my clients as a starting point for information security guidance.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;We discussed some of the activities they could do in support of Service Provider Management so they have assurance they have done their due diligence and can&amp;nbsp; be confident working with the vendor.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The overview for Control 15 is -&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;i&gt;Develop a process to evaluate service providers who hold sensitive data, or are responsible for an enterprise’s critical IT platforms or processes, to ensure these providers are protecting those platforms and data appropriately&lt;/i&gt;.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;There are 7 sub-controls or safeguards for Control 15. They are:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;15.1 Establish and Maintain an Inventory of Service Providers&lt;/span&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;15.2  Establish and Maintain a Service Provider Management Policy&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;15.3  Classify Service Providers&lt;/span&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;15.4. Ensure Service Provider Contracts Include Security Requirements&lt;/span&gt;&lt;/blockquote&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;15.5. Assess Service Providers&lt;/span&gt;&lt;/blockquote&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;15.6. Monitor Service Providers&lt;/span&gt;&lt;/blockquote&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;15.7  Securely Decommission Service Providers&lt;/span&gt;&lt;/blockquote&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;Why is this control critical? &lt;/b&gt;Companies often rely on service providers for many services, such as data center providers, cloud service providers, third-parties to manage technology and security solutions. There have been many cases where service providers had been breached or experienced service outages that impacted companies. It&#39;s important that your company has practices in place to vet vendors and review them annually.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;I recommend to clients that don&#39;t have anything in place to begin with a list&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Let&#39;s take a look at some of the safeguards:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;15.1 -&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;Establish and Maintain an Inventory of Service Providers&lt;/b&gt; is the logical place to start. Just like CIS Controls 1 and 2 for system and software inventories, it&#39;s necessary to know what you have in order to protect it. It&#39;s the same with service providers. Often the clients I work with don&#39;t have a list of them. It may be a decentralized process in which the department that needs the service is responsible for the due diligence and review activities. No one else in the company is aware the provider is used. The easiest way to start is with a spreadsheet listing each vendor and the service they provide. Include on the list what data they store, process or transmit on your company&#39;s behalf.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;15.2 Establish and Maintain a Service Provider Management Policy&lt;/b&gt; is pretty straight forward. For many areas of information security, a policy is required that outlines what the mandate is, such as maintaining an inventory of service providers in this case, conducting due diligence on new vendors, performing annual reviews of them. The policy will also outline&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;the activities in support of the policy - who is responsible for the activities, annual policy reviews and so on.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;15.5. Assess Service Providers &lt;/b&gt;is basically conducting due diligence of service providers before engaging them for services. This entails reviewing their SOC 2 audit report or Attestation of Compliance for PCI-DSS to understand their security controls. For large companies, such as AWS and AZure, that&#39;s as much as you might be able to do as they are not going to allow your company to audit them directly. Nor would it be practical.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;For smaller companies that have not undergone SOC 2 or other audits, you can request they complete a due diligence questionnaire (DDQ) that addresses their security controls. While they answer your questions about security, they are not evidence that the controls are actually in place and operating effectively. Additionally, you may request evidence, such as completed vulnerability scans, pen tests, reports on patching of systems, and their information security policy.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;15.7 Securely Decommission Service Providers &lt;/b&gt;is a crucial process for protecting your company. Service Providers often store critical data, such as PII, ePHI or credit card holder data. What happens to your data after you stop using a provider? Is it stored by the service provider or&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;securely deleted?&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The clients I work with that have a Software as a Service platform often store their customer data forever, unless the customer specifically requests their data to be deleted. Some don&#39;t even have methods to purge their databases of individual customers even if they request it.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;You want to make sure and see evidence that your service providers have deleted all of your sensitive data after you stop using their service. There is no good reason for them to maintain it. If the vendor is compromised years later, the attackers have access to your sensitive data when it never should have been with the former service provider in the first place.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Additionally, you want to revoke service provider access to your network at the end of a contract. Often companies engage managed service providers with accounts on their networks to manage systems. Remember to disable and delete their accounts after you stop using their services. You don&#39;t want a rogue employee of the service provider or an automated scheduled task to impact your systems.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;For more information on Service Provider Management safeguards&amp;nbsp;to protect your company networks and data, see the Center for Internet Security Controls Document.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;In the next post I&#39;ll discuss&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Center for Internet Security Control 16 - Application Software Security.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.greghalpin.net/feeds/5874598072237411976/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.greghalpin.net/2023/10/notes-from-field-cis-control-15-service.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/5874598072237411976'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/5874598072237411976'/><link rel='alternate' type='text/html' href='http://www.greghalpin.net/2023/10/notes-from-field-cis-control-15-service.html' title='Notes from the Field - CIS Control 15 - Service Provider Management'/><author><name>Greg Halpin</name><uri>http://www.blogger.com/profile/17719118542703009589</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3-t4qOKvt4VAXacR2IW5Cxa1LkMpWAiHeVhAwVAvu78I7MyzoHJkjLlFOITeM-okQwWq9iCwZL8aqvw-95-UaJrfotaoBgl6QmHYFHA1oxn5yQy31sp12ZGTZqWASjA/s220/IMG_4976+copy.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8nqhg164BcXOmr1p21BAjVmarXo38rPhav1yFs0B2vozSX1P93MdttL-YSVcr1oc1Ybu7w9spQzn8UQtvNLX4VqFdh1flGpWuPJzAFDkVXG33edeYhLIjSRecQriuyR0wn9kybt0-X6pmPE6i2YBiKmUAfsZdbmIHRByz9fucrGMRDhyLzKP2k-qvkaTH/s72-w400-h300-c/IMG_4452.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6569213714636569218.post-5511195656608251363</id><published>2023-07-15T16:38:00.001-04:00</published><updated>2023-08-19T16:49:51.653-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Center for Internet Security"/><category scheme="http://www.blogger.com/atom/ns#" term="CIS Controls"/><category scheme="http://www.blogger.com/atom/ns#" term="Cybersecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="Security Awareness"/><category scheme="http://www.blogger.com/atom/ns#" term="Training"/><title type='text'>Notes from the Field - CIS Control 14 - Security Awareness and Skills Training</title><content type='html'>&lt;span style=&quot;font-family: arial;&quot;&gt;Security awareness training is one of the areas in which I see companies doing either very well or they don&#39;t do at all. It&#39;s unfortunate for the companies that don&#39;t do much as a little training goes a very long way. It&#39;s an investment that more than pays for itself. The more your employees are trained against potential threats and attacks, the safer your company and customer data. The less trained they are, the more your company is at risk to attack and compromise. In this post I discuss what I see as an information security auditor working with the clients regarding the Center for Internet Security Control 14 - Security Awareness and Skill Training.&amp;nbsp;&lt;/span&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;div&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0jr6Kfi99B0MQ32hRcqzE4tFhRfyslonRDaXr5Um0w-2LFmDVU8y54wNKIibeN6-5sZDFzF0xUKBFnYVykvKsxf_3fLZNOfPvXdCwNOuzxy5Z1veE2V69HhEz1LLfgySa6U3Y-BYA0oMhggdHLsCR0u_uV4W3ijPE0RFhBa_Ai5omXu96C3Fs5nDQE3Sc/s3648/IMG_4462.jpeg&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;2736&quot; data-original-width=&quot;3648&quot; height=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0jr6Kfi99B0MQ32hRcqzE4tFhRfyslonRDaXr5Um0w-2LFmDVU8y54wNKIibeN6-5sZDFzF0xUKBFnYVykvKsxf_3fLZNOfPvXdCwNOuzxy5Z1veE2V69HhEz1LLfgySa6U3Y-BYA0oMhggdHLsCR0u_uV4W3ijPE0RFhBa_Ai5omXu96C3Fs5nDQE3Sc/w400-h300/IMG_4462.jpeg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;The Arch in Summer, the Arboretum at Penn State&lt;/span&gt;&lt;/i&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;The &lt;a href=&quot;https://www.cisecurity.org/controls&quot; target=&quot;_blank&quot;&gt;Center for Internet Security Controls&lt;/a&gt; are 18 critical information security controls that all organizations and information security professionals should be familiar with and implement to protect their networks and data. The free but valuable document contains high level information that executives can understand and also has specific details about tools and procedures for technical staff to run with. I recommend it to all of my clients for information security guidance.&amp;nbsp;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;The Overview for Control 14 - Security Awareness and Skills Training is&lt;/b&gt; - &lt;i&gt;Establish and maintain a security awareness program to influence behavior among the workforce to be security conscious and properly skilled to reduce cybersecurity risks to the enterprise&lt;/i&gt;.&lt;/span&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;Control 14 includes 9 sub-controls or safeguards&lt;/b&gt;. They are:&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;14.1 &amp;nbsp;Establish and Maintain a Security Awareness Program&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;14.2 &amp;nbsp;Train Workforce Members to Recognize Social Engineering Attacks&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;14.3 &amp;nbsp;Train Workforce Members on Authentication Best Practices&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;14.4 &amp;nbsp;Train Workforce on Data Handling Best Practices&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;14.5 &amp;nbsp;Train Workforce Members on Causes of Unintentional Data Exposure&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;14.6 &amp;nbsp;Train Workforce Members on Recognizing and Reporting Security Incidents&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;14.&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;7 &amp;nbsp;Train Workforce on How to Identify and Report if Their Enterprise Assets are Missing Security Updates&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;14.8 &amp;nbsp;Train Workforce on Dangers of Connecting to and Transmitting Enterprise Data Over Insecure Networks &amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;14.9 &amp;nbsp;Conduct Role-Specific Awareness and Skills Training.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;div style=&quot;font-family: -webkit-standard;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;Why is this control critical?&lt;/b&gt; This control addresses the human security vulnerability, perhaps the biggest vulnerability of all. All of the technical, administrative, and physical controls in the world can easily be undermined if your employees allow unauthorized people into facilities, click on links in phishing emails, open malicious attachments or visit fraudulent websites and enter their company user credentials. Such actions could allow an attacker to gain a foothold in your environment to install ransomware or exfiltrate company and customer data. Security awareness training will provide protections against such threats. Let&#39;s take a look at some of the safeguards and how companies accomplish them. &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: -webkit-standard;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;Safeguard 14.1 - Establishing and Maintaining a Security Awareness Program&lt;/b&gt; can be done by signing up your organization with an online training platform or using an existing service that your Human Resources Information System SaaS platform offers. As part of an employee&#39;s onboarding processes, new employees should be required to take the awareness training within their first week of employment to make sure the training is successfully completed. Additional, shorter training modules and phishing tests are recommended to be completed each month to continuously strengthen the information security awareness muscle. Annual refresher training should also be required for all employees. The paid services offer reporting to show who has successfully completed the training. Human Resources staff follow up with individuals who do not complete the training as they do with other types of required training. &amp;nbsp;&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Companies such as KnowBe4 and Proofpoint, are two popular services, among the many training tools available. Some companies choose to develop their own internal information security awareness training. It&#39;s usually made up of a PowerPoint presentation put together by IT and IT security staff, who go over the materials with company employees. Both types of training cover the basics, such as sharing their account passwords, using multi-factor authentication when possible, not clicking on attachments or links from unfamiliar senders, not submitting credentials or financial information to bogus websites, not falling victim to social engineering attacks, and so on. Quizzes are often used to test the knowledge of participants.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;Safeguard 14.5 -&amp;nbsp;Train Workforce Members on Causes of&amp;nbsp;Unintentional Data Exposure&amp;nbsp;&lt;/b&gt;is critical to protect company and customer data, as well as protect companies from the legal and financial liability as a result of such exposures. Well trained employees are taught not to share sensitive data with people who do not have a need or right to see it. They are also taught how to properly share information with those who do have a need or right to the data. The data leaks my clients have experienced are often due to lack of knowledge. Scenarios include an employee accidentally sending a patient or client the data of a different patient or client. For healthcare companies subject to HIPAA requirements, such a mistake can result in expensive fines. There have also been cases where companies I&#39;ve worked with have processes in place to share with partners customer data after the data has been anonymized to protect the identities of customers. On occasion the automated anonymization process fails but the data is still shared as the companies don&#39;t have proper verification processes in place. There are many other methods where data is unintentionally exposed. In all cases, proper training is needed as a baseline to protect the data and the company.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;Safeguard 14.6 - Train Workforce Members on Recognizing and Reporting Security Incidents&lt;/b&gt; is supremely important because people who are trained properly, know what to do. They report an incident to the people who can take appropriate action and contain the incident. People who are not trained, often are afraid to report an incident as they think they may get in trouble for having done something wrong. As a result of doing nothing, a containable incident is not contained and causes a lot of damage.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div style=&quot;font-family: -webkit-standard;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;Safeguard 14.9 - Conduct Role-Specific Awareness and Skills Training&lt;/b&gt; is often overlooked even in companies that have basic security awareness training. It&#39;s important that software developers receive annual training on secure coding practices. This helps them to stay up to date on the latest code vulnerabilities and practices to avoid them. IT and IT security staff should also receive annual training for responding to incidents and for protecting the technologies they support. Staff in other areas, such as senior executives and finance should receive more advanced training to prevent them from succumbing to bogus text messages and phishing emails, especially those regarding wiring money to the fraudulent recipients. &amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: -webkit-standard;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: -webkit-standard;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Whether you choose an online training platform or offer in-house training, your organization must provide company employees with security awareness training. It is the most effective method for protecting company and customer data. The Center for Internet Security Controls can help.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: -webkit-standard;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: -webkit-standard;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;In the next post I&#39;ll discuss, Center for Internet Security Control 15 - Service Provider Management.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: -webkit-standard;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.greghalpin.net/feeds/5511195656608251363/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.greghalpin.net/2023/08/notes-from-field-cis-control-14.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/5511195656608251363'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/5511195656608251363'/><link rel='alternate' type='text/html' href='http://www.greghalpin.net/2023/08/notes-from-field-cis-control-14.html' title='Notes from the Field - CIS Control 14 - Security Awareness and Skills Training'/><author><name>Greg Halpin</name><uri>http://www.blogger.com/profile/17719118542703009589</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3-t4qOKvt4VAXacR2IW5Cxa1LkMpWAiHeVhAwVAvu78I7MyzoHJkjLlFOITeM-okQwWq9iCwZL8aqvw-95-UaJrfotaoBgl6QmHYFHA1oxn5yQy31sp12ZGTZqWASjA/s220/IMG_4976+copy.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0jr6Kfi99B0MQ32hRcqzE4tFhRfyslonRDaXr5Um0w-2LFmDVU8y54wNKIibeN6-5sZDFzF0xUKBFnYVykvKsxf_3fLZNOfPvXdCwNOuzxy5Z1veE2V69HhEz1LLfgySa6U3Y-BYA0oMhggdHLsCR0u_uV4W3ijPE0RFhBa_Ai5omXu96C3Fs5nDQE3Sc/s72-w400-h300-c/IMG_4462.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6569213714636569218.post-3843735354881662634</id><published>2023-04-30T19:46:00.004-04:00</published><updated>2023-08-19T16:46:27.726-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Center for Internet Security"/><category scheme="http://www.blogger.com/atom/ns#" term="CIS Controls"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Monitoring"/><category scheme="http://www.blogger.com/atom/ns#" term="OSSEC"/><category scheme="http://www.blogger.com/atom/ns#" term="SIEM"/><category scheme="http://www.blogger.com/atom/ns#" term="WAF"/><title type='text'>Notes from the Field - CIS Control 13 - Network Monitoring and Defense</title><content type='html'>&lt;p&gt;&lt;span style=&quot;white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;“How would you know if your network or systems have been compromised?” That’s the question I often ask clients when discussing their networking monitoring and defense tools. An IT manager of a small company I worked with recently was honest and said he wasn’t sure. He was so busy putting out different fires every day, he didn’t know where to begin. The IT team consisted of four people. And he didn’t have much of a budget to implement expensive tools and create a Security Operations Center (SOC), like large companies have. That was a good opportunity to introduce him to the &lt;a href=&quot;https://www.cisecurity.org/controls&quot; target=&quot;_blank&quot;&gt;Center for Internet Security Controls&lt;/a&gt;, specifically Control 13 - Network Monitoring and Defense.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgxv1avOJRzgkoGkEUmTahOl-VNsMzTrp7CEj8ldVbBHfKzRtlHKJPl3_ntgPZIHpltXbe3njcQHgQmIP_pZGYijvGY-mTWVd3LfH9Z5OxJeii9W4Ql7tH4bbiEQ9eRwwIXIRc0gM5Ys9hmrSR52UHTjWOV1-gtTjbOKLm3VfTvKdPB3W0QajsgwBo0Q/s4032/IMG_6749.jpg&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Arboretum Pavillion&quot; border=&quot;0&quot; data-original-height=&quot;3024&quot; data-original-width=&quot;4032&quot; height=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgxv1avOJRzgkoGkEUmTahOl-VNsMzTrp7CEj8ldVbBHfKzRtlHKJPl3_ntgPZIHpltXbe3njcQHgQmIP_pZGYijvGY-mTWVd3LfH9Z5OxJeii9W4Ql7tH4bbiEQ9eRwwIXIRc0gM5Ys9hmrSR52UHTjWOV1-gtTjbOKLm3VfTvKdPB3W0QajsgwBo0Q/w400-h300/IMG_6749.jpg&quot; title=&quot;Arboretum Pavillion&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;i&gt;The Overlook Pavillion at the Arboretum at Penn State&lt;/i&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;span style=&quot;font-family: arial; white-space: pre-wrap;&quot;&gt;Many companies I audit have little to no network monitoring tools and processes in place &lt;br /&gt;while others have advanced tools in place but no processes to leverage the tools. Security alerts go uninvestigated. Companies that are successful in this area have both tools to identify threats and a person or a team of people to review security alerts and investigate.&amp;nbsp;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-family: arial; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;b&gt;The overview for Control 13 - Network Monitoring and Defense is&lt;/b&gt; - &lt;/span&gt;&lt;span style=&quot;font-family: arial; font-style: italic; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;operate processes and tooling to establish and maintain comprehensive network monitoring and defense against security threats across the enterprise’s network infrastructure and user base&lt;/span&gt;&lt;span style=&quot;font-family: arial; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;.&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;font-family: arial; line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;b&gt;Control 13 includes 11 safeguards or sub-controls:&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;font-family: arial; line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;p style=&quot;font-family: arial; line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;white-space: pre-wrap;&quot;&gt;13.1 Centralize Security Event Alerting&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: arial; line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;white-space: pre-wrap;&quot;&gt;13.2 Deploy a Host-Based Intrusion Detection Solution&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: arial; line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;white-space: pre-wrap;&quot;&gt;13.3 Deploy a Network Intrusion Detection Solution&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: arial; line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;white-space: pre-wrap;&quot;&gt;13.4 Perform Traffic Filtering Between Network Segments&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: arial; line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;white-space: pre-wrap;&quot;&gt;13.5 Manage Access Control for Remote Assets Devices&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: arial; line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;white-space: pre-wrap;&quot;&gt;13.6 Collect Network Traffic Flow Logs&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: arial; line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;white-space: pre-wrap;&quot;&gt;13.7 Deploy a Host-Based Intrusion Prevention Solution&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: arial; line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;white-space: pre-wrap;&quot;&gt;13.8 Deploy a Network Intrusion Prevention Solution&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: arial; line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;white-space: pre-wrap;&quot;&gt;13.9 Deploy Port-Level Access Control&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: arial; line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;white-space: pre-wrap;&quot;&gt;13.10 Perform Application Layer Filtering&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: arial; line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;white-space: pre-wrap;&quot;&gt;13.11 Tune Security Event Alerting Thresholds&lt;/span&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-weight: 700; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Why is this control critical? &lt;/span&gt;&lt;span style=&quot;font-family: arial; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&amp;nbsp;No network is 100% secure, no matter how well architectured. Even with appropriately implemented security controls, misconfigurations or lack of knowledge of security goals can cause gaps in the tools and security.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial; white-space: pre-wrap;&quot;&gt;Skilled security and operations staff must monitor alerting tools and respond before threats can impact the organization. Companies of all sizes must develop incident response capability to detect, analyze, and mitigate attacks.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial; white-space: pre-wrap;&quot;&gt;When a company is compromised, they sometimes may not discover the breach for months or years. During that time, the attacker is exfiltrating company and customer data.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial; white-space: pre-wrap;&quot;&gt;The CIS Control document discusses the use of weekly log reviews to tune triggers of alerting tools. The document stresses that while tools are necessary for logging and alerts, they cannot replace skilled information security staff and systems administrators that can understand and investigate the alerts.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial; white-space: pre-wrap;&quot;&gt;Let’s take a look at some of these safeguards and how companies I’ve worked with have successfully implemented them.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;b style=&quot;font-family: arial; white-space: pre-wrap;&quot;&gt;For safeguard 13.1 Centralize Security Event Alerting&lt;/b&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;white-space: pre-wrap;&quot;&gt;, the clients I work with often have a SIEM tool in place, such as Splunk, OSSEC, Wazuh, the ELK stack or similar tools in place. These tools collect logs from all types of systems. Security staff can configure alerts to be sent via email or text on different types of activity, such as change in account privileges, account password changes, unusual login activity, system and data access. The tools also provide reporting capabilities to identify new errors or potential threats so that organizations can take appropriate action. Some of the tools, such as OSSEC, are open-source and do not require license fees. Proprietary tools can be quite pricey. In all cases, there is a cost in terms of staffing to implement and monitor the tools. Staff must fine tune the queries and alerting to keep up with changing threats. &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial; white-space: pre-wrap;&quot;&gt;&lt;b&gt;Safeguards 13.2 and 13.7&lt;/b&gt; - Some of the tools above, such as OSSEC, include an agent to install on systems. Among other features, the agents of the different tools provide host-based intrusion detection and prevention capabilities. The agents can prevent malware from being installed by blocking changes to sensitive files. OSSEC is an open-source product that I’ve seen used at many organizations. Endpoint Detection and Response (EDR) tools, such as SentinelOne and CrowdStrike provide similar functionality and are also widely used among my clients.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial; white-space: pre-wrap;&quot;&gt;&lt;b&gt;Safeguards 13.3 and 13.8&lt;/b&gt; address deploying network intrusion detection and prevention tools. Most on-premises firewalls have IDS/IPS tools that can be enabled, such as Snort or Suricata. These tools also exist for cloud environments to enhance security rather than solely relying on, for example, AWS security group rules to restrict network traffic.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;white-space: pre-wrap;&quot;&gt;&lt;b&gt;Safeguard 13.10 Perform Application Level Filtering -&lt;/b&gt; A web application firewall (WAF) is often used to protect web applications from SQL injection, Cross Site Scripting, and other Layer 7 attacks. Companies I’ve worked with often use Cloudflare or AWS WAF for the cloud hosted applications. ModSecurity is a popular choice for companies that don’t want to pay for premium services such as Cloudflare or AWS WAF.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial; white-space: pre-wrap;&quot;&gt;No matter the size of your organization or budget, you need to implement strong network monitoring and defense tools and procedures. Attackers look for easy targets. Don’t be one of them. Utilize the tools and procedures listed in the CIS Controls to better protect your company network and customer data.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial; white-space: pre-wrap;&quot;&gt;In the next post I’ll discuss Center for Internet Security Control 14 - Security Awareness and Skills Training.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;br class=&quot;Apple-interchange-newline&quot; /&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.greghalpin.net/feeds/3843735354881662634/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.greghalpin.net/2023/04/notes-from-field-cis-control-13-network.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/3843735354881662634'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/3843735354881662634'/><link rel='alternate' type='text/html' href='http://www.greghalpin.net/2023/04/notes-from-field-cis-control-13-network.html' title='Notes from the Field - CIS Control 13 - Network Monitoring and Defense'/><author><name>Greg Halpin</name><uri>http://www.blogger.com/profile/17719118542703009589</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3-t4qOKvt4VAXacR2IW5Cxa1LkMpWAiHeVhAwVAvu78I7MyzoHJkjLlFOITeM-okQwWq9iCwZL8aqvw-95-UaJrfotaoBgl6QmHYFHA1oxn5yQy31sp12ZGTZqWASjA/s220/IMG_4976+copy.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgxv1avOJRzgkoGkEUmTahOl-VNsMzTrp7CEj8ldVbBHfKzRtlHKJPl3_ntgPZIHpltXbe3njcQHgQmIP_pZGYijvGY-mTWVd3LfH9Z5OxJeii9W4Ql7tH4bbiEQ9eRwwIXIRc0gM5Ys9hmrSR52UHTjWOV1-gtTjbOKLm3VfTvKdPB3W0QajsgwBo0Q/s72-w400-h300-c/IMG_6749.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6569213714636569218.post-7357315937489849077</id><published>2023-01-28T21:49:00.004-05:00</published><updated>2023-02-12T12:25:02.021-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Center for Internet Security"/><category scheme="http://www.blogger.com/atom/ns#" term="CIS Controls"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Architecture"/><title type='text'>Notes from the Field - Center for Internet Security Control 12 - Network Infrastructure Management</title><content type='html'>&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;A company I audited last fall had an&amp;nbsp;insecure design for its Amazon Web&amp;nbsp;Services architecture, which hosted a financial web application. The web servers were public facing as were its PostgreSQL servers. Prime targets for attackers. In most information security audits I perform, companies usually protect their web servers with layers of protection that include DDoS and reverse proxy services from companies like Cloudflare. AWS load balancers are also commonly used and placed in front of the web servers.The web servers and database servers are assigned private IP addresses, not directly exposed to the internet and attackers.&lt;/span&gt;&lt;/p&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZWGwSOro-FuhfOR-h4TigpkzcfdpVS-OIft6EY589VV6GVq7U8rkeFuWcvwRPP3GNJcV-gVQI1C6GJgKpGG9PBgQJWTT5ZrqCymdGyqkWMcjX6uKQ_y37kiom45oY3mFHWJ2L9bSPbQD4-twPvmhDhkL-hEie7mkHTnQNVkqa4Sm0lJz-ddy06xkv6A/s2948/art-spring-summer-fall-winter-for-blog-post.png&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;The Four Seasons&quot; border=&quot;0&quot; data-original-height=&quot;2869&quot; data-original-width=&quot;2948&quot; height=&quot;389&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZWGwSOro-FuhfOR-h4TigpkzcfdpVS-OIft6EY589VV6GVq7U8rkeFuWcvwRPP3GNJcV-gVQI1C6GJgKpGG9PBgQJWTT5ZrqCymdGyqkWMcjX6uKQ_y37kiom45oY3mFHWJ2L9bSPbQD4-twPvmhDhkL-hEie7mkHTnQNVkqa4Sm0lJz-ddy06xkv6A/w400-h389/art-spring-summer-fall-winter-for-blog-post.png&quot; title=&quot;The Four Seasons&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;i&gt;The Sun and the Four Seasons&lt;/i&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The client agreed that their architecture was not ideal. They had been in a hurry a few years before to get the web application into production and they were new to AWS at the time. They figured they would fix it later. They never did.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;There was always some new project or priority that caused them to delay the&amp;nbsp;redesign.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;As they say, if you don&#39;t have time to do it right, when will you have time to do it over?&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Unfortunately, this scenario is more common than you might expect. While most of the clients I work with have&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;skilled and&amp;nbsp;experienced network/cloud architects and systems administrators who have&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&amp;nbsp;implemented secure infrastructures, too many still don&#39;t. They do what works and hope to secure it later. That will eventually catch up with them.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;In this post I discuss Center for Internet Security Critical Control 12 - Network Infrastructure Management. The &lt;a href=&quot;https://www.cisecurity.org/controls&quot; target=&quot;_blank&quot;&gt;Center for Internet Security Controls&lt;/a&gt; are 18 critical information security controls all organizations should implement and all information&amp;nbsp;technology and security employees should be&amp;nbsp;familiar with to protect their networks, systems, and data.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;The overview for Control 12 is&lt;/b&gt; -&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;i&gt;Establish, implement, and actively manage (track, report, correct) network devices, in order to prevent attackers from exploiting vulnerable network services and access points&lt;/i&gt;.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;Control 12 includes 8 safeguards:&lt;/b&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;12.1 &amp;nbsp;Ensure Network Infrastructure is Up-to-Date&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;12.2 &amp;nbsp;Establish and Maintain a Secure Network Architecture&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;12.3 &amp;nbsp;Securely Manage Network Infrastructure&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;12.4 &amp;nbsp;Establish and Maintain Architecture Diagram(s)&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;12.5 &amp;nbsp;Centralize Network Authentication, Authorization, and Auditing (AAA)&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;12.6 &amp;nbsp;Use of Secure Network Management and Communication Protocols&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;12.7 &amp;nbsp;Ensure Remote Devices Utilize a VPN and are Connecting to an Enterprise’s AAA Infrastructure&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;12.8 &amp;nbsp;Establish and Maintain Dedicated Computing Resources for All Administrative Work&lt;/span&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;Why is this control critical?&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Secure network infrastructure is essential in defense against attacks. Organizations must have an appropriate architecture that they can effectively secure.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Understand that securing company and customer data is the highest priority for information security and technology professionals. Data breaches can cost companies tens or hundreds of millions of dollars from lost business, fines, legal settlements, and reputational damage. The 2013 Target data breach cost the retail giant at least&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://www.nytimes.com/2017/05/23/business/target-security-breach-settlement.html&quot; style=&quot;font-family: arial;&quot; target=&quot;_blank&quot;&gt;$200 million&lt;/a&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&amp;nbsp;in legal and other fees. Equifax agreed to pay&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://www.ftc.gov/news-events/news/press-releases/2019/07/equifax-pay-575-million-part-settlement-ftc-cfpb-states-related-2017-data-breach&quot; style=&quot;font-family: arial;&quot; target=&quot;_blank&quot;&gt;$575 million&lt;/a&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&amp;nbsp;as a result of its 2017 data breach. Both companies paid out more to recover from the breaches. &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Let&#39;s discuss a few of the safeguards listed above. Safeguard 12.1 overlaps with &lt;a href=&quot;https://www.greghalpin.net/2022/06/notes-from-field-center-for-internet.html&quot; target=&quot;_blank&quot;&gt;Control 07 - Vulnerability Management&lt;/a&gt;. It boils down to using supported network gear and services, installing the latest security patches and firmware updates. Clear enough. Still, in&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;on-premises environments, clients often have firewalls with firmware that has not been updated in years, leaving them vulnerable to attack. As important as firewalls are, people forget to maintain them. If you rely on a firewall to protect your&amp;nbsp;perimeter, properly manage the firewall. &amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;For Safeguard 12.2 - Establish and Maintain a Secure Network&amp;nbsp;Architecture&lt;/b&gt;, I refer back to the example of the client about which I opened this post. How should&amp;nbsp;companies design their AWS&amp;nbsp;environments for their web application? Here&#39;s a good &lt;a href=&quot;https://docs.aws.amazon.com/whitepapers/latest/web-application-hosting-best-practices/an-aws-cloud-architecture-for-web-hosting.html&quot; target=&quot;_blank&quot;&gt;document and diagram&lt;/a&gt; from AWS advising how to properly architecture an environment. It includes additional services to leverage that you can optionally use, such as a&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;WAF, Content Delivery Network (CDN), and an Elastic Load Balancers (ELB) to better protect your web,&amp;nbsp;applications, and database servers or RDS instances. It does a good job of visually demonstrating the levels of protection and the different subnets companies can use for the different types of systems and services.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;Safeguard 12.4 - Establish and Maintain Architecture Diagram(s) &lt;/b&gt;seems to some industry professionals I&#39;ve worked with to be a waste of time. They either don&#39;t have diagrams or they are outdated. A diagram is used to visually represent your network, systems, location of data and the flow of data in and out of your environment. The diagrams often list the ports that are open to which systems from the internet internally. You can look at it and generally understand what&#39;s going on. You can then compare the diagram to your actual network, inventory, and firewall and security rules to determine if they align.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Do you know what happens when companies don&#39;t have network diagrams? There are usually some forgotten firewall or security group rules allowing traffic in where it shouldn&#39;t be permitted. Or there&#39;s a server sitting in the DMZ that shouldn&#39;t be there. But the infrastructure director didn&#39;t know about it because they were told by staff that everything was set up right. Without a diagram, they have to get under the hood themselves to check things out. And they may never do that. &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;Safeguard&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;12.8 - Establish and Maintain Dedicated Computing Resources for All Administrative Work&lt;/b&gt; is one of the controls that distinguishes secure and insecure environments. If this safeguard is in place, many of the others are as well. In secure environments, companies require VPN access to their backend on-prem or cloud environment. Administrators then connect to a&amp;nbsp;jump box, a server used for administrative tasks for the company infrastructure. The jump box is on a separate subnet from the production systems. From the jump box, the sys admins can SSH or RDP to the server they need to administer. In less secure environments,&amp;nbsp;administrators can SSH or RDP directly from the internet to the servers they need to administer, no VPN or jump box. This is a dangerous practice as attackers can attempt to SSH and RDP to those same servers if they are not protected by VPN and jump box layers.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;Periodic Firewall and Security Group Rules -&lt;/b&gt;&amp;nbsp;Companies should conduct monthly or quarterly reviews of firewall and security group rules to verify they are appropriate. Network staff often test different services and tools before implementing them. That usually requires a change in firewall rules, such as opening a port for a new service or testing remote administration. Unfortunately, companies don&#39;t always don&#39;t disable or delete the rule after the testing is completed or when the technology is no longer used. The port that was opened for one technology is now open for a different server, leaving it vulnerable to attack.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;For more details on the safeguards to protect your network to prevent a data breach, see the Center for Internet&amp;nbsp;Security Controls document.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;N&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;ext month I will discuss Center for Internet Security Control 13 - Network Monitoring and Defense.&lt;/span&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.greghalpin.net/feeds/7357315937489849077/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.greghalpin.net/2023/02/notes-from-field-center-for-internet.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/7357315937489849077'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/7357315937489849077'/><link rel='alternate' type='text/html' href='http://www.greghalpin.net/2023/02/notes-from-field-center-for-internet.html' title='Notes from the Field - Center for Internet Security Control 12 - Network Infrastructure Management'/><author><name>Greg Halpin</name><uri>http://www.blogger.com/profile/17719118542703009589</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3-t4qOKvt4VAXacR2IW5Cxa1LkMpWAiHeVhAwVAvu78I7MyzoHJkjLlFOITeM-okQwWq9iCwZL8aqvw-95-UaJrfotaoBgl6QmHYFHA1oxn5yQy31sp12ZGTZqWASjA/s220/IMG_4976+copy.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZWGwSOro-FuhfOR-h4TigpkzcfdpVS-OIft6EY589VV6GVq7U8rkeFuWcvwRPP3GNJcV-gVQI1C6GJgKpGG9PBgQJWTT5ZrqCymdGyqkWMcjX6uKQ_y37kiom45oY3mFHWJ2L9bSPbQD4-twPvmhDhkL-hEie7mkHTnQNVkqa4Sm0lJz-ddy06xkv6A/s72-w400-h389-c/art-spring-summer-fall-winter-for-blog-post.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6569213714636569218.post-5821900163625897721</id><published>2022-12-30T09:39:00.055-05:00</published><updated>2023-01-14T17:56:36.769-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Center for Internet Security"/><category scheme="http://www.blogger.com/atom/ns#" term="CIS"/><category scheme="http://www.blogger.com/atom/ns#" term="CIS Controls"/><category scheme="http://www.blogger.com/atom/ns#" term="Data Backup"/><category scheme="http://www.blogger.com/atom/ns#" term="Data Recovery"/><category scheme="http://www.blogger.com/atom/ns#" term="Ransomware"/><title type='text'>Notes from the Field - Center for Internet Security Control 11 - Data Recovery</title><content type='html'>&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;The client I was working with had undergone a management shakeup over the previous year. The CIO left, replaced by someone who brought in several new managers. The result was a lot of IT and DevOps staff turnover. Many skilled staff who knew how everything worked at the company left amid the uncertainty. There were not enough senior people left to train all of the new hires. Without direction, new hires didn&#39;t always know what was important. A lot of things fell through the cracks, including data recovery.&amp;nbsp; &lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhu38P6dSE4xOebRQtH-BxfanEANAaTar-QsklAAIbXI8IyPub2xpwXOTmWUYXLlNwv05VTKAx9aFaTfr8ArUvawZ3-adSGBWDhBJxCDoLlqpnvu0o5w6-FjT8FEWAGCubXXFbijldb-atlkFiNTTbB5tQPQBN6Z3_xG5_anLvNzxXzz9XfznXQ0LqrZQ/s3861/sun-compass-arboretum-october-2022.png&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Sun Compass in the Ridge and Valley Sculpture the Arboretum at Penn State&quot; border=&quot;0&quot; data-original-height=&quot;3007&quot; data-original-width=&quot;3861&quot; height=&quot;311&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhu38P6dSE4xOebRQtH-BxfanEANAaTar-QsklAAIbXI8IyPub2xpwXOTmWUYXLlNwv05VTKAx9aFaTfr8ArUvawZ3-adSGBWDhBJxCDoLlqpnvu0o5w6-FjT8FEWAGCubXXFbijldb-atlkFiNTTbB5tQPQBN6Z3_xG5_anLvNzxXzz9XfznXQ0LqrZQ/w400-h311/sun-compass-arboretum-october-2022.png&quot; title=&quot;Sun Compass in the Ridge and Valley Sculpture the Arboretum at Penn State&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;i&gt;The Compass from the Ridge and Valley Sculpture&lt;br /&gt;at the Arboretum at Penn State&lt;/i&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;While reviewing the data backups, we determined that not all the data the company needed to backup was actually getting backed up.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Nor was the backup data retention as long as required by company policy.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;They had a cloud environment and an on-premises server room with some legacy apps and data. Different backup tools were used for each.&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;In the AWS environment, the RDS databases were automatically backed up and retained for 1 to 35 days, depending on the method used to create the RDS database. The company&#39;s backup procedures had the RDS snapshots copied to S3 buckets, where they were required to be retained for three months. But the task to copy the backups to the S3 buckets stopped functioning months before. After investigating they determined the task of copying the backups to the buckets was tied to an AWS IAM role that had been modified in error, removing the role&#39;s ability to write the data to the bucket. Configuration management issues like this occur, especially in dynamic environments.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;For the on-premises environment the company used Veeam to backup systems to on-site storage devices for short-term storage. The backups were copied to AWS S3 buckets for longer retention. Unfortunately, a set of the Veeam backup jobs were unsuccessful each day. Alerts had been emailed to the IT team but they were ignored. The dedicated backup administrator had left amid the company changes. A team with many other pressing responsibilities was assigned to oversee the backups. It wasn&#39;t a high priority for them.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;These issues were easily correctable with a few hours work but could have been very costly if staff at the company inadvertently deleted data or had been targeted by a ransomware gang.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;In both cases, the company would not have been able to restore critical business data. We discussed the &lt;a href=&quot;https://www.cisecurity.org/controls&quot; target=&quot;_blank&quot;&gt;Center for Internet Security Controls&lt;/a&gt;, specifically Control 11 - Data Recovery. We also discussed the basics of data backup and&amp;nbsp;recovery to better protect company and customer&amp;nbsp;data.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;The Overview for CIS Control 11 is&lt;/b&gt; - &lt;i&gt;Establish and maintain data recovery practices sufficient&amp;nbsp; to restore in-scope enterprise assets to a pre-incident and trusted state.&lt;br /&gt;&lt;/i&gt;&lt;br /&gt;Control 11 includes 5 safeguards. They are:&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;11.1 Establish and Maintain a Data Recovery Process&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;11.2 Perform Automated Backups&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;11.3 Protect Recovery Data&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;11.4 Establish and Maintain an Isolated Instance of Recovery Data&lt;br /&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;11.5 Test Data Recovery&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Why is this control critical?&lt;/b&gt; Organizations need and use data to make decisions and provide services to customers. If data is not available or loses its integrity, the organization and its customers could be negatively impacted. The CIS Controls Document refers to an example of an attacker encrypting a company&#39;s data for ransom. In such a case, the company would need to have backup data prior to the point when it was encrypted by the attacker. Unfortunately, many organizations find their backup data retention is not long enough to protect them from this attack. &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Other challenges that companies face regarding data recovery is that they have so much data, they may not have an effective method to restore it in a timely fashion. It might take them weeks to restore the data, which could result in lost business.&lt;br /&gt;&lt;br /&gt;In my own work, it&#39;s common for companies to have lax practices around their data backup and recovery testing.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The CIS Controls document recommends that on a quarterly basis or when new data sources or technologies are introduced, companies evaluate their backups and attempt to restore data in a test environment. It&#39;s necessary to verify that data can successfully be restored in a reasonable time period in case of a serious incident and that the systems and applications can be restored.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The news is replete with stories of ransomware gangs compromising companies and holding their data hostage. You can better protect your company from becoming the next target b&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;y implementing the CIS Critical Controls. Review your data backup strategy regularly to determine it is current. Test your data recovery practices to verify you can restore data in case of accidental deletion or a ransomware attack.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Next month I&#39;ll discuss Center for Internet Security Control 12 - Network Infrastructure Management.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.greghalpin.net/feeds/5821900163625897721/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.greghalpin.net/2022/12/notes-from-field-center-for-internet.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/5821900163625897721'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/5821900163625897721'/><link rel='alternate' type='text/html' href='http://www.greghalpin.net/2022/12/notes-from-field-center-for-internet.html' title='Notes from the Field - Center for Internet Security Control 11 - Data Recovery'/><author><name>Greg Halpin</name><uri>http://www.blogger.com/profile/17719118542703009589</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3-t4qOKvt4VAXacR2IW5Cxa1LkMpWAiHeVhAwVAvu78I7MyzoHJkjLlFOITeM-okQwWq9iCwZL8aqvw-95-UaJrfotaoBgl6QmHYFHA1oxn5yQy31sp12ZGTZqWASjA/s220/IMG_4976+copy.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhu38P6dSE4xOebRQtH-BxfanEANAaTar-QsklAAIbXI8IyPub2xpwXOTmWUYXLlNwv05VTKAx9aFaTfr8ArUvawZ3-adSGBWDhBJxCDoLlqpnvu0o5w6-FjT8FEWAGCubXXFbijldb-atlkFiNTTbB5tQPQBN6Z3_xG5_anLvNzxXzz9XfznXQ0LqrZQ/s72-w400-h311-c/sun-compass-arboretum-october-2022.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6569213714636569218.post-2856322326763845818</id><published>2022-11-28T21:39:00.008-05:00</published><updated>2023-01-03T09:08:52.825-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anti-malware"/><category scheme="http://www.blogger.com/atom/ns#" term="Anti-virus"/><category scheme="http://www.blogger.com/atom/ns#" term="Center for Internet Security"/><category scheme="http://www.blogger.com/atom/ns#" term="CIS"/><category scheme="http://www.blogger.com/atom/ns#" term="CIS Controls"/><category scheme="http://www.blogger.com/atom/ns#" term="Malware"/><category scheme="http://www.blogger.com/atom/ns#" term="Virus"/><title type='text'>Notes from the Field - Center for Internet Security Control 10 - Malware Defenses</title><content type='html'>&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The client I was working with had a web application hosted on a Windows server with the anti-virus software disabled. When I asked the head of Information Technology about it, he said the company&#39;s web application didn&#39;t work when anti-virus was running, so they couldn&#39;t enable it. They weren&#39;t concerned about it as they had a firewall in place with malware protection. I strongly advised them to reconsider that decision. Instead of disabling anti-virus, I recommended they determine why the web application did not work and correct it. They were the only client I had worked with that did not have anti-virus enabled on a Windows web application server. The risk of a Windows server being infected by a virus is high, especially one with a public facing IP address. Additionally, the server did not have recent security patches installed. It was only a matter of time before attackers compromised their web server.&amp;nbsp; &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;It&#39;s commonly accepted that Windows systems must have anti-malware software installed to protect them while Linux and macOS don&#39;t need it. That view has been changing the last several years. Linux and macOS are targeted more and more by ransomware and cryptojacking malware.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;In this post I discuss what I see in my work as an information security auditor in my work clients regarding &lt;/span&gt;&lt;b style=&quot;font-family: arial;&quot;&gt;Center for Internet Security Control 10 - Malware Defenses&lt;/b&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgeqLw5BcYfnJYcfPW8yw5aep4B4qvjMVfcSgCT9Td0egzrTBNBeT0190kfcpT4PK_jbQyrCtO7pmg5VfSR4yAnhwTC7FzWYrO9q-5tmMaHIQ_gtwQsGv_IgGe7cwxepQZXjmjI9GHX-bV_2-vNa_RhLXpYWA19wOyg7ppToIMMF8_s_mAcYYjxMTXg0A/s4032/IMG_3227.jpg&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;3024&quot; data-original-width=&quot;4032&quot; height=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgeqLw5BcYfnJYcfPW8yw5aep4B4qvjMVfcSgCT9Td0egzrTBNBeT0190kfcpT4PK_jbQyrCtO7pmg5VfSR4yAnhwTC7FzWYrO9q-5tmMaHIQ_gtwQsGv_IgGe7cwxepQZXjmjI9GHX-bV_2-vNa_RhLXpYWA19wOyg7ppToIMMF8_s_mAcYYjxMTXg0A/w400-h300/IMG_3227.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-family: arial; font-size: x-small;&quot;&gt;&lt;i&gt;Back of Old Botany Building along Pattee Mall at Penn State in Autumn&lt;/i&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The &lt;a href=&quot;https://www.cisecurity.org/controls&quot; target=&quot;_blank&quot;&gt;Center for Internet Security Controls&lt;/a&gt; are 18 critical information security controls that all &lt;br /&gt;organizations and information security professionals should be familiar with and implement to protect their networks and data. The free but valuable document contains high level information that executives can understand and also has specific details about tools and procedures for technical staff to run with. I recommend it to all of my clients for information security guidance.&amp;nbsp;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;The Overview for&amp;nbsp;Control 10 is -&lt;/b&gt; &lt;i&gt;Prevent or control the installation, spread, and execution of malicious applications, code, or scripts on enterprise assets&lt;/i&gt;.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Control 10 includes 7 sub-controls or safeguards. They are:&lt;/span&gt;&lt;/p&gt;&lt;blockquote style=&quot;border: medium none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;10.1 Deploy and Maintain Anti-Malware Software&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;10.2 Configure Automatic Anti-Malware Signature Updates&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;10.3 Disable Autorun and Autoplay for Removable Media&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;10.4 Configure Automatic Anti-Malware Scanning of Removable Media&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;10.5 Enable Anti-Exploitation Features&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;10.6 Centrally Manage Anti-Malware Software&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;10.7 Use Behavior-Based Anti-Malware Software&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;Why is this control critical? &lt;/b&gt;Malicious software is one of the biggest threats to your company and customer data. Malware can be used to capture user credentials to further exploit your network. Malware can be used by attackers to encrypt and delete your data, preventing you from accessing it unless you pay a ransom for it. Attackers leverage machine learning tools to make more sophisticated and effective malware. Malware enters company networks through vulnerabilities, phishing, and many other avenues. It&#39;s necessary to have comprehensive malware defenses to protect your systems and data.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Larger clients I work with generally have good practices in place for preventing malware. They have anti-malware or endpoint detection and response (EDR) tools installed on all of their servers, workstations, and laptops. They manage the tools centrally with a team that checks the status of systems. The team follows up on systems that are not reporting their status to the console, not receiving updates or have been infected by malware.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Some of the most widely used anti-malware/EDR tools by larger clients are from Trend Micro, SentinelOne, CrowdStrike, Symantec, and McAfee. Additionally, network firewalls include filtering of malware traffic prior to reaching endpoints. &amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Smaller to mid-size clients often don&#39;t have much in place to protect systems from malware. They lack the budget or staff resources to manage a centralized anti-malware tool. They rely on the default tools that are installed with the operating systems, such as Windows Defender for Microsoft Windows server and end user systems and XProtect for Apple macOS. Are Defender and XProtect enough? Maybe. But is maybe good&amp;nbsp;enough to protect your company and customer data?&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;You want assurance that if new malware is spreading across the internet, your systems are fully protected. You also want to know if your systems are affected. Without a central management console for your anti-malware tool, it&#39;s difficult to know for sure what is going on in your company&#39;s network. Was one system affected or hundreds? It&#39;s important to know so you can take immediate action, such as isolate systems, block ports on your network or push out a new security patch.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;For Linux servers, most small to mid-sized companies and even some larger companies I work with generally do not deploy anti-malware software. When they do, it&#39;s often ClamAV. That&#39;s sufficient to protect systems but it does not have centralized&amp;nbsp;management features. Logging and alerting for ClamAV can be leveraged using a SIEM tool if one is in place to get a full picture of the status of systems. Sometimes companies deploy&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;OSSEC, a host intrusion detection tool, to their Linux systems instead of or in addition to deploying ClamAV. OSSEC is not a dedicated anti-malware tool but does include root-kit and malware detection.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;OSSEC and popular anti-virus/EDR tools have intrusion detection and file integrity monitoring features to identify changed files. This helps track activity and potential damage or deletion of files. Some of the tools can also stop processes completely based on behavior to better protect your systems&amp;nbsp;and data.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Anti-malware defenses combined with the other CIS Controls can help protect your network, systems, and data. Read the CIS Controls document today.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Next month,&amp;nbsp;I will&amp;nbsp;discuss Center for Internet Security Control 11 - Data Recovery. &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.greghalpin.net/feeds/2856322326763845818/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.greghalpin.net/2022/11/notes-from-field-center-for-internet.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/2856322326763845818'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/2856322326763845818'/><link rel='alternate' type='text/html' href='http://www.greghalpin.net/2022/11/notes-from-field-center-for-internet.html' title='Notes from the Field - Center for Internet Security Control 10 - Malware Defenses'/><author><name>Greg Halpin</name><uri>http://www.blogger.com/profile/17719118542703009589</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3-t4qOKvt4VAXacR2IW5Cxa1LkMpWAiHeVhAwVAvu78I7MyzoHJkjLlFOITeM-okQwWq9iCwZL8aqvw-95-UaJrfotaoBgl6QmHYFHA1oxn5yQy31sp12ZGTZqWASjA/s220/IMG_4976+copy.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgeqLw5BcYfnJYcfPW8yw5aep4B4qvjMVfcSgCT9Td0egzrTBNBeT0190kfcpT4PK_jbQyrCtO7pmg5VfSR4yAnhwTC7FzWYrO9q-5tmMaHIQ_gtwQsGv_IgGe7cwxepQZXjmjI9GHX-bV_2-vNa_RhLXpYWA19wOyg7ppToIMMF8_s_mAcYYjxMTXg0A/s72-w400-h300-c/IMG_3227.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6569213714636569218.post-5264492682522076162</id><published>2022-10-02T15:41:00.010-04:00</published><updated>2022-12-13T09:16:47.322-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Browser"/><category scheme="http://www.blogger.com/atom/ns#" term="Center for Internet Security"/><category scheme="http://www.blogger.com/atom/ns#" term="CIS"/><category scheme="http://www.blogger.com/atom/ns#" term="CIS Controls"/><category scheme="http://www.blogger.com/atom/ns#" term="DNS Filtering"/><category scheme="http://www.blogger.com/atom/ns#" term="Email"/><category scheme="http://www.blogger.com/atom/ns#" term="Phishing"/><title type='text'>Notes from the Field - Center for Internet Security Control 09 - Email and Web Browser Protections</title><content type='html'>&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;A small SaaS (Software as a Service) client I worked with recently mentioned an information security incident they experienced a year ago in which the email account of one of their sales representatives was compromised via a phishing attack. The attackers gained the credentials of the sales rep, obtained email addresses of customers, and sent emails to the company&#39;s customers with false offers to buy discounted services. The attackers had&amp;nbsp;scraped the company&#39;s website and set up an&amp;nbsp;identical site with a similar URL, which tricked customers into believing the website was legitimate. Some customers visited the site and entered their credit card numbers to purchase what they thought were legitimate services. The compromise&amp;nbsp;occurred&amp;nbsp;on a Friday morning. It wasn&#39;t until Monday afternoon that the sales rep began to hear from customers that something was very wrong. Their credit cards were used for many bogus purchases on multiple websites after using their credit cards on what they thought was the company website. &amp;nbsp;&lt;/span&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWsdrsNcdMK8gd1WhSxJB7fQ2siJG4dmvLHZMsOf2h0ZhVoYA_6r1WyQTu-UqOFZNcRDwe9ynzJcsjjG4KzaivKjqSWAtPvO09lGANDjUBNHFL8iUN2ReWSZQWvLAg5BuGdQBsLvH7NPz6gTwgxsMnKFXcsPS2iactdS5mFAbtbnUjqJqBfsV12YpRyg/s3497/IMG_4538-cropped.png&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;3011&quot; data-original-width=&quot;3497&quot; height=&quot;345&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWsdrsNcdMK8gd1WhSxJB7fQ2siJG4dmvLHZMsOf2h0ZhVoYA_6r1WyQTu-UqOFZNcRDwe9ynzJcsjjG4KzaivKjqSWAtPvO09lGANDjUBNHFL8iUN2ReWSZQWvLAg5BuGdQBsLvH7NPz6gTwgxsMnKFXcsPS2iactdS5mFAbtbnUjqJqBfsV12YpRyg/w400-h345/IMG_4538-cropped.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-family: arial; font-size: x-small;&quot;&gt;&lt;i&gt;Sun Mosaic at Bandon, Oregon&lt;/i&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The IT department was able to block the attackers access to the email account of the sales rep. But that was just the beginning. Did the attackers gain access to other accounts and elevate their credentials? Did the attackers now have customer credentials? If so, how many and which ones? As the IT team began to isolate the incident, the senior executive team, including legal counsel and communications, was brought&amp;nbsp;in to determine how to notify customers and what to tell them. &lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The company&#39;s reputation was damaged. It lost customers and revenue. Since the incident, the company requires multi-factor authentication for remote access and all email and cloud services. The company also implemented annual information security awareness training for all staff. I suggested additional technical controls the company can put in place to better protect the company and its customers from similar attacks in the future.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;In this post I discuss the Center for Internet Security Control 09 - Email and Web Browser Protections. The &lt;a href=&quot;https://www.cisecurity.org/controls&quot; target=&quot;_blank&quot;&gt;Center for Internet Security Controls&lt;/a&gt; are 18 critical information security controls that all organizations and information security professionals should be familiar with and implement to protect their networks and data. The document contains high level information that executives can understand and also has specific details about tools and procedures for technical staff to run with. I recommend it to all my clients for information security guidance.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;b&gt;The Overview for Control 09 - Email and Web Browser Protections is &lt;/b&gt;- &lt;i&gt;Improve protections and detections of threats from email and web vectors, as these are opportunities for attackers to manipulate human behavior through direct engagement&lt;/i&gt;.&lt;/span&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;Why is this control critical? &lt;/b&gt;Attackers continue to&amp;nbsp;successfully target email and web browsers as most people in organizations use the two tools for much of their day-to-day work. Email and web browsers expose employees to untrusted environments, where attackers can use social engineering and&amp;nbsp;malicious code to trick individuals into giving up their company logon credentials and data. Once attackers gain a foothold with user credentials, they can expand to other targets.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Control 09 includes 7 sub-controls or safeguards. They are:&lt;br /&gt;&lt;/span&gt;&lt;blockquote style=&quot;border: medium none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;9.1 Ensure Use of Only Fully Supported Browsers and Email Clients&lt;/span&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: medium none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;9.2 Use DNS Filtering Services&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;9.3 Maintain and Enforce Network-Based URL Filters&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;9.4 Restrict Unnecessary or Unauthorized Browser and Email Client Extensions&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;9.5 Implement Domain-based Message Authentication, Reporting, and Conformance (DMARC)&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;9.6 Block Unnecessary File Types&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;9.7 Deploy and Maintain Email Server Anti-Malware Protections&lt;/span&gt;&lt;/blockquote&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;T&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;he above sub-controls will go a long way to protect your network and users from email and browser related attacks. I&#39;m going to address a few of the controls that would have protected against the phishing attack on the SaaS company.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Using DNS filtering services, control 9.2, protects your network by blocking DNS queries for malicious websites. For example, if an employee opens a phishing email and clicks on a link for a known malicious site, the DNS filtering does not allow the employee&#39;s browser to go to the site as the site&#39;s domain is listed on a block list.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Control 9.3 is similar in that URL filtering is done of websites that contain content that is not approved by a company. Filtering databases are used to classify URLs by content. URLs with appropriate content are approved for access. URLs for inappropriate content are blocked. Those URLs marked as phishing are blocked by an employer. The employee&#39;s browser will be redirected to a page notifying the individual that the URL is blocked. &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Implementing DMARC, control 9.5, would have also helped the SaaS company from being&amp;nbsp;compromised. DMARC and related tools can be used and&amp;nbsp;combined for verifying the authenticity of emails. The tools include Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM).&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;SPF identifies emails that are from trusted sources and those that are from untrusted sources. SPF allows your email administrator to apply rules to untrusted emails, such as block them or mark them as spam. This reduces the&amp;nbsp;likelihood of successful phishing attempts via a company&#39;s email system.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;DKIM helps identify spammers and attackers from spoofing&amp;nbsp;legitimate domains. It&#39;s easy for anyone to change the from field of their emails to&amp;nbsp;make them appear as if they are coming from a different domain. Attackers use this to send phishing attack emails. The email recipient believes the email is from an individual at a company they do business with when, in fact, the email is a phishing attempt. DKIM verifies the identity of the email server sending the email by using digital signatures or the email servers.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;CIS Control 9 and its sub-controls will help protect your company from email and web browser&amp;nbsp;attacks. Implement them to reduce the likelihood of incidents at your&amp;nbsp;organization.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Next month I will discuss Center for Internet Security Control 10 - Malware Defenses. &amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.greghalpin.net/feeds/5264492682522076162/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.greghalpin.net/2022/10/notes-from-field-center-for-internet.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/5264492682522076162'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/5264492682522076162'/><link rel='alternate' type='text/html' href='http://www.greghalpin.net/2022/10/notes-from-field-center-for-internet.html' title='Notes from the Field - Center for Internet Security Control 09 - Email and Web Browser Protections'/><author><name>Greg Halpin</name><uri>http://www.blogger.com/profile/17719118542703009589</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3-t4qOKvt4VAXacR2IW5Cxa1LkMpWAiHeVhAwVAvu78I7MyzoHJkjLlFOITeM-okQwWq9iCwZL8aqvw-95-UaJrfotaoBgl6QmHYFHA1oxn5yQy31sp12ZGTZqWASjA/s220/IMG_4976+copy.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWsdrsNcdMK8gd1WhSxJB7fQ2siJG4dmvLHZMsOf2h0ZhVoYA_6r1WyQTu-UqOFZNcRDwe9ynzJcsjjG4KzaivKjqSWAtPvO09lGANDjUBNHFL8iUN2ReWSZQWvLAg5BuGdQBsLvH7NPz6gTwgxsMnKFXcsPS2iactdS5mFAbtbnUjqJqBfsV12YpRyg/s72-w400-h345-c/IMG_4538-cropped.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6569213714636569218.post-7316387604535255026</id><published>2022-08-28T14:25:00.007-04:00</published><updated>2022-11-12T19:32:59.529-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Alerting"/><category scheme="http://www.blogger.com/atom/ns#" term="Audit"/><category scheme="http://www.blogger.com/atom/ns#" term="Center for Internet Security"/><category scheme="http://www.blogger.com/atom/ns#" term="CIS Controls"/><category scheme="http://www.blogger.com/atom/ns#" term="Logging"/><category scheme="http://www.blogger.com/atom/ns#" term="Logs"/><category scheme="http://www.blogger.com/atom/ns#" term="Security Tools"/><title type='text'>Notes from the Field - Center for Internet Security Control 08 - Audit Log Management</title><content type='html'>&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;During a recent SOC 2 Gap Assessment with a medical billing company, the IT Manager and I discussed the logging and alerting tools the organization had in place. He explained that the company uses the default logging settings and capabilities of the operating systems, applications, and network gear. They didn&#39;t configure any alerts. The IT team reviewed logs when there was a problem but did not conduct regular reviews. I asked the IT Manager&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; caret-color: rgb(68, 68, 68); font-family: arial;&quot;&gt;how he would know if the company network was attacked or if it was already compromised and sensitive patient data was being exfiltrated?&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;background-color: white; caret-color: rgb(68, 68, 68); font-family: arial; font-size: x-small;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;background-color: white; caret-color: rgb(68, 68, 68); font-family: arial;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYTOe_TZUSRq5zlC-a0Q6mOh94eKpoPAE8l37HBhsyT0UJit0yWz3xuXl8cJvDe3Y674ooQlbVZbf6MsexKw_Cg_CtEvBGM2bARvX4rEtw6G8syWpuAYnc56B4nQbD4_XG4OqUZd1lUO06BtHJzmA_ZN8l11lriSKr4ffdkcXXcFdO3rPFzP5nZ1PAYg/s4032/IMG_4976%20copy.png&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;2628&quot; data-original-width=&quot;4032&quot; height=&quot;261&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYTOe_TZUSRq5zlC-a0Q6mOh94eKpoPAE8l37HBhsyT0UJit0yWz3xuXl8cJvDe3Y674ooQlbVZbf6MsexKw_Cg_CtEvBGM2bARvX4rEtw6G8syWpuAYnc56B4nQbD4_XG4OqUZd1lUO06BtHJzmA_ZN8l11lriSKr4ffdkcXXcFdO3rPFzP5nZ1PAYg/w400-h261/IMG_4976%20copy.png&quot; title=&quot;Circles in the Sand at Bandon, Oregon&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;i&gt;Circles in the Sand at Bandon, Oregon&lt;/i&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;span style=&quot;background-color: white; caret-color: rgb(68, 68, 68); font-family: arial;&quot;&gt;The IT Manager paused and shifted in his chair, his face looking perplexed. After a few moments he said it was a good question. The anti-virus logs might turn something up, right?&amp;nbsp;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;No, the anti-virus logs won&#39;t be helpful when an attacker has accounts and access on your systems. The attacker will go undetected. The anti-virus tools also won&#39;t tell you that patient data, including Social Security numbers and copies of driver licenses are stolen by an attacker. An endpoint detection and response tool would show more file access detail and could potentially stop such activity but this company uses traditional anti-virus. &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;As concerning as this type of situation is, it&#39;s a more common scenario than you might expect. Many companies have excellent logging and alerting tools in place. They log everything that is going on in their networks and have staff that can respond to alerts in real time. Other companies have nothing in place. They don&#39;t know about attacks or even technical issues until they occur and are notified by the attackers, customers or end users. There are a lot of reasons for this - lack of funds to invest in such products, limited staff resources, and often a lack of knowledge. T&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;background-color: white; caret-color: rgb(68, 68, 68);&quot;&gt;hat&#39;s when I discussed with the manager the &lt;a href=&quot;https://www.cisecurity.org/controls&quot; target=&quot;_blank&quot;&gt;Center for Internet Security Controls&lt;/a&gt;.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; caret-color: rgb(68, 68, 68); font-family: arial;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;background-color: white; caret-color: rgb(68, 68, 68);&quot;&gt;With good and succinct information the IT Manager can understand what tools will help protect the company&#39;s networks. From there, the manager can make the case to senior management to obtain the resources the company needs to properly protect itself, its customers, and patient data. &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;In this post I discuss the Center for Internet Security Control 08 - Audit Log Management. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;The Center for Internet Security Controls are 18 critical information security controls that all
 organizations and information security professionals should be familiar
 with and implement to protect their networks and data. What&#39;s powerful about the document is that it contains high level information that executives can understand and also has specific details about tools and procedures for technical staff to run with.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;&lt;b&gt;The Overview for Control 08 - Audit Log Management is &lt;/b&gt;- &lt;i&gt;Collect, alert, review, and retain audit logs of events that could help detect, understand, or recover from an attack.&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;Control 08 includes 12 sub-controls or safeguards. They are:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;8.1 Establish and Maintain an Audit Log Management Process&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;8.2 Collect Audit Logs&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;8.3 Ensure Adequate Audit Log Storage&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;8.4 Standardize Time Synchronization&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;8.5 Collect Detailed Audit Logs&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;8.6 Collect DNS Query Audit Logs&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;8.7 Collect URL Request Audit Logs&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;8.8 Collect Command-Line Audit Logs&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;8.9 Centralize Audit Logs&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;8.10 Retain Audit Logs&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;8.11 Conduct Audit Log Reviews&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;8.12 Collect Service Provider Logs &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;&lt;b&gt;Why is this control critical? &lt;/b&gt;Audit logs may be the only method for companies to identify an attack and compromise of their network and systems. Without proper logging and auditing in place, attackers may stay active in and exploit a company network for months or years before they are identified, as was the case with the compromises of SolarWinds and the U.S. Government in 2020. With effective logging tools and log review processes in place, the victim can identify the compromise and take action to block and end the attack. The logs will help determine in a forensic investigation how the attack was carried out, which systems were compromised, and what data the attacker exfiltrated from the organization. &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;As mentioned above, the clients I work with have varied logging capabilities. Some do not do anything specific in regards to logging. I&#39;ve worked with clients whose Windows Event Viewer Security logs on their domain controllers were overwritten after a few hours as a result of using the default retention settings. Those same companies often do&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;not retain firewall logs besides what is stored in the buffer, which is a few hours at most.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span&gt;&lt;span&gt;If
 these companies had a security incident, they could not rely on those logs to help them identify the source or target of an attack. Normally attackers will attempt to delete system and firewall logs to make an investigation
 difficult for a company. In cases like these, the attacker&#39;s work is 
already done for them by the victim&#39;s lack of effort.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;background-color: white; caret-color: rgb(68, 68, 68);&quot;&gt;Conversely, some companies have sophisticated logging and alerting tools that are improperly configured. When I&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;ask them to show me examples of alerts they track, they bring up a dashboard of 1.2 million &quot;critical&quot; entries from the past 24 hours. I ask how they filter out the actual alerts from all the noise. They shrug their shoulders. We discuss how they can narrow in on what alerts are meaningful to them and would indicate an attack or system failure. &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;Successful companies in this area that I&#39;ve worked with have centralized log management tools in place to collect and analyze logs for systems, applications, and network gear. Such tools include Splunk, CloudWatch, the Elk Stack (Elasticsearch and Kibana), Nagios, OpenSearch, FluentD among others. The tools allow IT security teams to create alerts based on logon activity, privileged access, suspicious logins and activity. The tools are flexible to allow teams to focus on what they need for their environments.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;Some c&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;ompanies utilize tools like PagerDuty, which can be configured to require a response to an alert. It texts and emails the on-call person to investigate. It will escalate the alert to others as needed until someone acknowledges the alerts. Critical and specific alerts can automatically be sent to their service desk tool and&amp;nbsp;create a ticket for security operations center staff to triage.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;Whether you work at a large organization with a team reviewing alerts or a one-person shop, you need a minimum level of logging and alerting tools and processes in place to protect your environment. The Center for Internet Security Control 08 - Audit Log Management can help guide you.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;Next month, I&#39;ll discuss&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; caret-color: rgb(68, 68, 68); font-family: arial;&quot;&gt;Center for Internet Security Control 09 - Email and Web Browser Protections.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.greghalpin.net/feeds/7316387604535255026/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.greghalpin.net/2022/08/notes-from-field-center-for-internet.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/7316387604535255026'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/7316387604535255026'/><link rel='alternate' type='text/html' href='http://www.greghalpin.net/2022/08/notes-from-field-center-for-internet.html' title='Notes from the Field - Center for Internet Security Control 08 - Audit Log Management'/><author><name>Greg Halpin</name><uri>http://www.blogger.com/profile/17719118542703009589</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3-t4qOKvt4VAXacR2IW5Cxa1LkMpWAiHeVhAwVAvu78I7MyzoHJkjLlFOITeM-okQwWq9iCwZL8aqvw-95-UaJrfotaoBgl6QmHYFHA1oxn5yQy31sp12ZGTZqWASjA/s220/IMG_4976+copy.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYTOe_TZUSRq5zlC-a0Q6mOh94eKpoPAE8l37HBhsyT0UJit0yWz3xuXl8cJvDe3Y674ooQlbVZbf6MsexKw_Cg_CtEvBGM2bARvX4rEtw6G8syWpuAYnc56B4nQbD4_XG4OqUZd1lUO06BtHJzmA_ZN8l11lriSKr4ffdkcXXcFdO3rPFzP5nZ1PAYg/s72-w400-h261-c/IMG_4976%20copy.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6569213714636569218.post-8266081158989951408</id><published>2022-05-29T15:41:00.001-04:00</published><updated>2022-11-12T16:35:51.112-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Center for Internet Security"/><category scheme="http://www.blogger.com/atom/ns#" term="CIS Controls"/><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerability Management"/><title type='text'>Notes from the Field - Center for Internet Security Control 07 - Continuous Vulnerability Management</title><content type='html'>&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;This is the seventh in&amp;nbsp;&lt;span style=&quot;background-color: white; caret-color: rgb(68, 68, 68);&quot;&gt;a series of posts I&#39;m writing on the&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://www.cisecurity.org/controls&quot; style=&quot;text-decoration: none;&quot; target=&quot;_blank&quot;&gt;Center for Internet Security (CIS) Controls Version 8&lt;/a&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;. The CIS Controls are 18 critical information security controls that all organizations and information security professionals should be familiar with and implement to protect their networks and data. In this post I discuss what I see in my work as an information security auditor with clients regarding Control 07 - Continuous&amp;nbsp;Vulnerability Management.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuUVy2BTMqg15paBHDdgxPkaYQ_7875YItH_ZH4GHCjDiV2TBb2Sz47FqdnTzLYsvQS_bLPxcYqVPjqgD63sBCmPOYmqzehCI5HoBJA2CnWwreqdMWWSBoabka044FQ7lHyo37vab_wFHRgNY4TNCuULt9oeh445-o8X6THHfmq5BD0Cgs3wlqirIOKw/s4032/IMG_2081.jpeg&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;3024&quot; data-original-width=&quot;4032&quot; height=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuUVy2BTMqg15paBHDdgxPkaYQ_7875YItH_ZH4GHCjDiV2TBb2Sz47FqdnTzLYsvQS_bLPxcYqVPjqgD63sBCmPOYmqzehCI5HoBJA2CnWwreqdMWWSBoabka044FQ7lHyo37vab_wFHRgNY4TNCuULt9oeh445-o8X6THHfmq5BD0Cgs3wlqirIOKw/w400-h300/IMG_2081.jpeg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-family: arial; font-size: x-small;&quot;&gt;&lt;i&gt;Acadia National Park with view of Sand Beach&lt;/i&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;The clients I work with vary a great deal in terms of their information security maturity levels. Some have advanced programs with good policies and&amp;nbsp;strong controls in place. Others are just getting started on their information security journey. They don&#39;t know what they need to do or where to go to find out. Vendors attempt to&amp;nbsp;sell them expensive solutions that they don&#39;t understand and do not have enough staff to successfully implement. I recommend my clients start by reading the CIS Controls document. It&#39;s a concise document that executives can understand and&amp;nbsp;information security professionals can run with. &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;&lt;b&gt;The overview for Control 07 - Continuous&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;&lt;b&gt;Vulnerability Management is&lt;/b&gt; &lt;i&gt;-&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;i&gt;Develop a plan to continuously assess and track vulnerabilities on all enterprise assets within the enterprise’s infrastructure, in order to remediate, and minimize, the window of opportunity for attackers. Monitor public and private industry sources for new threat and vulnerability information.&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Control 07 includes seven sub-controls or&amp;nbsp;safeguards, as the CIS Document refers to them. They are:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;7.1&amp;nbsp;Establish and Maintain a Vulnerability Management Process&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;7.2&amp;nbsp;Establish and Maintain a Remediation Process&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;7.3&amp;nbsp;Perform Automated Operating System Patch Management&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;7.4&amp;nbsp;Perform Automated Application Patch Management&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;7.5&amp;nbsp;Perform Automated Vulnerability Scans of Internal Enterprise Assets&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;7.6&amp;nbsp;Perform Automated Vulnerability Scans of Externally-Exposed Enterprise Assets&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;7.7&amp;nbsp;Remediate Detected Vulnerabilities Applications&lt;/span&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;Why is this control critical?&lt;/b&gt; Attackers are&amp;nbsp;continuously scanning corporate networks from the outside, looking for vulnerabilities to exploit. Some of their many goals include compromising those networks to exfiltrate data or install ransomware,&amp;nbsp;both of which can be profitable for them. They generally look for easy targets, companies with insecure practices. Don&#39;t let your company be an easy target.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Information Security teams must continually scan their networks for&amp;nbsp;vulnerabilities to remediate them before attackers find them. Attackers have the same access to vulnerability information that infosec pros do. They also have sophisticated tools to&amp;nbsp;quickly exploit those vulnerabilities. We can&#39;t wait to remediate vulnerabilities until there&#39;s a convenient time. There never is one in the information technology and security fields. We are always juggling many competing priorities. And hackers don&#39;t work from 9 to 5. We must prioritize vulnerability&amp;nbsp;management as the consequences of neglecting it are&amp;nbsp;catastrophic. Companies that are&amp;nbsp;victims of attackers have paid&amp;nbsp;millions of dollars to ransomware gangs. The companies later paid tens or hundreds of millions of dollars to clean up their networks after attacks and pay claims in lawsuits from customers and shareholders.&amp;nbsp;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The clients I work with usually have some type of vulnerability scanning tool in place, such as Nessus, Qualys, Rapid7, OpenVAS - scanning their internal and external networks. Sometimes they scan&amp;nbsp;both the hosts and applications, but usually just the hosts. Unfortunately, the vulnerability scans are often misconfigured, resulting in vulnerabilities that can go unmediated for months or years.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;During a recent gap&amp;nbsp;assessment, the client I worked with had implemented Nessus Professional,&amp;nbsp;which is a paid product. The employee who had set it up months before left the company shortly thereafter. Nevertheless, the information&amp;nbsp;technology team continued to receive the weekly vulnerability scan reports showing that there were no vulnerabilities. In a conference room, the IT manager shared his screen to the large wall monitor and displayed the four most recent reports. None of them listed any vulnerabilities. The manager went back further, still no vulnerabilities. He was proud to show how secure their network was. Maybe...but&amp;nbsp;every time I see vulnerability scans that consistently find no vulnerabilities, I know the scans are not running properly.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;I pointed out that between the time a vulnerability is identified and patched, the scans would have found something over the past several months. We looked a little closer when it became very clear what was going on. The report simply showed open ports on systems. The scan the departed employee had set up was a port scan.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;These types of scan results don&#39;t provide much useful information in identifying vulnerabilities other than listed unsupported operating&amp;nbsp;systems. We discussed the importance of credentialed vulnerability scans. They reconfigured the scans accordingly. When we reviewed the scan results a few hours later, there were pages of vulnerabilities, many several years old. The&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;organization was not as secure as the manager thought but was on its way in the right direction.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Many clients that I&#39;ve worked with have set up scans but are not scanning all of their systems. Or they are scanning systems without entering credentials into the scan configuration, which is necessary to conduct authenticated scans - deep scans in&amp;nbsp;which&amp;nbsp;the scanning tool can identify missing security and application&amp;nbsp;patches as well as registry and configuration vulnerabilities. In one recent case, a client was conducting proper authenticated scans against its production network but not its User Acceptance Testing (UAT) environment. This is common but what was&amp;nbsp;different in this case is that their UAT systems were public facing in which customers tested web applications prior to the company moving the&amp;nbsp;applications into Staging and later into Production. An attacker could potentially compromise the UAT environment and move into the Production&amp;nbsp;environment as they were on the same subnet.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Finally, there are customers that are not scanning their&amp;nbsp;systems at all. They don&#39;t think they need to. They don&#39;t have any public&amp;nbsp;facing&amp;nbsp;systems. Or they do but they believe the data hosted on the servers is data that no one would target. That&#39;s not a good&amp;nbsp;approach to&amp;nbsp;protecting your network. Even if a company only had public data on its websites, a compromise of a web server would cause&amp;nbsp;reputational damage at a minimum. From the web servers, the attackers could make their way to the internal networks where there is more desirable data to be exfiltrated or encrypted for ransom. People often look through a very narrow lens at situations. It&#39;s important to look at the big picture in&amp;nbsp;both life and information security. &amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;All organizations must have a proper vulnerability management program in place. It means implementing automated vulnerability scanning and patch remediation processes. It also means regularly verifying that the automated are configuring and running properly. This is critical to protecting your company and customer data from attackers.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Next month I discuss Center for Internet Security Control 08 - Audit Log Management. &amp;nbsp;&lt;/span&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.greghalpin.net/feeds/8266081158989951408/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.greghalpin.net/2022/06/notes-from-field-center-for-internet.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/8266081158989951408'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/8266081158989951408'/><link rel='alternate' type='text/html' href='http://www.greghalpin.net/2022/06/notes-from-field-center-for-internet.html' title='Notes from the Field - Center for Internet Security Control 07 - Continuous Vulnerability Management'/><author><name>Greg Halpin</name><uri>http://www.blogger.com/profile/17719118542703009589</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3-t4qOKvt4VAXacR2IW5Cxa1LkMpWAiHeVhAwVAvu78I7MyzoHJkjLlFOITeM-okQwWq9iCwZL8aqvw-95-UaJrfotaoBgl6QmHYFHA1oxn5yQy31sp12ZGTZqWASjA/s220/IMG_4976+copy.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuUVy2BTMqg15paBHDdgxPkaYQ_7875YItH_ZH4GHCjDiV2TBb2Sz47FqdnTzLYsvQS_bLPxcYqVPjqgD63sBCmPOYmqzehCI5HoBJA2CnWwreqdMWWSBoabka044FQ7lHyo37vab_wFHRgNY4TNCuULt9oeh445-o8X6THHfmq5BD0Cgs3wlqirIOKw/s72-w400-h300-c/IMG_2081.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6569213714636569218.post-3938573324089784279</id><published>2022-04-30T08:28:00.014-04:00</published><updated>2022-10-09T12:05:15.566-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Access Control"/><category scheme="http://www.blogger.com/atom/ns#" term="Center for Internet Security"/><category scheme="http://www.blogger.com/atom/ns#" term="CIS Controls"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="MFA"/><title type='text'>Notes from the Field - CIS Control 06 - Access Control Management</title><content type='html'>&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;This is the sixth in a series of posts I&#39;m writing regarding what I see in my work as an information security auditor with clients, specifically how they implement the&lt;/span&gt;&lt;span style=&quot;background-color: white; caret-color: rgb(68, 68, 68); font-family: arial;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://www.cisecurity.org/controls&quot; rel=&quot;nofollow&quot; style=&quot;caret-color: rgb(68, 68, 68); font-family: arial; text-decoration: none;&quot;&gt;Center for Internet Security (CIS) Controls&lt;/a&gt;&lt;span style=&quot;background-color: white; caret-color: rgb(68, 68, 68); font-family: arial;&quot;&gt;. The CIS Controls are 18 critical information security controls that all organizations and information security professionals should understand and implement to protect their networks, systems, and data from attackers. In this post I discuss Control 06 - Access Control Management.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;The CIS overview for this&amp;nbsp;control is &lt;/b&gt;- &lt;i&gt;Use processes and tools to create, assign, manage, and revoke access credentials and privileges for user, administrator, and service accounts for enterprise assets and software&lt;/i&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;Control 6 includes 8 sub-controls or safegaurds, as the CIS&amp;nbsp;document refers to them. I listed them below and will discuss some of them.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;blockquote style=&quot;border: medium none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;6.1 Establish an Access Granting Process&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;6.2 Establish an Access Revoking Process&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;6.3 Require MFA for Externally-Exposed Applications&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;6.4 Require MFA for Remote Network Access&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;6.5 Require MFA for Administrative&amp;nbsp;Access&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;6.6 Establish and Maintain Inventory of Authentication and Authorization Systems&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;6.7 Centralize Access Control&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;6.8 Define and Maintain Role-Based&amp;nbsp;Access Control&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; caret-color: rgb(68, 68, 68); font-family: arial;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68); font-family: arial;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;Why is this a critical control?&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Granting higher levels of access than necessary to individuals and systems puts the&amp;nbsp;organization at greater risk of a compromise and data breach. O&lt;/span&gt;rganizations should have standardized and centralized processes for granting, managing, and revoking access based on role.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68); font-family: arial;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;It&#39;s also critical that companies&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68); font-family: arial;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;operate on the principle of least privilege when granting access to data and resources. This means individual accounts, service accounts, processes, systems, etc. are only granted access to resources they need to perform their job&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;responsibilities or functions, no more and no less. Companies I work with are generally pretty good in this area.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;What I often see companies do is grant new hires a default set of applications during the onboarding process. They also grant read access to a shared folder where company policies are located. For example, a person in the finance department would be granted access to different sets of applications and data than a person in the marketing or sales departments. This would be done&amp;nbsp;via access control groups in Active Directory or other Identity Access Management tool. It would be&amp;nbsp;driven by&amp;nbsp;Helpdesk tickets submitted by the human resources team or the hiring manager. IT staff grant the access based on the request.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzkgH1z0cgCJ3aklK4QEIjrqApjM-_3z5K9QBsdE94i8ZbfUrKsowORt9Yr18PQeOWJ5H5onWsae1CLwyvcFixezW4IJJWb1X_ZrVJ0Lp7tVO2sN10h5Y1P_bDBQvR-Vya2nHgMEcGYCfjvIJQtqCjl7slXCcA2PRXZdXZwXC48dbWFc9HBGxdd7toLw/s2048/arborteum-rock-spring.jpeg&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Spring at the Arboretum&quot; border=&quot;0&quot; data-original-height=&quot;1536&quot; data-original-width=&quot;2048&quot; height=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzkgH1z0cgCJ3aklK4QEIjrqApjM-_3z5K9QBsdE94i8ZbfUrKsowORt9Yr18PQeOWJ5H5onWsae1CLwyvcFixezW4IJJWb1X_ZrVJ0Lp7tVO2sN10h5Y1P_bDBQvR-Vya2nHgMEcGYCfjvIJQtqCjl7slXCcA2PRXZdXZwXC48dbWFc9HBGxdd7toLw/w400-h300/arborteum-rock-spring.jpeg&quot; title=&quot;Spring at the Arboretum&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-family: arial; font-size: x-small;&quot;&gt;&lt;i&gt;Spring at the Arboretum at Penn State&lt;/i&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68); font-family: arial;&quot;&gt;I recently completed a gap assessment&amp;nbsp;with a company that is just&amp;nbsp;getting started with their information security program. They thought they were running a pretty tight ship. We discovered otherwise shortly into the engagement. During a review of their Active Directory accounts and security groups, I saw that the IT staff used accounts with Domain Admin privileges as their day-to-day accounts for logging on to their own computer to perform common tasks such as email and browsing the web. I had not seen something like that in a long time as most companies moved away from that a decade or more ago. I pointed out that if an IT staff member fell for a phishing attack, the attacker would not only have access to just any account, it would be an account with Domain Admin privileges. With that account, an attacker would have full access to their domain to do whatever they chose. IT staff need to use a separate account with minimal access for their day-to-day computing activities. They should only use a privileged account when needed.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;Companies generally have good processes in place for revoking&amp;nbsp;access when a person leaves an organization. But it&#39;s also very&amp;nbsp;common for processes to break down in this area. They often use&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68); font-family: arial;&quot;&gt;single sign-on (SSO) for third-party web applications. SSO is integrated with Active Directory or other Identity Provider service. When IT staff or HR disable the former employee&#39;s account, all of their access is removed. &amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;But not all companies have implemented an SSO solution. An average employee may have access to 10 or 20 or more&amp;nbsp;different types of accounts, systems, and web platforms. The people who are notified to create an account for a person are not always notified to disable access &amp;nbsp;when a person is&amp;nbsp;terminated. It&#39;s&amp;nbsp;important that all accounts be inventoried so HR and IT staff and others responsible know which accounts to disable when a person separates from a company. HR and IT staff members can use checklists via&amp;nbsp;Helpdesk tickets to track that all accounts are disabled.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;As per Control 6, I always recommend organizations require multi-factor authentication (MFA) for&amp;nbsp;privileged account usage. Anytime someone with Domain Admin or other high privileges logs on to a system or attempts to perform administrative functions, the person should be prompted for a second factor of authentication. That way if a privileged account is compromised, the attacker still needs the second factor of authentication to use it. That is a bigger challenge for an attacker. Attackers are much more likely to target organizations where MFA is not in place.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;When I reviewed a recent client&#39;s VPN setup, AWS, and cloud environments, MFA&amp;nbsp;was not required for regular user or privileged accounts. I asked them to imagine the damage an attacker could do to their company and its reputation if the attacker obtained&amp;nbsp;control of its internal or AWS environment. The attacker could exfiltrate data and worse - make public sensitive customer data or sell it on the dark web. The attacker could delete all of the EC2 instances, resources, and applications in AWS. What damage could attackers do if they phished the CEO&#39;s Outlook 365 account? The IT staff began to see the risk to their company. &lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;Related to control 6.8, I always recommend to clients that they perform monthly or quarterly reviews of their accounts and access levels. This is important because no one or process is perfect.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68); font-family: arial;&quot;&gt;Life happens.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68); font-family: arial;&quot;&gt;Sometimes important tasks are missed. Automation fails. A person may leave a company right before a holiday weekend, when some key staff who manage accounts are out of the office, getting an early start on the holiday. Some web&amp;nbsp;platform accounts of a terminated individual may continue to be enabled after the person departs a company. They could freely access those accounts over the internet at any time. Unfortunately, no one discovers this data is exfiltrated or deleted, by the former employee or an attacker taking advantage of a dormant account. &lt;/span&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68); font-family: arial;&quot;&gt;Perhaps an employee moves from one department to another. Yet the individual still has access to sensitive data and resources in their previous department, for which they no longer have a need. The monthly or quarterly reviews catch these errors.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;Next month, I&#39;ll discuss Center for Internet Security Control 07 - Continuous&amp;nbsp;Vulnerability Management. &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.greghalpin.net/feeds/3938573324089784279/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.greghalpin.net/2022/04/notes-from-field-cis-control-06-access.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/3938573324089784279'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/3938573324089784279'/><link rel='alternate' type='text/html' href='http://www.greghalpin.net/2022/04/notes-from-field-cis-control-06-access.html' title='Notes from the Field - CIS Control 06 - Access Control Management'/><author><name>Greg Halpin</name><uri>http://www.blogger.com/profile/17719118542703009589</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3-t4qOKvt4VAXacR2IW5Cxa1LkMpWAiHeVhAwVAvu78I7MyzoHJkjLlFOITeM-okQwWq9iCwZL8aqvw-95-UaJrfotaoBgl6QmHYFHA1oxn5yQy31sp12ZGTZqWASjA/s220/IMG_4976+copy.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzkgH1z0cgCJ3aklK4QEIjrqApjM-_3z5K9QBsdE94i8ZbfUrKsowORt9Yr18PQeOWJ5H5onWsae1CLwyvcFixezW4IJJWb1X_ZrVJ0Lp7tVO2sN10h5Y1P_bDBQvR-Vya2nHgMEcGYCfjvIJQtqCjl7slXCcA2PRXZdXZwXC48dbWFc9HBGxdd7toLw/s72-w400-h300-c/arborteum-rock-spring.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6569213714636569218.post-288817346698858709</id><published>2022-03-27T15:47:00.006-04:00</published><updated>2022-08-29T11:45:53.392-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Access Control"/><category scheme="http://www.blogger.com/atom/ns#" term="Account Management"/><category scheme="http://www.blogger.com/atom/ns#" term="Account Reviews"/><category scheme="http://www.blogger.com/atom/ns#" term="Center for Internet Security"/><category scheme="http://www.blogger.com/atom/ns#" term="CIS Controls"/><title type='text'>Notes from the Field - CIS Control 5 - Account Management</title><content type='html'>&lt;p&gt;&lt;span style=&quot;background-color: white; caret-color: rgb(68, 68, 68);&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;This is the fifth in a series of posts on the &lt;a href=&quot;https://www.cisecurity.org/controls&quot; rel=&quot;nofollow&quot;&gt;Center for Internet Security (CIS) Controls&lt;/a&gt; Version 8, which was released in May of 2021. The CIS Controls are 18 critical information security controls that all organizations and information security professionals should understand and implement to protect their networks from attackers. In this post I discuss what I see in my work with clients in regards to Control 05 - Account Management.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;The CIS overview for this&amp;nbsp;control is -&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;i&gt;Use processes and tools to assign and manage authorization to credentials for user accounts, including administrator accounts, as well as service accounts, to enterprise assets and software&lt;/i&gt;.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhldvxhuce-Hrv3r0BrGfF3SFuRCK9TeqID8cgyGQ9Fg4rzhqxM-MEPzak11em7ikBzj2bJSQOvaSwVjINE0mxO6dM5qNlL7eG5fesBuQ6iOEU6tC8PiMapH43Pw3LCO_F9_eLj5UFIjfbFDuruijaZlSnfHBlhpaHKnaqhb6mrhCWtEnd05Ep0cCHedw/s3264/IMG_3370.jpeg&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;2448&quot; data-original-width=&quot;3264&quot; height=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhldvxhuce-Hrv3r0BrGfF3SFuRCK9TeqID8cgyGQ9Fg4rzhqxM-MEPzak11em7ikBzj2bJSQOvaSwVjINE0mxO6dM5qNlL7eG5fesBuQ6iOEU6tC8PiMapH43Pw3LCO_F9_eLj5UFIjfbFDuruijaZlSnfHBlhpaHKnaqhb6mrhCWtEnd05Ep0cCHedw/w400-h300/IMG_3370.jpeg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Penn State&#39;s Old Main Building in March&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;span style=&quot;background-color: white; caret-color: rgb(68, 68, 68);&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;caret-color: rgb(0, 0, 0);&quot;&gt;The CIS Controls document states this control is critical as attackers can gain access to your organization&#39;s network and systems by using valid user&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;credentials on those systems. Attackers seek to obtain credentials of accounts with weak passwords or for accounts of former employees that have not been disabled. The attackers may obtain passwords from shared accounts or service accounts with passwords that have not been changed in years. These credentials can be obtained in a number of ways, such as social engineering, found in scripts or documentation stored in cloud storage that was&amp;nbsp;inadvertently made&amp;nbsp;publicly available. Administrator and other&amp;nbsp;privileged accounts are particularly valuable to attackers.&amp;nbsp;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The CIS Controls document states that credentials should be treated like company assets, which you should inventory and track. It&#39;s necessary to do periodic account reviews:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Disable accounts that are inactive for more than 45 days&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Review new accounts to verify they were properly authorized&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Verify group memberships and privileges are still appropriate, particularly for administrators and those who have changed positions&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;An employee&amp;nbsp;with administrative privileges should use a separate account to perform those&amp;nbsp;privileges. They should not use a&amp;nbsp;privileged account for ordinary tasks such as using email and web browsers. That reduces the chances of a privileged account being compromised by a phishing or other attack.&amp;nbsp;&lt;br /&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The CIS Controls document also recommends the use of a Single Sign-On solution to reduce the number of accounts and passwords&amp;nbsp;individuals must maintain as people are more likely to write their passwords down or maintain a file of them if they have too many to remember. The use of&amp;nbsp;multi-factor&amp;nbsp;authentication (MFA) is also recommended in&amp;nbsp;support of account management. MFA makes it more difficult for attackers to compromise accounts as they must compromise at least two methods of authentication instead of just one.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;In my work with clients&amp;nbsp;Account Management is an area where companies generally take care of the basics, such as disabling accounts of former employees. But that&#39;s about it. Most IT staff and cloud administrators are so busy&amp;nbsp;with their day-to-day duties that they often think that is enough they can squeeze in with all of their other pressing matters. Or they simply are not sure what else they should do for secure account management.&amp;nbsp;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;I recently conducted a SOC 2 Gap Assessment with a company of about 250 employees with a physical headquarters where the majority of staff worked until the pandemic began. About half of the staff continue working remotely. They have a small cloud environment in Amazon Web Services (AWS) that hosts a web application. They also have some&amp;nbsp;physical and virtual servers at their headquarters server room that run Active Directory, VMware, and many application and file servers.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;I had them&amp;nbsp;walk me through their AWS environment, beginning with the Identity Access Management (IAM) console. They had proper controls in place. There were just a few accounts. All had long and complex passwords. MFA was enabled for all. Only the accounts necessary for administrative tasks had those privileges and assigned policies. Other accounts had fewer privileges for specific tasks. We looked at the login history in CloudTrail. They also had alerts set up for IAM logins. They set it up properly. I have worked with clients that had weak passwords and MFA was not required for their AWS environments. That leaves just one level of authentication protecting a company&#39;s cloud systems from compromise or intentional deletion by an attacker.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Things got more interesting when we reviewed the accounts for their public-facing web application, which is hosted on their AWS Linux instances. The company staff developed the application themselves. The lead developer showed me the administrative interface and the database, which stored the application accounts and passwords. He showed me the list of administrators of the system. It was limited to a group of developers and IT staff.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Customer support staff also had the ability to reset passwords of customers, which was part of their role in helping customers.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;After a review of the accounts against the active employee list, I identified five active accounts of people who were no longer with the company. They could potentially still be logging on and performing administrative tasks, resetting passwords of customer accounts or stealing customer data. Is that something they considered before?&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;After discussion about this and bringing in the development manager it was determined that the person responsible for disabling accounts left the company the previous year and no one was assigned that responsibility since.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;We ran into more problems with the web application. Multi-factor&amp;nbsp;authentication was not required for the administrators, customer support staff or customers. Nor did the web application require passwords to be changed.&amp;nbsp;That&#39;s common for customers but not for employees. I asked to see password requirements. They were not listed in the administrative console. The developer said they were written into the code from an Open Source library but was not familiar with that code module and couldn&#39;t verify complex passwords were used.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Fortunately for me, anyone could create their own account on this public-facing web application. I decided to do that with them present so we could walk through the process together. I created an account and set my password. I was able to set a simple password of Password123. The&amp;nbsp;developer, manager, and IT Director were unhappily surprised by this. I was actually surprised myself as this is such a basic control to put in place that I rarely see it. Hackers could easily target accounts and try common passwords to gain access. From there, an attacker could attempt to escalate privileges. Why hadn&#39;t they required complex passwords?&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;It turned out the code for the application had the functionality to require complex passwords and MFA but they never enabled it. It was planned but got lost in the shuffle of&amp;nbsp;additional requirements&amp;nbsp;and&amp;nbsp;features. And they were short staffed. Ever since the pandemic began and remote work became more common, company developers were being poached by recruiters faster than they could hire and train them.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;I recommended that MFA be required for all company employees for all remote access, web applications, and cloud services. The application stored sensitive data which led me to recommend that MFA be at least made optional to customers if not required. Granted, MFA is more challenging for&amp;nbsp;customers who may not have a second means of authentication or may simply not want to use one.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;We moved on to their Windows Active Directory Users and Computers console for their headquarters domain. I had them bring up the Domain Admins&#39; security group. The IT staff consisted of four people but this group contained 21 accounts, many of which were disabled. Based on the account names, others were clearly service accounts for the backup software, anti-malware system, among others. I asked the IT Director and Systems Administrator why the accounts were still in the Domain Admins groups. They didn&#39;t have a good reason. They figured the accounts were disabled and that was enough. I recommended they remove the accounts from the group and delete them.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Accounts aren&#39;t books or old photos that we keep around for years. They have to go when they are no longer needed.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;We continued on with the other accounts. There were several test accounts still enabled that hadn&#39;t&amp;nbsp;been used in years. They had to be disabled. If they weren&#39;t going to be used in the next three months, they should be deleted. I advised them to review all of the service accounts. Do they really need Domain Admin privileges? Most likely not. They may need administrator privileges on specific servers where they are used. But don&#39;t give service accounts more privileges than they need. Attackers will target those. Those accounts, as well as dormant test accounts with privileges, provide perfect cover for hackers. We went&amp;nbsp;through the Enterprise Admins, Schema Admins groups as well as some custom&amp;nbsp;administrative groups they use. Again,&amp;nbsp;there were many accounts in them that did not need to be in them.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;We then looked at regular domain accounts. As mentioned above, the company has 250 employees. You can imagine my surprise when Active Directory had an Organizational Unit of 1400 disabled accounts of former employees going back 20 years. Again, I asked the IT Director and Systems Administrator why they&amp;nbsp;kept all of these accounts of terminated employees? They mentioned a practice that was popular for several years when Active Directory was released and still new. The idea was that the IT staff would disable accounts of terminated staff but keep the account in case the person someday returns to the company. That way, IT staff wouldn&#39;t have to go through all of the trouble to create a new account and add the account to groups. The person&#39;s&amp;nbsp;account would still have all of the group memberships from when they previously worked for the&amp;nbsp;company. The account GUID would be the same so that they could access files that had been granted permissions specifically to their account. A new account wouldn&#39;t have the same GUID or access to the old files. This practice, I&amp;nbsp;remember, was even documented in the Microsoft certification books as a convenient method of saving time and being efficient. Opinions about this have very much changed since then. Now we stress security over&amp;nbsp;convenience as convenience often to companies being&amp;nbsp;compromised.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;I advised the IT Director and Systems Administrator to delete accounts of former employees after they had been inactive for 45 days. It does not make sense to have five times more inactive accounts than active accounts. That&#39;s too many&amp;nbsp;opportunities for attackers to use&amp;nbsp;existing accounts and sneak under the radar. Even if a former employee returned to the&amp;nbsp;company, the individual may have a different role from their previous one and need different group memberships to access different resources. They mentioned the person may need access to old files that were assigned to their old GUID. That&#39;s another practice they should stop. They should assign data access to groups for better administration.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;They were uncomfortable with deleting accounts of former employees as they had both been with the company for 15 years or more as that&#39;s just the way they did things. It was a big change for them. I asked them how they would know if someone, perhaps an IT person who was leaving the company, reset the password of one of the terminated accounts and enabled it. What if a&amp;nbsp;disgruntled IT staff member reset the password of one of the unused test accounts that had Domain Admin&amp;nbsp;privileges so that they could use it after they left the company? Did they have any monitoring of accounts in place to identify such changes? No, they didn&#39;t. They could potentially review the security logs but they were not in the practice of doing so.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;We then discussed ongoing reviews of accounts and privileges. They didn&#39;t have any processes in place. I recommended they:&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Conduct quarterly reviews of accounts and access privileges for all users and systems, including directory services, custom web applications, and other access systems and tools the company uses&amp;nbsp;&lt;/li&gt;&lt;li&gt;Delete or disable inactive accounts after 45 days&lt;/li&gt;&lt;li&gt;Verify account privileges are accurate for active user accounts, noting that changes in job roles of employees may require changes in system privileges&lt;/li&gt;&lt;li&gt;Document the quarterly reviews in help desk tool or other tool, noting all account and privilege changes&lt;/li&gt;&lt;li&gt;Research and implement a tool, such as a SIEM or Netwrix, to monitor account changes with email alerts for accounts with Domain Admin and other privileged accounts.&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;Why the discrepancies with how the AWS environment was managed and how Active Directory and the web application accounts were managed? The person who set up and managed the AWS environment was newer to the company and had previously worked at a company where they followed&amp;nbsp;specific policies and practices. The AWS administrator continued the practices with this&amp;nbsp;company. The managers and staff responsible for Active Directory had administered Active Directory based on what they thought were good practices. They didn&#39;t follow a policy or have documented practices. They did what they always did. The&amp;nbsp;application developers also didn&#39;t have specific guidance on what they should do. I advised them to develop a policy that aligned&amp;nbsp;with CIS Control 5 and implement the controls.&lt;/span&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;background-color: white; caret-color: rgb(68, 68, 68);&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Next month I&#39;ll discuss the Center for Internet Security Control 06 - Access Control Management.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.greghalpin.net/feeds/288817346698858709/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.greghalpin.net/2022/03/notes-from-field-cis-control-5-account.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/288817346698858709'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/288817346698858709'/><link rel='alternate' type='text/html' href='http://www.greghalpin.net/2022/03/notes-from-field-cis-control-5-account.html' title='Notes from the Field - CIS Control 5 - Account Management'/><author><name>Greg Halpin</name><uri>http://www.blogger.com/profile/17719118542703009589</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3-t4qOKvt4VAXacR2IW5Cxa1LkMpWAiHeVhAwVAvu78I7MyzoHJkjLlFOITeM-okQwWq9iCwZL8aqvw-95-UaJrfotaoBgl6QmHYFHA1oxn5yQy31sp12ZGTZqWASjA/s220/IMG_4976+copy.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhldvxhuce-Hrv3r0BrGfF3SFuRCK9TeqID8cgyGQ9Fg4rzhqxM-MEPzak11em7ikBzj2bJSQOvaSwVjINE0mxO6dM5qNlL7eG5fesBuQ6iOEU6tC8PiMapH43Pw3LCO_F9_eLj5UFIjfbFDuruijaZlSnfHBlhpaHKnaqhb6mrhCWtEnd05Ep0cCHedw/s72-w400-h300-c/IMG_3370.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6569213714636569218.post-3425511639621917548</id><published>2022-02-27T13:25:00.010-05:00</published><updated>2022-06-27T21:28:40.240-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CIS"/><category scheme="http://www.blogger.com/atom/ns#" term="CIS Benchmarks"/><category scheme="http://www.blogger.com/atom/ns#" term="CIS Controls"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="STIG"/><title type='text'>Notes from the Field - CIS Control 04 - Secure Configuration of Enterprise Assets and Software</title><content type='html'>&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;This is the fourth in a series of posts I&#39;m writing on the &lt;a href=&quot;https://www.cisecurity.org/controls&quot; target=&quot;_blank&quot;&gt;Center for Internet Security (CIS) Controls Version 8&lt;/a&gt;. The CIS Controls are 18 information security controls that all organizations and information security professionals should be familiar with and implement to protect their networks and data from attackers. In this post I discuss what I see in my work as an information security auditor with clients regarding Control 04 - Secure Configuration of Enterprise Assets and Software.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;The CIS overview for Secure Configuration of Enterprise Assets and Software is&lt;/b&gt; -&amp;nbsp;&lt;i&gt;Establish and maintain the secure configuration of enterprise assets (end-user devices, including portable and mobile; network devices; non-computing/IoT devices; and servers) and software (operating systems and applications).&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;Why is this a critical control? &lt;/b&gt;The CIS Controls document states this control is critical as systems and software are designed for ease of use and deployment, not for security. Default system and software configurations are generally insecure. Attackers can exploit systems and software that have default user accounts and passwords, default protocols, other insecure settings. The security settings and configurations need to be maintained over the life of the system or software. Changes to configurations need to be tracked for compliance purposes.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The document includes consideration of services providers as they may implement looser controls to support their many customers.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The CIS Controls document lists security configuration checklists that systems administrators and&amp;nbsp;security professionals can use to secure their systems, such as the &lt;a href=&quot;https://ncp.nist.gov/repository&quot; target=&quot;_blank&quot;&gt;NIST National Checklist Program&lt;/a&gt; and the &lt;a href=&quot;http://www.cisecurity.org/cis-benchmarks/&quot; target=&quot;_blank&quot;&gt;CIS Benchmarks Program&lt;/a&gt;. It then lists 11 steps for developing secure baselines. The document lists a number of safeguards or sub-controls in support of this control. They include:&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Establish and Maintain a Secure Configuration Process&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Configure Automatic Session Locking on Enterprise Assets&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Implement and Manage a Firewall on Servers&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Manage Default Accounts on Enterprise Assets and Software&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Uninstall or Disable Unnecessary Services on Enterprise Assets and Software&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Configure Trusted DNS Servers on Enterprise Assets&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Enforce Automatic Device Lockout on Portable End-User Devices&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEgvv2r0fVDHCr9r6Kbxmv_Sj42DVQrqdWWx8JN29jzL_TRElUspt2OuP2HaBdla1jUaERHGy-HfhR-H1df3JFzbFphmSsugULCiYinbMS7XDin9DnkQdV_4z2kWnLdgZ3479vzttFPKFJsvIIEADU4nx9Mth5Cj4Bs2NgkvEW8fkrYtjdc-jy8vtEjQyQ=s2048&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Penn State Law Building Framed By the Arch at the Arboretum&quot; border=&quot;0&quot; data-original-height=&quot;1536&quot; data-original-width=&quot;2048&quot; height=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEgvv2r0fVDHCr9r6Kbxmv_Sj42DVQrqdWWx8JN29jzL_TRElUspt2OuP2HaBdla1jUaERHGy-HfhR-H1df3JFzbFphmSsugULCiYinbMS7XDin9DnkQdV_4z2kWnLdgZ3479vzttFPKFJsvIIEADU4nx9Mth5Cj4Bs2NgkvEW8fkrYtjdc-jy8vtEjQyQ=w400-h300&quot; title=&quot;Penn State Law Building Framed By the Arch at the Arboretum&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Penn State Law Building, Framed by the Arch at the Arboretum&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;In my work as an information security auditor, I see some clients doing very good work in this area. They have detailed security configurations for their operating systems, software, and network devices. Others are not as diligent. On a recent gap analysis engagement with a client that provides a web application explained how they secure their servers. They install the latest security patches, install anti-virus software, and change the administrator password. They also enable the firewall on their servers. I asked if they do anything beyond that. Unfortunately, they do not. &lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Let&#39;s face it, that does not qualify as actually securing a system. I asked the company&#39;s information security manager if he would feel confident using a vendor which had such minimal controls in place. He grimaced for a few seconds and finally said no. He expects much more. Just as his company&#39;s customers expect more from him and the information security team to secure their data.&amp;nbsp; &lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;I discussed how other companies have much more rigorous controls. They may have a checklist of 20 or 30 security settings they change. Still others implement hundreds of individual security settings from &lt;a href=&quot;https://public.cyber.mil/stigs/&quot; target=&quot;_blank&quot;&gt;Security Technical Implementation Guides&lt;/a&gt; (STIGs) or the &lt;a href=&quot;https://www.cisecurity.org/cis-benchmarks/&quot; target=&quot;_blank&quot;&gt;CIS Benchmarks&lt;/a&gt; for operating systems, software, and network devices. Normally implementing this number of controls is done via scripts or Group Policy. There are also tools that can verify systems always maintain the desired configuration. For Linux systems, clients often use Chef or Puppet. In AWS they may use Terraform to deploy and maintain secure configurations. In support of securing their systems, organizations run vulnerability scans to further identify weaknesses and take appropriate action. &amp;nbsp; &lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;With a background in a Department of Defense environment, I have spent a lot of time implementing controls from STIGs and the CIS Benchmarks for Windows, Linux, and VMware. I highly recommend the CIS Benchmarks to clients to review and implement. The CIS produces the benchmarks for many operating systems, network devices, software, and the cloud environments.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The PDF document that lists the controls for Windows 2019 Server, for example, is over 900 pages long. It gets into every detail of securing a Windows Server. The benchmark for Amazon Linux 2 is almost 400 pages long. The benchmarks can help guide the way to securing systems for information technology&amp;nbsp;professionals that don&#39;t know where to begin regarding properly secure their organization&#39;s systems. Securely configuring enterprise assets and software also demonstrates a level of due diligence in support of protecting your company&#39;s and customers data and systems.&amp;nbsp; &lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Next month, I&#39;ll discuss the Center for Internet Security Control 5 - Account Management.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.greghalpin.net/feeds/3425511639621917548/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.greghalpin.net/2022/02/notes-from-field-cis-control-04-secure.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/3425511639621917548'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/3425511639621917548'/><link rel='alternate' type='text/html' href='http://www.greghalpin.net/2022/02/notes-from-field-cis-control-04-secure.html' title='Notes from the Field - CIS Control 04 - Secure Configuration of Enterprise Assets and Software'/><author><name>Greg Halpin</name><uri>http://www.blogger.com/profile/17719118542703009589</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3-t4qOKvt4VAXacR2IW5Cxa1LkMpWAiHeVhAwVAvu78I7MyzoHJkjLlFOITeM-okQwWq9iCwZL8aqvw-95-UaJrfotaoBgl6QmHYFHA1oxn5yQy31sp12ZGTZqWASjA/s220/IMG_4976+copy.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/a/AVvXsEgvv2r0fVDHCr9r6Kbxmv_Sj42DVQrqdWWx8JN29jzL_TRElUspt2OuP2HaBdla1jUaERHGy-HfhR-H1df3JFzbFphmSsugULCiYinbMS7XDin9DnkQdV_4z2kWnLdgZ3479vzttFPKFJsvIIEADU4nx9Mth5Cj4Bs2NgkvEW8fkrYtjdc-jy8vtEjQyQ=s72-w400-h300-c" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6569213714636569218.post-3625819162764818947</id><published>2022-01-22T11:26:00.010-05:00</published><updated>2022-06-13T09:45:41.107-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CIS Controls"/><category scheme="http://www.blogger.com/atom/ns#" term="Data Loss Protection"/><category scheme="http://www.blogger.com/atom/ns#" term="Data Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Encryption"/><title type='text'>Notes from the Field - CIS Control 03 - Data Protection</title><content type='html'>&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;This is the third in a series of posts I&#39;m writing on the &lt;a href=&quot;https://www.cisecurity.org/controls&quot; target=&quot;_blank&quot;&gt;Center for Internet Security (CIS) Controls Version 8&lt;/a&gt;. The CIS Controls are 18 information security controls that all organizations and information security professionals should be familiar with and implement to protect their networks from attackers. In this post I discuss what I see in my work as an information security auditor with clients regarding to Control 03 - Data Protection.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;The CIS overview for Data Protection is -&lt;/b&gt; &lt;i&gt;Develop processes and technical controls to identify, classify, securely handle, retain, and dispose of data&lt;/i&gt;.&lt;/span&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEjoC2KVC4Bhb_9wPK_RjTPTiE2LC0oAQWd7E4b_REAWMPnLbZ0Q9tDFrYvP6q1-Q5uZzmjtrRYU1WGiuh2IQIGBYTBFXYfEMIJ_gaThxTdDicUIB7kbird_XbAw7VM1nMSFibE_pYOfR49e8rBZ4Y53Em6pGduoa7-lIfDmMZusCDoxtqYecAggpGpO3Q=s4032&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Sunset at Montana State University&quot; border=&quot;0&quot; data-original-height=&quot;3024&quot; data-original-width=&quot;4032&quot; height=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEjoC2KVC4Bhb_9wPK_RjTPTiE2LC0oAQWd7E4b_REAWMPnLbZ0Q9tDFrYvP6q1-Q5uZzmjtrRYU1WGiuh2IQIGBYTBFXYfEMIJ_gaThxTdDicUIB7kbird_XbAw7VM1nMSFibE_pYOfR49e8rBZ4Y53Em6pGduoa7-lIfDmMZusCDoxtqYecAggpGpO3Q=w400-h300&quot; title=&quot;Sunset at Montana State University&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Sunset at Montana State University Billings&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;b&gt;Why is this control critical?&lt;/b&gt;&amp;nbsp;A breach of company or customer data would cause reputational harm to the organization and potentially result in lost business and costly lawsuits. There are also governmental and industry requirements for protecting data. Failure to meet the requirements could result in fines from various governments or an industry group. Protecting data is more challenging than ever as data is stored in many locations - on-premises and a seemingly endless number of cloud services. Data may be shared with various service providers in support of a company&#39;s services. Fortunately, many tools in support of protecting data are now available, easier to implement and less expensive than in previous years.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The CIS Controls document states that attackers will find and exfiltrate data after they penetrate a company&#39;s systems. Your goal is to prevent that from happening. The document lists 14 sub-controls or safeguards in support of data protection. They are:&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;3.1 Establish and Maintain a Data Management Process&lt;/span&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;3.2 Establish and Maintain a Data Inventory&lt;/span&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;3.3 Configure Data Access Control Lists&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;3.4 Enforce Data Retention&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;3.5 Securely Dispose of Data&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;3.6 Encrypt Data on End-User Devices&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;3.7 Establish and Maintain a Data Classification Scheme&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;3.8 Document Data Flows&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;3.9 Encrypt Data on Removable Media&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;3.10 Encrypt Sensitive Data in Transit&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;3.11 Encrypt Sensitive Data at Rest&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;3.12 Segment Data Processing and Storage Based on Sensitivity &lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;3.13 Deploy a Data Loss Prevention Solution&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;3.14 Log Sensitive Data Access&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;When I work with clients, the senior executives, including the Information Technology Director or the Chief Information Security (CISO), sometimes don&#39;t have a full understanding of their own networks, systems, and data. They may be new in the position or dealing with high level priorities, like long-term strategy and budgets. They are not always in the technical and security weeds with a true feel for what goes on in their environments. They trust their subordinates are staying on top of things. As the systems and cloud administrators discuss where data is stored and how it is protected, the IT Director or CISO might say they had no idea the company collected credit card numbers or Social Security numbers...let alone stored them unencrypted. They thought those data fields were deleted after processing or encrypted or tokenized in cases where that type of data was collected. They become concerned the company has poor controls and processes in place to protect the data.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Data classification is listed as a control so that companies can determine the sensitivity of data and protect it accordingly. Larger companies generally do a better job of this, from what I&#39;ve encountered. Smaller companies find it easier to protect all of their non-public data the same way as they don&#39;t have the staffing resources or tools to do much else.&amp;nbsp; &lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;One of the most basic things a company must do is properly restrict access to data via access controls as well as log access to data. Companies usually&amp;nbsp;implement this well but occasionally I&#39;ll find that customers have share drives that contain&amp;nbsp;sensitive information are open to all staff or more staff than&amp;nbsp;have a need for access. In one case, a company&#39;s Human Resources share was not restricted. All of the employees&#39; job offer letters with salary information was available. On-boarding documents, such as I-9 forms with Social Security numbers and copies of drivers&#39; licenses were accessible to anyone in the company who happened to know how to access the share. In another case, the company&#39;s code repositories were configured to allow any of the thousands of employees in the company to access, change, and delete the code. In cloud environments, I find that customers sometimes misconfigure their AWS buckets so they are available to the public or are not encrypted. Again, the IT Directors and CISOs are taken aback when they see that organization data is not properly protected. They don&#39;t know about the data so they can&#39;t protect it.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;In a recent gap analysis, the client I worked with provided services to hospitals and medical practices. They collected Social Security numbers via a web application. The SSNs were encrypted in the database but the SSN field for each patient was available to all customer support staff every time they looked at a patient record. This is not the usual practice. Most companies mask the first five digits with only the last four digits viewable. Or they may mask the entire SSN. They make the full SSN available only when the staff member clicks on a button to do so...and only if they been granted the need to know. Additionally, they may also need to authenticate again to reveal the full number. &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;A
 tool that can help you understand your data environment and security needs better is a data flow diagram, as the CIS Controls document
 
recommends. A data flow diagram is a visual representation of how data 
flow into and out of an organization&#39;s infrastructure, where it&#39;s stored
 on company systems, cloud providers, as well as shared with and received back 
from service providers.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;It&#39;s also very important to establish a data lifecycle - Create, Store, Use, Share, Archive, Destroy. It costs money to store and protect data you don&#39;t need. It also opens your company up to legal liability. In the event of a data breach and public release of sensitive information, you will have a difficult time explaining why you stored&amp;nbsp;data of a customer who stopped using your service 10 years ago. The company may be in violation of regulations and be liable to fines or lawsuits. I see this a lot with customers. They save data forever as they did not plan for data deletion when they designed their applications and databases. They were focused on getting a functional web application to customers as quickly as possible. They don&#39;t know how to redesign their collection and storage of the data.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Fortunately, there are tools available when data management is planned from the onset. Administrators can run tasks on databases to archive or delete data once it ages past the retention policy. AWS bucket policies can be configured to send inactive and old data to Glacier. It can then be automatically deleted after a specified number of months or years. Microsoft Outlook 365 has data retention policies that can be implemented. Generally, companies don&#39;t take advantage of these tools because they are short-staffed. The employees have little if any time to implement such features as they struggle with their main priority to maintain their services for customers. Companies with dedicated IT security or compliance departments are generally more successful in this area.&amp;nbsp; &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Some controls that clients often have in place that I&#39;ll highlight are:&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Encryption of data at rest - Most companies I work with are generally diligent about encrypting their data or use tools and services that make encryption the default option. They encrypt drive volumes and databases in AWS and Azure. They encrypt Windows drives with BitLocker, macOS drives with FileVault, and Linux drives with LUKS. &amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Encryption of data in transit - Companies use the currently supported version of TLS to encrypt data in transit between web&amp;nbsp;applications and end&amp;nbsp;users. They use STFP/SSH for file transfers. VPNs are established between on-premises locations and cloud services. Laptops users are required to use a VPN client to protect their traffic from interception when using public WiFi networks.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Data Loss Prevention - Many tools now exist to prevent data exfiltration that were expensive and difficult to implement in the past. Some companies I&#39;ve worked with have policies and tools in place that monitor and limit the number of files a person may&amp;nbsp;email outside the organization or upload to a cloud service. Some companies even prevent any and all copying and pasting of data from email or Office 365 products to a non-company&amp;nbsp;managed products and systems. DLP tools can prevent copying of files to USB drives. Firewalls can report on the amount of data a particular user is uploading to online storage services.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Most companies have an incident response plan and steps in place to respond to a data breach. Some IT security teams conduct quarterly testing of their response plan so they are prepared when a data breach occurs.&amp;nbsp; &amp;nbsp; &lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Next month, I&#39;ll discuss the Center for Internet Security Control 04 - Secure Configuration of Enterprise Assets and Software.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.greghalpin.net/feeds/3625819162764818947/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.greghalpin.net/2022/01/notes-from-field-cis-control-03-data.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/3625819162764818947'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/3625819162764818947'/><link rel='alternate' type='text/html' href='http://www.greghalpin.net/2022/01/notes-from-field-cis-control-03-data.html' title='Notes from the Field - CIS Control 03 - Data Protection'/><author><name>Greg Halpin</name><uri>http://www.blogger.com/profile/17719118542703009589</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3-t4qOKvt4VAXacR2IW5Cxa1LkMpWAiHeVhAwVAvu78I7MyzoHJkjLlFOITeM-okQwWq9iCwZL8aqvw-95-UaJrfotaoBgl6QmHYFHA1oxn5yQy31sp12ZGTZqWASjA/s220/IMG_4976+copy.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/a/AVvXsEjoC2KVC4Bhb_9wPK_RjTPTiE2LC0oAQWd7E4b_REAWMPnLbZ0Q9tDFrYvP6q1-Q5uZzmjtrRYU1WGiuh2IQIGBYTBFXYfEMIJ_gaThxTdDicUIB7kbird_XbAw7VM1nMSFibE_pYOfR49e8rBZ4Y53Em6pGduoa7-lIfDmMZusCDoxtqYecAggpGpO3Q=s72-w400-h300-c" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6569213714636569218.post-7788764917106437107</id><published>2021-12-20T19:56:00.018-05:00</published><updated>2022-05-23T19:29:54.312-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CIS Controls"/><category scheme="http://www.blogger.com/atom/ns#" term="EDR"/><category scheme="http://www.blogger.com/atom/ns#" term="Malware Prevention"/><category scheme="http://www.blogger.com/atom/ns#" term="Software Inventory"/><title type='text'>Notes from the Field - CIS Control 02 - Inventory and Control of Software Assets</title><content type='html'>&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;This is the second in a series of posts I&#39;m writing on the &lt;a href=&quot;https://www.cisecurity.org/controls&quot; target=&quot;_blank&quot;&gt;Center for Internet Security (CIS) Controls Version 8&lt;/a&gt;. The CIS Controls are 18 critical information security controls that all organizations and information security professionals should be familiar with and implement to protect their networks and data. In this post I discuss what I see in my work with clients regarding Control 02 - Inventory and Control of Software Assets.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Many of the clients I work with are startup companies that have amazing technologies and services but don&#39;t have mature information security programs in place. They often don&#39;t know which information security framework to follow or how to implement them. Some frameworks are either too vague or too long and detailed to be useful. That&#39;s why I recommend the CIS Controls to my clients to help them get started on their information security journey. The CIS Controls document offers concise and specific direction for high level executives and for information technology and security professionals. &amp;nbsp; &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;The CIS overview for &lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Control 02 - Inventory and Control of Software Assets&lt;/span&gt; is&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;- &lt;i&gt;Actively manage (inventory, track, and correct) all software (operating systems and applications) on the network so that only authorized software is installed and can execute, and that unauthorized and unmanaged software is found and prevented from installation or execution&lt;/i&gt;.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Controls 02&amp;nbsp;includes 7 sub-controls or&amp;nbsp;safeguards, as the CIS Document refers to them. They are:&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;blockquote style=&quot;border: medium none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;2.&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;1 Establish and Maintain a Software Inventory&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: medium none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;2.2 &amp;nbsp;Ensure Authorized Software is Currently Supported&lt;/span&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: medium none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;2.3&amp;nbsp;Address Unauthorized Software&lt;/span&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: medium none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;2.4&amp;nbsp;Utilize Automated Software Inventory Tools&lt;/span&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: medium none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;2.5&amp;nbsp;Allowlist Authorized Software&lt;/span&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: medium none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;2.6&amp;nbsp;Allowlist Authorized Libraries&lt;/span&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: medium none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;2.7&amp;nbsp;Allowlist Authorized Scripts&lt;/span&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;&lt;b style=&quot;font-family: arial;&quot;&gt;Why is Inventory and Control of Software Assets critical? &lt;/b&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;A complete software inventory is critical in preventing attacks, the CIS document states, as an organization cannot protect against attacks if it doesn&#39;t know it has vulnerable software. With a complete software inventory an organization knows if it is susceptible to new vulnerabilities, particularly zero-day exploits. It can then take appropriate and quick action to protect or remediate the vulnerable software. &amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVi2mGwMNoQ3aYcMKGL69CgJ69YhvkkmlizSlTp2N5Q3SZwU67ySQL8xg1NjpVzRq-c9aA44Y7CA9e77mABNznBuoEG_B5gvbiTpKNNa-kMH7t882xZ--n5K53GmDuTy3-1Bo9SlB0pA3MBUi9b0nSqVtlD69ysuU89pOOCdKgyRqK1CtogEQ6JuNAUA/s4032/IMG_4039.jpg&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;3024&quot; data-original-width=&quot;4032&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVi2mGwMNoQ3aYcMKGL69CgJ69YhvkkmlizSlTp2N5Q3SZwU67ySQL8xg1NjpVzRq-c9aA44Y7CA9e77mABNznBuoEG_B5gvbiTpKNNa-kMH7t882xZ--n5K53GmDuTy3-1Bo9SlB0pA3MBUi9b0nSqVtlD69ysuU89pOOCdKgyRqK1CtogEQ6JuNAUA/w320-h240/IMG_4039.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-family: arial; font-size: x-small;&quot;&gt;Flower Pots at the Hub&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;On a recent SOC 2 gap assessment, the client gave me a demonstration of their services. This is important to understand the infrastructure and software used in support of their services. The company offers several Software as a Service (SaaS) products. Some of the services are restricted to allowed IPs via VPN connections. One, however, is a public facing web application that the IT and IT security managers were unaware of, an unpleasant surprise for them.&amp;nbsp;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The web app, it turns out, is a special project of the semi-retired company founder. It has a niche but lucrative customer base.&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt; A developer, who reports directly to the company founder, is dedicated to the project and is responsible for the web servers that host the application as well as the database servers supporting it. The servers are not part of the official IT system inventory, nor is any of the software installed on the web and database servers. As part of the assessment, it was important to find out what was going on. The IT and IT security managers were eager as well. &amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;I instructed the developer to use RDP to connect to and logon to one of the web servers. And what do we find...a Windows 2008 server, which went end of life almost two years earlier. The IT managers were visibly stunned at the discovery. The server was running IIS 7, also end of life. A quick SSL Labs test of the server&#39;s URL showed it still used SSL 3.0, which was deprecated in 2015. This web server had been vulnerable for years to a number of critical vulnerabilities and could have been compromised...maybe it already was. Just as troubling is that the IT and IT security teams did not know about these servers. Nor did they make much of an effort to find out. &amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;How did the IT and IT security teams not know about these systems and the older software on them?&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;This is more common than you might expect. When we do a walkthrough of services with clients, we uncover a lot of hidden secrets on company networks, pet projects for which the regular rules don&#39;t apply, orphaned systems that no one manages. All waiting to be exploited.&amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&amp;nbsp; &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;We investigated why these systems and software were not inventoried.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The company has an&amp;nbsp;inventory tool in place that scans the network every week for hardware and collects software.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;After just a few minutes, we learned the system and software inventory tool was misconfigured. The subnet with the servers was not included in the inventory scan.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Further investigation revealed additional active subnets&amp;nbsp;were missing from the regular scans as they were thought to be unused. The&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;problem was the staff accepted the results of the tool without comparing them against other sources, including their own list of active networks and their list of services.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The IT and IT security teams got right to work confirming all of their subnets were included in the inventory scans and vulnerability scans, even the ones that were previously identified as unused. Rather than ignore the unused subnets, they were set up with their own scans to identify rogue systems in the future. Checking back on this a few hours later, several other special project servers with older operating systems and software were identified. The IT and IT security managers were clearly frustrated. &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;What do the IT and IT security teams need to do?&lt;/b&gt; They need to require in policy and implement CIS Control 02 and its sub-controls. Many people in the field think this is busy work and a waste of time. It simply points to their lack of understanding information security fundamentals. You can only protect what you know about. T&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;o secure company and customer data i&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;t&#39;s imperative to maintain a complete software inventory. It&#39;s easier for smaller environments, more challenging for&amp;nbsp;larger&amp;nbsp;environments. Still, there are many automated tools available that collect system and software, some of which are free. Manual reviews can be done in smaller environments. Spot checks can be done in larger environments. Regardless, this task needs to be assigned to and owned by someone or a team. &amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;In support of the sub-controls for allowing only approved software and scripts, there are many tools companies can leverage for approving and blocking software so only the software that the IT department approves can run on systems. Most operating systems have this functionality.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Endpoint Detection &amp;amp; Response (EDR) solutions also offer this functionality and provide additional security protections against malware and intrusions.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Implementing CIS Control 02 and its sub-controls will help protect your network and data. The next time there is zero-day vulnerability, you can review your current and complete software inventory and know which systems, if any, are affected. You can take action to remediate the vulnerability and secure your environment.&amp;nbsp; &lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Next month, I&#39;ll discuss the Center for Internet Security Control 3 - Data Protection.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.greghalpin.net/feeds/7788764917106437107/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.greghalpin.net/2021/12/notes-from-field-cis-control-02.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/7788764917106437107'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/7788764917106437107'/><link rel='alternate' type='text/html' href='http://www.greghalpin.net/2021/12/notes-from-field-cis-control-02.html' title='Notes from the Field - CIS Control 02 - Inventory and Control of Software Assets'/><author><name>Greg Halpin</name><uri>http://www.blogger.com/profile/17719118542703009589</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3-t4qOKvt4VAXacR2IW5Cxa1LkMpWAiHeVhAwVAvu78I7MyzoHJkjLlFOITeM-okQwWq9iCwZL8aqvw-95-UaJrfotaoBgl6QmHYFHA1oxn5yQy31sp12ZGTZqWASjA/s220/IMG_4976+copy.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVi2mGwMNoQ3aYcMKGL69CgJ69YhvkkmlizSlTp2N5Q3SZwU67ySQL8xg1NjpVzRq-c9aA44Y7CA9e77mABNznBuoEG_B5gvbiTpKNNa-kMH7t882xZ--n5K53GmDuTy3-1Bo9SlB0pA3MBUi9b0nSqVtlD69ysuU89pOOCdKgyRqK1CtogEQ6JuNAUA/s72-w320-h240-c/IMG_4039.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6569213714636569218.post-7760313465187155090</id><published>2021-11-20T21:53:00.015-05:00</published><updated>2022-05-09T15:07:16.958-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Asset Inventory"/><category scheme="http://www.blogger.com/atom/ns#" term="Center for Internet Security"/><category scheme="http://www.blogger.com/atom/ns#" term="CIS Controls"/><category scheme="http://www.blogger.com/atom/ns#" term="Data Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Ransomware"/><title type='text'>Notes from the Field - CIS Control 01 - Inventory and Control of Enterprise Assets</title><content type='html'>&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span&gt;The Center for Internet&amp;nbsp;Security released Version 8 of its &lt;a href=&quot;https://www.cisecurity.org/controls&quot; target=&quot;_blank&quot;&gt;CIS Controls&lt;/a&gt;&amp;nbsp;document in May 2021. This is the first in a series of posts in which I discuss the CIS Controls in regard to what I see in the field as an information security auditor working with clients. If you are not familiar with the Center for Internet Security, it&#39;s a non-profit organization&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68);&quot;&gt;dedicated to making &quot;the connected world a safer place...&quot; The Controls document includes 18 information security controls that all organizations and information security professionals should understand and implement to protect their data, networks, systems, and other resources.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIyPNyqCnZKZeDNffu6Kp5klUHXvSBWQQcBTgFi8TIN95EQnLWE1IZKCLQBrhDj52TJH4tph9QvkwwNmCMTnTG0NOCxzrbbzi5ZxFOKBtE7cLZngYafrawOwDpimprm66ibigVRJ63oeQk/s2048/IMG_2958.jpeg&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1536&quot; data-original-width=&quot;2048&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIyPNyqCnZKZeDNffu6Kp5klUHXvSBWQQcBTgFi8TIN95EQnLWE1IZKCLQBrhDj52TJH4tph9QvkwwNmCMTnTG0NOCxzrbbzi5ZxFOKBtE7cLZngYafrawOwDpimprm66ibigVRJ63oeQk/s320/IMG_2958.jpeg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-family: arial; font-size: x-small;&quot;&gt;&lt;i&gt;A Bee Collecting Inventory&lt;/i&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68); font-family: arial;&quot;&gt;The clients I work with often don&#39;t have mature information security programs in place. They may have some good controls but are overwhelmed from trying to understand all the different things they need to do to protect their systems and data. There are so many resources out there that are hundreds of pages long for specific topics. They don&#39;t have the time to read them or the expertise to understand them. Vendors try to push them into buying products they don&#39;t need or don&#39;t have the resources to manage. Where do they begin?&amp;nbsp;&lt;/span&gt;&lt;div&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68); font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;caret-color: rgb(68, 68, 68); font-family: arial;&quot;&gt;I recommend they start by reading the CIS Controls. It&#39;s a concise, high level document about information security that executives can understand and also has specific control details that experienced information technology and security staff can run with to properly secure their environments.&amp;nbsp;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;Let&#39;s start with Control 01 -&amp;nbsp;Inventory and Control of Enterprise Assets.&lt;/b&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The CIS overview for this control is -&amp;nbsp;&lt;/span&gt;&lt;i style=&quot;font-family: arial;&quot;&gt;Actively manage (inventory, track, and correct) all enterprise assets (end-user devices, including portable and mobile; network devices; non-computing/Internet of Things (IoT) devices; and servers) connected to the infrastructure physically, virtually, remotely, and those within cloud environments, to accurately know the totality of assets that need to be monitored and protected within the enterprise. This will also support identifying unauthorized and unmanaged assets to remove or remediate&lt;/i&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Control 01 includes 5 sub-controls or safeguards, as the CIS Document refers to them. They are:&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;blockquote style=&quot;border: medium none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;div&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;1.1 Establish and Maintain Detailed Enterprise Asset Inventory&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;1.2 Address Unauthorized Assets&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;1.3 Utilize an Active Discovery Tool&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;1.4 Use Dynamic Host Configuration (DHCP) Logging to Update Enterprise Asset Inventory&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;1.5 Use a Passive Asset Discovery Tool&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;div&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;Why is&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;b style=&quot;font-family: arial;&quot;&gt;Inventory and Control of Enterprise Assets&lt;/b&gt;&lt;b style=&quot;font-family: arial;&quot;&gt;&amp;nbsp;important? &lt;/b&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Understand that&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;enterprises can only defend the assets and data they know about. Organizations need to know what they have, where they are, and how they are protected. Newly deployed systems may not be fully secured and are subject to attackers gaining a foothold in a company&#39;s environment.&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;When I meet with clients they all say how important information security is and that they take it very seriously. They may have advanced tools to protect their networks. But when we dig in and take a look at their network and systems, often they don&#39;t have an accurate inventory. They may use one tool for cloud systems, another tool for on-premises servers, another for network gear. They may have yet another for tracking laptops and desktops. Different people are responsible for the different tools.&amp;nbsp;One staff member may be very diligent about maintaining an accurate inventory, another person may not consider it important and a waste of time. Each person follows different processes. Often no one is coordinating and overseeing their activities.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;I recently conducted a gap assessment for a client that does not have a mature information security program in place. The IT Manager was particularly concerned about ransomware attacks as he knew people at other organizations that had been hit by them. He said the fear of a ransomware attack kept him awake at night. Reviewing their documentation and processes, I observed they didn&#39;t maintain a definitive system inventory. The IT Manager stated that maintaining an inventory wasn&#39;t a priority as the IT team was focused on sophisticated security tools, such as an intrusion detection and prevention system and a SIEM for logging and alerting.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6ceKsJhLpFGYka7yPx2meMBRCUkb6GcS_AlvqG99fGim1uMYSZzoaXZKLIde6PcTugQb-xUGbU9XYqpiSJhaHzu9tzBqjzgZHXCLs0KFhp8oqDvjqsP4o1fSGDU1qf6vMG14cltCI41E4/s2048/IMG_2960.jpeg&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1536&quot; data-original-width=&quot;2048&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6ceKsJhLpFGYka7yPx2meMBRCUkb6GcS_AlvqG99fGim1uMYSZzoaXZKLIde6PcTugQb-xUGbU9XYqpiSJhaHzu9tzBqjzgZHXCLs0KFhp8oqDvjqsP4o1fSGDU1qf6vMG14cltCI41E4/s320/IMG_2960.jpeg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-family: arial; font-size: x-small;&quot;&gt;More Inventory Work&lt;/span&gt;&lt;/i&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;It soon became apparent how their lack of an inventory process left their systems and organization vulnerable. Without a definitive list of servers, laptops, workstations, we had to rely on Active Directory but it contained many systems that were no longer in use. The company also had stand alone systems and Linux servers that were managed by various individuals, independent of the IT department. They didn&#39;t know how many. In a conference room with the IT Manager and IT staff, we reviewed the Windows Server Update Services (WSUS) console to determine the patch level of Windows servers and desktops. We compared the list of systems in WSUS against the systems listed in Active Directory. I identified a number of systems in Active Directory that we could not find in the WSUS console. Not a good sign. I could see why the IT Manager had insomnia. A lack of inventory results in serious control gaps.&amp;nbsp;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;I asked the lead systems administrator to use RDP to connect to one of the servers not listed in WSUS. It was a member of a HyperV cluster on which many of their production virtual machines were running. We looked at the Windows Update history. The server had not been patched since 2015. Six years had passed since anyone installed security patches on it. That&#39;s really bad but not the first time I&#39;ve seen something like this. Just as concerning is that no one had noticed in all that time. The IT Manager was visibly upset and incredulous. He stammered and said it was some sort of mistake. He looked around the room. He and his team are on top of these things, right? They&amp;nbsp;patch their servers regularly or so they thought. &amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;We also found the server did not have anti-virus installed on it. The systems administrator &amp;nbsp;RDPd to the second server in the HypverV cluster. Same results - last security patch was six years ago and no anti-virus installed. &amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span&gt;The IT Manager said &quot;they are only HyperV hosts, not a big deal.&quot; I replied that it was as big a deal as it could get as many of their production virtual machines were running on the HyperV hosts. The hosts were a prime target for ransomware gangs. If the HyperV hosts had been compromised, the company wouldn&#39;t be able to do business for days or weeks until the IT staff could recover the systems from the attack - if they could recover them. They&#39;d likely need to bring in security consultants at great expense to secure their environment and do a forensic analysis.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span&gt;Many of the company&#39;s hundreds of employees wouldn&#39;t be able to get any work done during that time.&amp;nbsp;A ransomware attack could have a huge impact on productivity, cost, and company reputation. For all the IT Manager knew, the systems were already compromised as there were no security tools installed on the hosts that could alert the IT staff of potential attacks. We were just getting started with this audit and the first two systems we reviewed lacked controls. What else would we find? How could they install their IDS/IPS and SIEM tools on systems they didn&#39;t know about?&amp;nbsp;&lt;/span&gt;The IT Manager agreed that a solid inventory of systems is important in support of an organization&#39;s security posture. &amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;So what do the IT Manager and the IT staff need to do?&lt;/b&gt; They need to require in policy and implement procedures to maintain a definitive inventory of all assets - on premises and in the cloud, as well as remote end user systems. They should review and update the inventory at least quarterly, preferably monthly. They need to know about every system and network device so they can protect them. That means following Control 01 and its sub-controls, using automated tools to inventory their network and systems. They must manually verify their inventory is accurate as automated tools can fail or be misconfigured, returning incorrect results. The IT staff need to compare their inventories against the results of assets identified in NMAP and network vulnerability scans. This company needs to assign owners to these processes and to the assets to verify the inventories are current and continuously updated. &amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Once the company has an accurate inventory, they can determine how to properly protect the systems. They can make sure that the systems have the latest security patches, have antivirus installed, a host intrusion detection system installed. They will need to do periodic status checks of the security tools on all systems. The IT Manager can then sleep better at night, knowing all of the company systems are accounted for and secure as that&#39;s the first step in protecting company and customer data.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Next month, I&#39;ll discuss the Center for Internet Security Control 02 - Inventory and Control of Software Assets.&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.greghalpin.net/feeds/7760313465187155090/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.greghalpin.net/2021/11/notes-from-field-cis-control-01.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/7760313465187155090'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/7760313465187155090'/><link rel='alternate' type='text/html' href='http://www.greghalpin.net/2021/11/notes-from-field-cis-control-01.html' title='Notes from the Field - CIS Control 01 - Inventory and Control of Enterprise Assets'/><author><name>Greg Halpin</name><uri>http://www.blogger.com/profile/17719118542703009589</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3-t4qOKvt4VAXacR2IW5Cxa1LkMpWAiHeVhAwVAvu78I7MyzoHJkjLlFOITeM-okQwWq9iCwZL8aqvw-95-UaJrfotaoBgl6QmHYFHA1oxn5yQy31sp12ZGTZqWASjA/s220/IMG_4976+copy.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIyPNyqCnZKZeDNffu6Kp5klUHXvSBWQQcBTgFi8TIN95EQnLWE1IZKCLQBrhDj52TJH4tph9QvkwwNmCMTnTG0NOCxzrbbzi5ZxFOKBtE7cLZngYafrawOwDpimprm66ibigVRJ63oeQk/s72-c/IMG_2958.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6569213714636569218.post-321034281798602506</id><published>2020-10-25T21:08:00.011-04:00</published><updated>2020-10-25T21:44:20.823-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CIS"/><category scheme="http://www.blogger.com/atom/ns#" term="Cybersecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><title type='text'>The Center for Internet Security Controls</title><content type='html'>&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Where can individuals and companies go to get a list of specific information security that they should implement?&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Official frameworks for NIST, SOC 2, and others can be hundreds of pages long. They may leave the reader 
overwhelmed, wondering how to even get started.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; I recommend my clients read the &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Center for Internet Security (CIS) Controls to learn about about specific controls and also to understand the big picture in terms of information security. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The CIS Controls V 7.1 is a free 78 page document that outlines 20 controls that&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&quot;collectively form a defense-in-depth set
of best practices that mitigate the most common attacks against systems and networks.&quot;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt; The Center for Information Security is a non-profit dedicated to making &quot;the connected world a safer place...&quot; The controls are developed by experienced information technology professionals from a variety of industry backgrounds.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjn-GhxedC_oh8fWMoLvIGMkG9TO3GHc1eIx_2mWdxRx96NLq7Ns4E-xoxC9VL6q1hyQevA0y1f2elXQuS_8-jWynyAJucz3nK8kwBzKvj-i8OHf8xGdXH34AjbRWAQ3rAf6GotFlf95wQa/s2048/IMG_4250.jpeg&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1536&quot; data-original-width=&quot;2048&quot; height=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjn-GhxedC_oh8fWMoLvIGMkG9TO3GHc1eIx_2mWdxRx96NLq7Ns4E-xoxC9VL6q1hyQevA0y1f2elXQuS_8-jWynyAJucz3nK8kwBzKvj-i8OHf8xGdXH34AjbRWAQ3rAf6GotFlf95wQa/w400-h300/IMG_4250.jpeg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Bridge over the Allegheny River in Pittsburgh&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The CIS Controls document includes images and charts that help explain information 
security at a high level for executive-level readers in terms they can understand. It also contains &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;specific steps so that the readers with technical skills and responsibilities have enough information to move forward.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;/span&gt;&lt;p style=&quot;text-align: right;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The clients I work with are often new to compliance frameworks or are smaller organizations. They don&#39;t always understand the need to implement some security controls to meet requirements. They may only have a handful of developers and a systems administrator whose experience may be limited to the most basic of security controls. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;They know they don&#39;t want their applications and servers to get hacked. But they don&#39;t know what to do beyond having proper firewall rules, patched systems, and strong passwords to protect their environment.&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Some clients undergo annual pen tests of their web applications. The rest of the time they are focused on continuously updating code and running their business. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;They don&#39;t know why it&#39;s necessary to have an up to date inventory of systems or why they need file integrity monitoring.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The flip side of that are larger companies that have big IT and information security departments with dedicated teams that work in silos. While the individual team members are very experienced and skilled in specific control areas, they may not be knowledgeable or even aware of control topics outside of their specialization. The CIS document brings it all together. &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The CIS Controls provides the 20 controls in order so that management, information technology, and information security staff can see a clear roadmap. The document organizes the controls into three areas &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;– Basic, Foundational, Organizational. Inventory of assets and software fall under Basic. Boundary Defense and Data Protection fall under the Foundational controls category. Incident Response and Management are an Organizational control. Let&#39;s take a look at the entire list.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Basic Controls &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;1. Inventory and Control of Hardware Assets&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;2. Inventory and Control of Software Assets&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;3. Continuous Vulnerability Management&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;4. Controlled Use of Administrative Privileges&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;5. Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;6. Maintenance, Monitoring and Analysis of Audit Logs&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Foundational Controls&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;7. Email and Web Browser Protections&lt;br /&gt;&lt;br /&gt;8. Malware Defenses&lt;br /&gt;&lt;br /&gt;9. Limitation and Control of Network Ports, Protocols and Services&lt;br /&gt;&amp;nbsp; &amp;nbsp;&lt;br /&gt;10. Data Recovery Capabilities&lt;br /&gt;&lt;br /&gt;11. Secure Configuration for Network Devices, such as Firewalls, Routers and Switches&lt;br /&gt;&lt;br /&gt;12. Boundary Defense&lt;br /&gt;&lt;br /&gt;13. Data Protection&lt;br /&gt;&lt;br /&gt;14. Controlled Access Based on the Need to Know&lt;br /&gt;&lt;br /&gt;15. Wireless Access Control&lt;br /&gt;&lt;br /&gt;16. Account Monitoring and Control&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;Organizational Controls&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;17. Implement a Security Awareness and Training Program&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;18. Application Software Security&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;19. Incident Response and Management&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;20. Penetration Tests and Red Team Exercises&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Each control is listed with a short explanation and why it is critical. It also explains how hackers can take advantage when the control is not in place. Each control includes a chart with sub-controls. A Procedures and Tools section for each control provides additional recommendations as to which security tools would be useful, such as Intrusion Detection Systems/Intrusion Prevention Systems for Control 12 - Boundary Defense.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The CIS Controls document states that while these are the 20 controls all organizations should implement, they are not a one-size-fits-all-solution.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt; You must understand them in context to what is critical to your business and take into account how the controls may impact your operations.&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span&gt;&lt;iframe allowfullscreen=&quot;&quot; class=&quot;BLOG_video_class&quot; height=&quot;266&quot; src=&quot;https://www.youtube.com/embed/CX4UE9zT69Y&quot; width=&quot;320&quot; youtube-src-id=&quot;CX4UE9zT69Y&quot;&gt;&lt;/iframe&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span&gt;The controls includes Implementation Groups with sub-controls that apply to organizations based on their size. Implementation Group 1 is for small business. They would implement sub-controls based on the data they are protecting and their staffing resources.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span&gt;Implementation Group 2 is for medium-sized organization that have dedicated IT departments and more resources. They would implement more sub-controls than small business.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span&gt;Implementation Group 3 is for larger companies with large IT departments, expertise in information security, and manage more sensitive data. They would implement all of the sub-controls for each major control. For example, for Control 4 - Controlled Use of Administrative Privileges, a small company would implement only 2 of the 9 sub-controls. A large company would implement all 9 sub-controls. &lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span&gt;Whether your are an individual just getting started in information security or a seasoned professional, the CIS Controls document is a great resource. I frequently reference and share it. It distills principles and practices from cybersecurity books and frameworks into 20 succinct and easy to understand controls. You can obtain the CIS Controls at:&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span&gt;&lt;a href=&quot;https://www.cisecurity.org/controls/&quot; target=&quot;_blank&quot;&gt;https://www.cisecurity.org/controls/&amp;nbsp; &lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.greghalpin.net/feeds/321034281798602506/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.greghalpin.net/2020/10/the-center-for-internet-security.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/321034281798602506'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/321034281798602506'/><link rel='alternate' type='text/html' href='http://www.greghalpin.net/2020/10/the-center-for-internet-security.html' title='The Center for Internet Security Controls'/><author><name>Greg Halpin</name><uri>http://www.blogger.com/profile/17719118542703009589</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3-t4qOKvt4VAXacR2IW5Cxa1LkMpWAiHeVhAwVAvu78I7MyzoHJkjLlFOITeM-okQwWq9iCwZL8aqvw-95-UaJrfotaoBgl6QmHYFHA1oxn5yQy31sp12ZGTZqWASjA/s220/IMG_4976+copy.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjn-GhxedC_oh8fWMoLvIGMkG9TO3GHc1eIx_2mWdxRx96NLq7Ns4E-xoxC9VL6q1hyQevA0y1f2elXQuS_8-jWynyAJucz3nK8kwBzKvj-i8OHf8xGdXH34AjbRWAQ3rAf6GotFlf95wQa/s72-w400-h300-c/IMG_4250.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6569213714636569218.post-8514124982739312273</id><published>2020-06-30T21:47:00.006-04:00</published><updated>2020-06-30T21:56:29.408-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Certifications"/><category scheme="http://www.blogger.com/atom/ns#" term="CISA"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><title type='text'>Passing the CISA Exam</title><content type='html'>&lt;div&gt;&lt;font size=&quot;3&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font size=&quot;3&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;Why Take the Certified Information Systems Auditor Exam?&lt;/b&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font size=&quot;3&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font size=&quot;3&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;More career opportunities and higher salary are the most compelling reason to obtain the ISACA CISA certification. As of this writing, a search on &lt;a href=&quot;https://www.indeed.com/jobs?q=cisa&amp;amp;l=United+States&quot; target=&quot;_blank&quot;&gt;Indeed.com&lt;/a&gt; for positions that include the word CISA returns 4,309 job postings in the United States.&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1v0GpyFhLZmd3W8axExbfDqeoobnxizevvcEvHyCSHLS3dpyH2moOWLsNG9dbMW5NoCdmuj3KlY1AUyR6UsKMo0-ISCewkNdkHYeC6hUoFWLMpTM9MrFgD2nqsQaWPSWqjqbd6i8jsePM/s205/Screen+Shot+2020-06-30+at+9.10.43+PM.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;200&quot; data-original-width=&quot;205&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1v0GpyFhLZmd3W8axExbfDqeoobnxizevvcEvHyCSHLS3dpyH2moOWLsNG9dbMW5NoCdmuj3KlY1AUyR6UsKMo0-ISCewkNdkHYeC6hUoFWLMpTM9MrFgD2nqsQaWPSWqjqbd6i8jsePM/&quot; /&gt;&lt;/a&gt;&lt;/div&gt;And the positions generally pay well. A search on &lt;a href=&quot;https://www.glassdoor.com/Salaries/us-information-security-auditor-salary-SRCH_IL.0,2_IN1_KO3,31.htm&quot; target=&quot;_blank&quot;&gt;Glassdoor&lt;/a&gt; reports that the average annual salary for an information security auditor is $99,834. Some will pay much less and some will pay much more.&amp;nbsp; &amp;nbsp; &lt;br /&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font size=&quot;3&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Having the CISA certification does not prove that you are an expert. It does, however, demonstrate that you have a certain level of knowledge required to work in the information security field. Many employers encourage it or require it for their auditors. It lends credibility to the 
holder of the certification. That&#39;s important, especially if your company bill&#39;s out your services at a high rate.&amp;nbsp; &lt;br /&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font size=&quot;3&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font size=&quot;3&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;How Difficult Is The CISA Exam? &lt;/b&gt;&lt;br /&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font size=&quot;3&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font size=&quot;3&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The CISA exam can be very challenging, even for an experienced information security professional. With 5 or 10 years of experience, a few weeks or months of self-study may be all that is needed to pass. An experienced veteran would have picked up much of the required information from working in the field and being exposed to the concepts over time. For someone new to the field it may require 3 to 6 months of study that includes formal training via an in-person or online class. &lt;br /&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font size=&quot;3&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font size=&quot;3&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;In addition to understanding the breadth of subject matter that the exam covers, another challenge is the wording ISACA uses in its questions and answers. Each question usually gives you two obviously wrong answers and two potentially correct answers. The trick is determining which of the two answers is &lt;i&gt;more&lt;/i&gt; correct. ISACA uses an approach that, at times, seems to defy logic and real world practices. Once you understand the ISACA approach, however, you can usually identify the best answer with confidence. The best way to do that is via ISACA&#39;s &lt;span class=&quot;il&quot;&gt;CISA&lt;/span&gt; test engine - &lt;span style=&quot;font-weight: normal;&quot;&gt;Question, Answers &amp;amp; Explanations Database, which, I cover in the next section. &lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font size=&quot;3&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font size=&quot;3&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;Study Materials I Consulted&lt;/b&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;ul&gt;&lt;li&gt;&lt;font size=&quot;3&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The &lt;a data-saferedirecturl=&quot;https://www.google.com/url?q=https://www.amazon.com/Certified-Information-Systems-Auditor-Fourth/dp/1260458806/ref%3Ddp_ob_title_bk&amp;amp;source=gmail&amp;amp;ust=1593647077379000&amp;amp;usg=AFQjCNHsIVtA9j_zL_c7d9_R9qI6cm-6Ng&quot; href=&quot;https://www.amazon.com/Certified-Information-Systems-Auditor-Fourth/dp/1260458806/ref=sr_1_23?dchild=1&amp;amp;qid=1593565073&amp;amp;refinements=p_27%3APeter+Gregory&amp;amp;s=books&amp;amp;sr=1-23&amp;amp;text=Peter+Gregory&quot; target=&quot;_blank&quot; title=&quot;https://www.amazon.com/Certified-Information-Systems-Auditor-Fourth/dp/1260458806/ref=dp_ob_title_bk&quot;&gt;
All In One &lt;span class=&quot;il&quot;&gt;CISA&lt;/span&gt; by Peter H. Gregory&lt;/a&gt;&amp;nbsp; - the 
book is over 700 pages and covers all of the CISA topics. I read this over the course of many months as I had a busy work and travel schedule. It includes practices questions at the end of each chapter. It also has a good appendix that discusses how to conduct a professional audit, which is valuable in itself. &lt;br /&gt;&lt;/span&gt;&lt;/font&gt;
&lt;font size=&quot;3&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/font&gt;
&lt;/li&gt;&lt;li&gt;&lt;font size=&quot;3&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Next stop for me was the &lt;a href=&quot; https://www.isaca.org/credentialing/cisa/prepare-for-the-cisa-exam&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;il&quot;&gt;CISA&lt;/span&gt; test engine - &lt;/a&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;a href=&quot; https://www.isaca.org/credentialing/cisa/prepare-for-the-cisa-exam&quot; target=&quot;_blank&quot;&gt;Question, Answers &amp;amp; Explanations Database&lt;/a&gt; - 12 Month Subscription&lt;/span&gt; from ISACA. I highly 
recommend it. It&#39;s basically a practice CISA test engine. It helps you understand ISACA&#39;s approach in the way it 
asks questions. Sometimes I completely disagreed
 with their logic but realized I just had to understand theirs to pass 
the exam. It includes a&amp;nbsp; ReadyScore measurement, based on how well you answer the questions. Once you achieve a ReadyScore of 80% or higher, you&#39;re ready to take the actual CISA exam. I used the tool for about 30 minutes a day for about 6 weeks. I then took several full practices exams of a few hours each over the next two weeks.&amp;nbsp;
&lt;br /&gt;&lt;/span&gt;&lt;/font&gt;
&lt;font size=&quot;3&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/font&gt;
&lt;/li&gt;&lt;li&gt;&lt;font size=&quot;3&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The test engine revealed that I needed to fill in some gaps. I used the &lt;a data-saferedirecturl=&quot;https://www.google.com/url?q=https://www.amazon.com/CISA-Exam-Study-Guide-Hemang-Doshi/dp/1983328340/ref%3Dtmm_pap_swatch_0?_encoding%3DUTF8%26qid%3D1587861133%26sr%3D1-1&amp;amp;source=gmail&amp;amp;ust=1593647077379000&amp;amp;usg=AFQjCNHlhlb-AqTPDch1TCUUwgNL9ezHMw&quot; href=&quot;https://www.amazon.com/CISA-Exam-Study-Guide-Hemang-Doshi/dp/1983328340/ref=tmm_pap_swatch_0?_encoding=UTF8&amp;amp;qid=1587861133&amp;amp;sr=1-1&quot; target=&quot;_blank&quot; title=&quot;https://www.amazon.com/CISA-Exam-Study-Guide-Hemang-Doshi/dp/1983328340/ref=tmm_pap_swatch_0?_encoding=UTF8&amp;amp;qid=1587861133&amp;amp;sr=1-1&quot;&gt;
Hemang Doshi &lt;span class=&quot;il&quot;&gt;CISA&lt;/span&gt; Exam - Study Guide&lt;/a&gt; to help with that, as it was recommended by posts I read. It&#39;s basically a condensed study guide with review questions of 
250 pages that focuses on critical exam topics.
&lt;br /&gt;&lt;/span&gt;&lt;/font&gt;
&lt;font size=&quot;3&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/font&gt;
&lt;/li&gt;&lt;li&gt;&lt;font size=&quot;3&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;I also took the &lt;span class=&quot;il&quot;&gt;CISA&lt;/span&gt; training on &lt;a href=&quot;https://www.linkedin.com/learning/paths/become-a-certified-information-systems-auditor-cisa&quot; target=&quot;_blank&quot;&gt;LinkedIn Learning&lt;/a&gt; as my previous employer gave us free access to it. It contains high level information that is valuable for people who may be new to the field. Experienced auditors and other information security professionals may find it a useful refresher or may skip it altogether. &lt;br /&gt;&lt;/span&gt;&lt;/font&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&lt;font size=&quot;3&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/font&gt;
&lt;/div&gt;
&lt;div&gt;&lt;font size=&quot;3&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Experienced auditors with 10 or more years may not need a book or a course. They may be able to pass the exam with the &lt;a href=&quot; https://www.isaca.org/credentialing/cisa/prepare-for-the-cisa-exam&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;il&quot;&gt;CISA&lt;/span&gt; test engine - &lt;/a&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;a href=&quot; https://www.isaca.org/credentialing/cisa/prepare-for-the-cisa-exam&quot; target=&quot;_blank&quot;&gt;Question, Answers &amp;amp; Explanations Database&lt;/a&gt;&lt;/span&gt;.&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font size=&quot;3&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font size=&quot;3&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The CISA is a highly recognized certification in the auditing field and very valuable to an information security professional&#39;s career growth and salary potential. An auditor can have a successful career without it, especially if he or she already possesses the CISSP or similar certification. But if you are in the running for a position where other candidates have the CISA, you will be more competitive with it. n&lt;br /&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font size=&quot;3&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font size=&quot;3&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;For more information on the CISA certification, requirements, and exam, visit the &lt;a href=&quot;https://www.isaca.org/credentialing/cisa&quot; target=&quot;_blank&quot;&gt;ISACA CISA&lt;/a&gt; web page. &lt;br /&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font size=&quot;3&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.greghalpin.net/feeds/8514124982739312273/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.greghalpin.net/2020/06/passing-cisa-exam.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/8514124982739312273'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/8514124982739312273'/><link rel='alternate' type='text/html' href='http://www.greghalpin.net/2020/06/passing-cisa-exam.html' title='Passing the CISA Exam'/><author><name>Greg Halpin</name><uri>http://www.blogger.com/profile/17719118542703009589</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3-t4qOKvt4VAXacR2IW5Cxa1LkMpWAiHeVhAwVAvu78I7MyzoHJkjLlFOITeM-okQwWq9iCwZL8aqvw-95-UaJrfotaoBgl6QmHYFHA1oxn5yQy31sp12ZGTZqWASjA/s220/IMG_4976+copy.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1v0GpyFhLZmd3W8axExbfDqeoobnxizevvcEvHyCSHLS3dpyH2moOWLsNG9dbMW5NoCdmuj3KlY1AUyR6UsKMo0-ISCewkNdkHYeC6hUoFWLMpTM9MrFgD2nqsQaWPSWqjqbd6i8jsePM/s72-c" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6569213714636569218.post-5232352337475185623</id><published>2020-05-04T17:18:00.003-04:00</published><updated>2020-05-06T12:46:36.724-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Career"/><category scheme="http://www.blogger.com/atom/ns#" term="Certifications"/><category scheme="http://www.blogger.com/atom/ns#" term="CISSP"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="InfoSec"/><category scheme="http://www.blogger.com/atom/ns#" term="IT"/><category scheme="http://www.blogger.com/atom/ns#" term="Salary"/><title type='text'>The Million Dollar Information Security Certification - The CISSP</title><content type='html'>&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;My colleague and I were discussing how the annual  fees to maintain the &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;ILfuVd&quot;&gt;&lt;span class=&quot;e24Kjd&quot;&gt;Certified Information Systems Security Professional&lt;/span&gt;&lt;/span&gt; (CISSP) credential jumped from $85 to $125 per year. We ended up  talking about how much the CISSP has impacted our salaries by  comparison, which pleasantly surprised us. We soon felt very grateful instead of resentful. &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiI0h-oJ5Ym3Np1GYCivGEyinc-Hj6owZNNAOevfJGEtGy-6VB6mMvnSLoadQzId9TPwLNgeM81JzqLUcIm_oR-RW6wDHpqFSCjHtRw8zuHxLOS07jsHELpBL3o4J3yyzKuM6erA_F9ONrE/s1600/isc2_cissp2.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;340&quot; data-original-width=&quot;340&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiI0h-oJ5Ym3Np1GYCivGEyinc-Hj6owZNNAOevfJGEtGy-6VB6mMvnSLoadQzId9TPwLNgeM81JzqLUcIm_oR-RW6wDHpqFSCjHtRw8zuHxLOS07jsHELpBL3o4J3yyzKuM6erA_F9ONrE/s200/isc2_cissp2.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;  &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Since I earned the CISSP five years ago my salary has increased  by about 85%. My experience, skills, and work performance played a  bigger role in that salary increase, of course. Employers rarely&amp;nbsp; give raises or &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;hire applicants&lt;/span&gt;&lt;/span&gt; because of a certification or a degree. At the same time, I wouldn&#39;t have had the  advancement opportunities and salary increases without having earned the CISSP.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;  &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;  &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;My colleague earned the CISSP 10 years ago and he estimates that he  has earned about $400,000 more over those 10 years than if he had not  earned it. He went from a low level IT position to a director level position four years after earning the certification. By the time he retires, he expects the CISSP will have helped  increase his earnings by about one million US dollars or more.&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;I posted about this topic on a CISSP discussion page. Others wrote about how their lives have changed dramatically and positively by the increase in salary they have attained. One person wrote how he was making $15 an hour a few years before in a low-level IT position. He is now earning close to $110,000 per year, which he credits to attaining the CISSP and the doors it opened for him. He thanks God every pay day, still amazed at how his fortunes have changed.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Another person wrote that immediately after earning the CISSP, a company offered him a position paying $50,000 more per year than he was earning. That&#39;s life changing money in one year, not to mention over the course of a year. &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;There&#39;s no guarantee you will earn more money with the CISSP. But if you want to advance in the information technology or information security fields, it&#39;s better to have it than not have it. It helps you stand out. In many cases, the certification is a requirement. If someone discourages you from pursuing it, don&#39;t let them dissuade you. More than likely, the person feels threatened by a peer trying to advance. This is a normal reaction for a lot of people, particularly those with a fixed mindset. They&#39;ll tell you that certifications are a waste of time and only prove you can memorize information and pass exams. They&#39;re entitled to their opinion. I don&#39;t agree with them. I do know, however, that having the CISSP resulted in a higher salary for me and for colleagues who have it. That makes it very&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;  &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;If you are in the information security field, I highly encourage you to pursue the CISSP. It&#39;s the industry standard, required for many U.S. Department of Defense Information Security contracting positions and companies that work with them. For those starting out in the field, the Security+ is a good certification with which to start. Once you have a few years of experience, then pursue the CISSP. The rewards can be personal satisfaction at having achieved it, advancement in your career, and financial security.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Learn more about the CISSP the &lt;a href=&quot;https://www.isc2.org/Certifications/CISSP&quot; target=&quot;_blank&quot;&gt;(ISC)2 website&lt;/a&gt;. &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt; &lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;ILfuVd&quot;&gt;&lt;span class=&quot;e24Kjd&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.greghalpin.net/feeds/5232352337475185623/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.greghalpin.net/2020/05/the-million-dollar-information-security.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/5232352337475185623'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/5232352337475185623'/><link rel='alternate' type='text/html' href='http://www.greghalpin.net/2020/05/the-million-dollar-information-security.html' title='The Million Dollar Information Security Certification - The CISSP'/><author><name>Greg Halpin</name><uri>http://www.blogger.com/profile/17719118542703009589</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3-t4qOKvt4VAXacR2IW5Cxa1LkMpWAiHeVhAwVAvu78I7MyzoHJkjLlFOITeM-okQwWq9iCwZL8aqvw-95-UaJrfotaoBgl6QmHYFHA1oxn5yQy31sp12ZGTZqWASjA/s220/IMG_4976+copy.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiI0h-oJ5Ym3Np1GYCivGEyinc-Hj6owZNNAOevfJGEtGy-6VB6mMvnSLoadQzId9TPwLNgeM81JzqLUcIm_oR-RW6wDHpqFSCjHtRw8zuHxLOS07jsHELpBL3o4J3yyzKuM6erA_F9ONrE/s72-c/isc2_cissp2.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6569213714636569218.post-4808885062388509919</id><published>2020-04-09T07:38:00.000-04:00</published><updated>2020-04-09T08:38:38.861-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Coronavirus"/><category scheme="http://www.blogger.com/atom/ns#" term="Emergency Fund"/><title type='text'>Coronavirus and An Emergency Fund</title><content type='html'>&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;If there was ever a good reason and time to have an emergency fund, this is it. The Coronavirus has put millions out of work or at reduced pay. This could go on for many months and have a much longer impact on the economy. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Congress
 and the President have agreed on economic stimulus packages that include direct payments and increased unemployment benefits. It could take weeks, however, before the government can logistically distribute the funds. State unemployment web sites are crashing from the the volume of people applying for benefits.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghE0zJ6QReVkzEUJFlJHCQPVSxa4MBSSW8LhvabJwFD9v7M6BflQItPi6Gy0cX5rkbfZZATG6V0rEoCjfM_j4s-BJsSNk9OGBJbhc-erZmZGdDBWYZT5ULkgPfFzaIdxRpM7RHNbDlbbMr/s1600/IMG_8536.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghE0zJ6QReVkzEUJFlJHCQPVSxa4MBSSW8LhvabJwFD9v7M6BflQItPi6Gy0cX5rkbfZZATG6V0rEoCjfM_j4s-BJsSNk9OGBJbhc-erZmZGdDBWYZT5ULkgPfFzaIdxRpM7RHNbDlbbMr/s400/IMG_8536.jpeg&quot; width=&quot;300&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Pattee Library at Penn State in Spring&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;The unemployment rate was so low a month ago that most people who were looking for a job could easily find one in their field. Companies are laying off hundreds of thousands of workers per week. Finding a job is much more challenging, if not impossible for those who lost their positions. There may not be new jobs or jobs to return to for a long time. &lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;The best way to manage a lost job or reduced income is with an emergency fund.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;What&#39;s an Emergency Fund?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;It&#39;s enough money you saved up and set aside to cover your regular expenses for 3 to 6 months or longer. The fund is dedicated to emergency use. It&#39;s not to be used for a vacation or when you get car fever car. The emergency fund is money readily available in a bank account or money market account. It&#39;s not money invested in retirement accounts or tied up in investments in a brokerage account. Why not? Because when you need the money in an emergency, it&#39;s likely to occur after the market plunged, like it recently has.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Those investments you were counting on in your brokerage account may be worth 30% or 50% less than they were a month before. You&#39;ll be forced to sell the investments at a lower price to raise cash. There may also be tax consequences for selling investments or borrowing from a retirement account.&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;How Much of an Emergency Fund Do I Need?&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;In normal times, that depends on what you do for a living and how easy it would be for you to find another job. If you have a stable job working for government or in a field with very low unemployment, 3 to 6 months may be plenty. If you are in construction or a freelancer, you may need to build up 6 months to ride out the lean times. If you are in a niche field where it&#39;s difficult to find a position or have health issues, you might need up to 12 months of expenses saved up. During normal times, if there is such a thing, you may be able to pick up part-time work so that you at least have some money coming in until you find a long term position in your chosen field. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Now that we are in the midst of a pandemic, an emergency fund of 12 months may be needed for most people out of work as jobs are scarce. Sure, the government is working to get money flowing to those out of work, but how long will it take? Just a month into the pandemic in the United States, it&#39;s been reported that one-third of renters missed their April rent payment.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;After the government does get the money flowing, how long can they keep that up before the tap runs dry? When the economy does fire up again, many businesses and jobs may not return. It&#39;s best to be prepared for the long haul with an emergency fund.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Benefits of an Emergency Fund&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;When you have a fully funded Emergency Fund, things that used to be emergencies become manageable events. Unexpected home or car repairs are nothing to worry about when you have plenty of money to cover them. A job loss can be terrifying if you don&#39;t have enough saved to pay next month&#39;s rent or mortgage and grocery expenses. When you have it covered for 6 or 12 months, you can sleep at night. You can focus your attention on finding a new job. Your job search is not distracted by worrying about keeping a roof over your head and feeding your family.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;When
 you begin to interview for positions again, you won&#39;t be desperate. You&#39;ll have confidence and flexibility. 
Desperate people often give off a whiff of desperation to 
potential employers in interviews. It undermines their ability to obtain a position. If the person is offered the position, the employer may offer 
you a lower salary if they sense your desperation&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;When you have an emergency fund, you won&#39;t have to borrow against your home, which may be impossible when you are out of work. You also are not forced to sell your home because you can&#39;t afford the mortgage payments anymore. Sure, you could sell your home.Consider, however, that when a lot of other people are out of jobs, home values can drop in value. You don&#39;t want to be in the position of having to sell your previously valuable home at a much lower price. This is particularly troubling if the value of the home falls below the amount you still owe on the mortgage. This happened to millions of people after the real estate bubble burst in 2008. Many people who were unemployed would have been able to find jobs elsewhere if only they could sell their homes and move. But they were so underwater on their homes, they couldn&#39;t afford to leave their home for a job in another part of the country. &amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Can&#39;t Save an Emergency Fund&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;The&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;https://www.federalreserve.gov/newsevents/pressreleases/other20180522a.htm?mod=article_inline&quot; target=&quot;_blank&quot;&gt;Federal Reserve&lt;/a&gt; reported that 40% of American adults don&#39;t have enough money to cover a $400 unexpected expense. How are they going to save up enough for 6 month&#39;s worth of expenses?&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Let&#39;s start with the people who make a good living but simply live beyond their means. I know plenty of people who make good salaries and have been broke for years. You probably know people like this, too. They usually drive expensive cars and bought more house than they could easily afford. Maybe they take extravagant vacations or they have a lot of student loan debt, too. People have to make sensible choices. Those folks need to get on a budget and see where their money is going. Get rid of the expensive car and downsize to a smaller house. Those two actions can free up a grand or two a month. If you can start banking a grand a month, that adds up very quickly.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Then there are the people who contribute so much to their retirement accounts that they don&#39;t have cash on hand. While it&#39;s great to contribute the maximum to your retirement account, taking money from a retirement account for emergency expenses later is costly. There is a 10% penalty on such withdrawals (though waved during the pandemic) and you have to pay taxes on that money or pay it back. If you take out a lot at one time, it can potentially put you into a higher tax bracket. Find a balance between contributing to your retirement accounts and having cash on hand for emergencies. Once you get that emergency fund fully funded, max out the retirement contributions again.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Many people don&#39;t make much money to begin with and struggle to support themselves.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt; For those who do not earn much money, that&#39;s a huge challenge. There are a lot of socioeconomic issues at play, for which there is no solution our society has been able to come up with. Budgeting may help some, but not if you have already cut out non-essentials. Focus on earning more money. That could be from a &lt;a href=&quot;https://sidehustleschool.com/&quot; target=&quot;_blank&quot;&gt;side hustle&lt;/a&gt; or a new &lt;a href=&quot;https://www.udemy.com/&quot; target=&quot;_blank&quot;&gt;skill&lt;/a&gt;. Others have addressed it in detail. I highly recommend the &lt;a href=&quot;https://www.choosefi.com/episodes/&quot; target=&quot;_blank&quot;&gt;ChooseFI podcast&lt;/a&gt; for many discussions on this topic. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;The goal is to have an emergency fund big enough so that if you are out of a job or have a large unexpected expense, you can ride out a difficult time without borrowing, raiding your retirement accounts, being forced to sell your home or take other actions that will negatively impact your finances.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;If you are still employed and don&#39;t have an emergency fund, get started today. Conserve cash and cut out unnecessary expenses. That&#39;s easier now as there aren&#39;t many places to spend money these days. There&#39;s no telling how long that those of us who are currently employed will remain so in this turbulent economy. Being prepared with an emergency fund is the best way to manage a downturn.&amp;nbsp; &amp;nbsp; &lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.greghalpin.net/feeds/4808885062388509919/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.greghalpin.net/2020/04/coronavirus-and-emergency-fund.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/4808885062388509919'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/4808885062388509919'/><link rel='alternate' type='text/html' href='http://www.greghalpin.net/2020/04/coronavirus-and-emergency-fund.html' title='Coronavirus and An Emergency Fund'/><author><name>Greg Halpin</name><uri>http://www.blogger.com/profile/17719118542703009589</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3-t4qOKvt4VAXacR2IW5Cxa1LkMpWAiHeVhAwVAvu78I7MyzoHJkjLlFOITeM-okQwWq9iCwZL8aqvw-95-UaJrfotaoBgl6QmHYFHA1oxn5yQy31sp12ZGTZqWASjA/s220/IMG_4976+copy.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghE0zJ6QReVkzEUJFlJHCQPVSxa4MBSSW8LhvabJwFD9v7M6BflQItPi6Gy0cX5rkbfZZATG6V0rEoCjfM_j4s-BJsSNk9OGBJbhc-erZmZGdDBWYZT5ULkgPfFzaIdxRpM7RHNbDlbbMr/s72-c/IMG_8536.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6569213714636569218.post-391238925992490683</id><published>2020-03-15T13:25:00.000-04:00</published><updated>2020-04-04T17:52:04.613-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Asset Allocation"/><category scheme="http://www.blogger.com/atom/ns#" term="Coronavirus"/><category scheme="http://www.blogger.com/atom/ns#" term="Emergency Fund"/><category scheme="http://www.blogger.com/atom/ns#" term="Financial Goals"/><category scheme="http://www.blogger.com/atom/ns#" term="Investor Policy Statement"/><title type='text'>An Investor Policy Statement Helps Ride Out Coronavirus Stock Market Turmoil</title><content type='html'>&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;The S&amp;amp;P 500 Index has dropped 30% or more, as of this writing, since its recent high in February. But I haven&#39;t checked my portfolio since early January. Why? I have an Investor Policy Statement that guides me through turbulent market fluctuations like this and I have more important things to focus on right now.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijIyMIe3FENTzSH7efVqI0mYFQPIZnE8nP2SD_mbXiGtMl9KlRYMq3FgPTyoHwcrTiF6nScb1w4NU6-1B71OYZZ_bB-UkfewYvwl2WO8jy4caFk6ksnhkSbU19wlTXIRFdLB85zQD50N16/s1600/IMG_9821.JPG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijIyMIe3FENTzSH7efVqI0mYFQPIZnE8nP2SD_mbXiGtMl9KlRYMq3FgPTyoHwcrTiF6nScb1w4NU6-1B71OYZZ_bB-UkfewYvwl2WO8jy4caFk6ksnhkSbU19wlTXIRFdLB85zQD50N16/s320/IMG_9821.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Flowers at Salesforce Park in San Francisco, March 2020. &lt;/span&gt;&lt;/span&gt;&lt;/td&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/td&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;I&#39;ve been in self-quarantine for a week since returning from a trip to San Francisco where I may have been exposed to the Coronavirus. My wife has a compromised immune system. As a precaution, she is staying nearby at our friends&#39; Airbnb house that was fortunately not in use. We&#39;re focused on staying connected while she is living elsewhere during an unsettling time, avoiding contact with others so she can return home, and obtaining necessary supplies.&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;The Coronavirus has disrupted life as we know it and sent financial markets into chaos. Unlike the burst financial bubble of 2008, day-to-day life has been completely upended. People are worried they or family members may catch the virus, get sick, and possibly die. Non-essential businesses are closed and people are at home, waiting for this to end. &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;I&#39;ve read many posts in the financial groups to which I belong on Facebook by people complaining about how much their portfolios are down and how they are selling stock funds and buying bonds. Or they purchased stocks or funds on the dip only for the market to go lower, causing them to sell at a loss. Or they are asking what they should do. Some are too young to have experienced a bear market before and think they will never recover what they lost.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt; How does one know what to do in times like this?&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;I know because&lt;/span&gt;&lt;/span&gt; I wrote an Investor Policy Statement back in the summer. Panics or stressful situations of any kind can impair the mind&#39;s ability to make good decisions. The time to make important investing decisions or decisions of any kind, for that matter, is when you are calm, relaxed, and can think clearly, not in the middle of a crises, with the walls closing in around you. That&#39;s why it&#39;s important to make an Investment Policy Statement. Never heard of one before? Neither did I until I read this &lt;a href=&quot;https://www.whitecoatinvestor.com/how-to-write-an-investing-personal-statement/&quot; target=&quot;_blank&quot;&gt;post by the Whitecoat Investor&lt;/a&gt;. It&#39;s basically a roadmap you write for yourself to follow for your finances rather than making decisions based on the news of the day.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Thanks to the post, I learned why a policy is essential to have and decided to document my investment decisions. I documented why I decided to invest in the funds that I did so that I would not second-guess myself when the market drops 30% or 50% or more as it did in 2008. An IPS is also for non-crisis times. It&#39;s easy to forget why you decided to invest in something five or ten years ago...or longer. That&#39;s particularly true when there is a panic and most people are running for the exits.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;So what is an Investment Policy Statement? An IPS is a document in which you write down what your goals are and how you are going reach them. They can be both financial and non-financial goals. It helps to write down why you have&amp;nbsp; particular financial goals as circumstances may change over time. You can change your goals to match. An IPS can be as short and broad or as long and detailed you like. The Whitecoat Investor has 7 sections in his policy. My IPS has five sections. It depends on your own financial situation. My plan includes:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Goals&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Emergency Fund &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Investing &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Asset Allocation&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Retirement Drawdown Strategy &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Entire books have been written about each one of these topics. This is an overview.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Goals&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;In the Goals section, I document:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;How much I want to accumulate for retirement.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;The percentage of my income I will save each year to reach that goal.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;The age at which I want to retire or begin reducing the number of hours I want to work.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;The expected income I will have at retirement from investments, Social Security, pension, etc.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;The kind of life I want to live and how my investments will help me to do that.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Emergency Fund&amp;nbsp; &lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;The Emergency Fund Section is where I document:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;How many months of expenses I want to have in a bank or money market account in case of job loss or reduced income.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;That the money is not to be invested in anything else, such as an index fund. Many people prefer to invest their emergency fund. I do not. I don&#39;t want my emergency fund to drop by 30% or more during a financial meltdown, especially when I need to live off of it.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;This section also states that I can&#39;t use the emergency fund to go on vacation or pay for regular home maintenance costs.&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Investing &lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;The Investing section discusses the overall investment strategy. Again, this is important to document so you aren&#39;t wondering in the middle of a panic why you made an investment decision years ago. You can review it to remind yourself. Mine discusses:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;What percentage of my income I will save and invest each year.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;It states that I will prioritize funding tax-sheltered accounts, such as 401K, 403B, 457B, IRA, Roth IRA, etc. over taxable brokerage accounts.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;I state that I select low cost index funds or equivalent exchange traded funds (ETFs) to reduce expenses, which are a drag on returns.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;It can also specify the investment return goal and the amount of risk you are willing to take. This helps you decide which funds you choose based on the return you expect and how much risk you can accept. If you invest in real estate or other assets, you can discuss that. &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Asset Allocation&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;This where you get into the details of your selected investments and why. If you invest in real estate, you would include it and how much of your assets are dedicated to it. For Bogleheads like me, you might have a Three Fund Portfolio that looks like this:&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;70% Vanguard Total Stock Market Index&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;15% Vanguard Total International Stock Market Index&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;15% Vanguard Total Bond Market Index &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;You may have many more investments. In this section you also explain to yourself why you are choosing this allocation. For example, I note that because of a partial pension, I have decided to choose a higher stock fund allocation than I would if I did not have a pension. A younger person may choose to be 100% invested in the Total Stock Market Index. An older person would likely have a much higher bond allocation as they are closer to or in retirement.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;This section is where you can also note how you will re-balance your portfolio. Mine will be done with new 401K contributions instead of selling and buying existing shares. I do have a provision that if the market drops by 20% or more, I may choose to sell bonds and buy more of the stock funds. At this point I have not done that. My 401K contributions are still hard at work for me, buying at lower prices. I&#39;m satisfied with that for now.&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Drawdown Strategy &lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;The Drawdown Strategy is where you write down the order in which you will draw from your accounts. Many people focus so much on accumulating that they aren&#39;t sure what to do once they have reached their goals. Had they thought about a drawdown strategy earlier, they may have planned and invested differently, retired earlier or worked even longer. You want to get this right so your money outlasts you.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Financial planners advise that you withdraw funds from accounts in a specific order such as drawing from taxable accounts first, Roth accounts next, then IRAs, 401Ks, and similar accounts. This way you don&#39;t have too high a tax burden early and reduce the size of your portfolio unnecessarily.&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;For example, you don&#39;t want to withdraw all of your money from an IRA or 401K plan the day you retire because you will pay a tremendous amount in taxes. It&#39;s best to withdraw it over time so the portfolio continues to grow and you minimize your tax burden.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;This section is where you also address when you will begin to receive Social Security benefits. If you begin doing so early, you will reduce your monthly Social Security benefit. If you wait until 65 or 67 or whatever the age is when you are eligible to receive full benefits, you will maximize your monthly payment.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;There are other factors to consider as well. If you are in good health and come from a family of long-lived individuals, you may consider delaying Social Security benefits to maximize your benefit. If you are in poor health, it may make sense to begin receiving benefits sooner, rather than later. A bigger payment later isn&#39;t useful if you aren&#39;t alive to receive it. Writing it all down, helps you see the big picture and make a plan so you aren&#39;t trying to keep it all in your head years later or when the market drops by 50%.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;The final section of the Whitecoat Investor&#39;s IPS is that all changes must wait three months before they are implemented. I think that&#39;s great advice. It prevents us from making decisions based on knee-jerk reactions to the news of the day rather than thinking of the long term. I did not include that in my written, as it&#39;s an unwritten rule for me, but will add it.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;I&#39;m optimistic that scientists will find treatments or a vaccine for the Coronavirus. Hopefully the economy recovers and people who have lost jobs or incomes will return to work quickly.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;In the meantime, I&#39;m not panicking about my portfolio. I have an Investment Policy Statement that made sense 6 months ago and makes sense now. I wrote it for the long-term and will adjust when necessary. It allows me to focus on my work and staying healthy, rather than being distracted by every dip or jump of the market.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;I highly encourage that you write yourself and Investor Policy Statement for peace of mind when things settle down. Make&amp;nbsp; choices that will help you prepare and ride out future downturns.&amp;nbsp; &lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.greghalpin.net/feeds/391238925992490683/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.greghalpin.net/2020/03/investor-policy-statement.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/391238925992490683'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/391238925992490683'/><link rel='alternate' type='text/html' href='http://www.greghalpin.net/2020/03/investor-policy-statement.html' title='An Investor Policy Statement Helps Ride Out Coronavirus Stock Market Turmoil'/><author><name>Greg Halpin</name><uri>http://www.blogger.com/profile/17719118542703009589</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3-t4qOKvt4VAXacR2IW5Cxa1LkMpWAiHeVhAwVAvu78I7MyzoHJkjLlFOITeM-okQwWq9iCwZL8aqvw-95-UaJrfotaoBgl6QmHYFHA1oxn5yQy31sp12ZGTZqWASjA/s220/IMG_4976+copy.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijIyMIe3FENTzSH7efVqI0mYFQPIZnE8nP2SD_mbXiGtMl9KlRYMq3FgPTyoHwcrTiF6nScb1w4NU6-1B71OYZZ_bB-UkfewYvwl2WO8jy4caFk6ksnhkSbU19wlTXIRFdLB85zQD50N16/s72-c/IMG_9821.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6569213714636569218.post-3256199139467451956</id><published>2018-10-28T20:40:00.001-04:00</published><updated>2018-11-01T19:48:50.811-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Encryption"/><category scheme="http://www.blogger.com/atom/ns#" term="Financial Fraud"/><category scheme="http://www.blogger.com/atom/ns#" term="Insider Threat"/><category scheme="http://www.blogger.com/atom/ns#" term="Separate Accounts"/><title type='text'>The Insider Threat To Your Finances</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAE1-MxD_fXXM2x2LQupZ5cmaw0m0du18QWRuK3JRWLMk49kd0J8Hc9aRo139wfLj0xhuy6Eghu8CXsLLi1bSS4FchunkT0sqeXa2ImYKHWeen9gYLJvH1lGF4UnVJ3pG6CO9Bs-gW4QEy/s1600/thought-catalog-back-of-dollar.jpeg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;266&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAE1-MxD_fXXM2x2LQupZ5cmaw0m0du18QWRuK3JRWLMk49kd0J8Hc9aRo139wfLj0xhuy6Eghu8CXsLLi1bSS4FchunkT0sqeXa2ImYKHWeen9gYLJvH1lGF4UnVJ3pG6CO9Bs-gW4QEy/s400/thought-catalog-back-of-dollar.jpeg&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;&quot;&gt;In the Information Security field, it’s essential to be aware of insider threats. It’s just as important to know about the insider threats to your finances. In an organization, an insider threat is an employee or contractor who has legitimate access to network resources and can cause damage the network either intentionally or unintentionally. Unintentional insider threats come from IT staff who misconfigure a firewall or the operating system of a computer. The intentional insider threat is someone who may have a grudge against the company and wants to damage it. The person may want to gain financially by embezzling funds or colluding with external individuals who may profit from gaining access to sensitive information. In either case, the consequences can be financially costly and damage the organization’s reputation. &lt;br /&gt;&lt;br /&gt;The same goes for your personal finances. Many people are defrauded by people they know — their teenage children, house guests, adult children with substance abuse issues or financial problems. The insider threat can be a spouse with substance abuse or mental health issues. It might be a spouse who plans to clean out your joint financial accounts before a divorce.  &lt;br /&gt;&lt;br /&gt;There are many unfortunate stories of parents being robbed by their adult children, such as this &lt;a href=&quot;https://www.newsday.com/long-island/crime/son-steals-4-5-million-mom-1.19033560&quot;&gt;story&lt;/a&gt; of a mother whose son stole $4.5 million from her. The son used a mobile payment app to transfer the money out of her account and into his. &lt;br /&gt;&lt;br /&gt;There are also cases of teenagers stealing from their parents. Here is the story of a 13-year-old boy who charged &lt;a href=&quot;https://www.mirror.co.uk/news/uk-news/boy-aged-13-lost-80000-12639770&quot;&gt;£80,000 to his father’s credit card&lt;/a&gt; to fuel a gambling addiction. &lt;br /&gt;&lt;br /&gt;Even young children can cause some financial damage to their parents. Read the story about a 6-year-old girl who used her mother’s phone to order &lt;a href=&quot;https://abcnews.go.com/GMA/Family/girl-sneaks-350-toy-order-amazon-mom-donate/story?id=57190067&quot;&gt;$400 worth of toys from Amazon&lt;/a&gt;. It turns out to be a cute story, but highlights how quickly and easily parents can be on the hook for big expenses their children incur, thanks to how easy technology has made online shopping. &lt;/span&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;&quot;&gt;  &lt;br /&gt;&lt;br /&gt;Most heartbreaking of all is when elderly parents are defrauded of their entire life savings by their adult children. This is a very complex and requires long term planning and legal counsel. The use of what’s known as the &lt;a href=&quot;https://en.wikipedia.org/wiki/Two-man_rule&quot;&gt;two-person rule&lt;/a&gt; can protect the elderly parent. The two-person rule requires financial transactions by the adult child be signed off on by a second person, such as a lawyer. &lt;br /&gt;&lt;br /&gt;Spouses may be the biggest potential insider threat to your finances. This can be a difficult idea to contemplate or discuss as individuals are expected to completely trust their spouses in order to have a successful marriage. But the stories of people being cleaned out of their finances by a spouse are too many to count. In one example, a woman wrote to MarketWatch’s Moneyist (formerly the Moneyologist) about her &lt;a href=&quot;https://www.marketwatch.com/story/this-woman-made-a-life-changing-decision-after-her-husband-gave-600000-to-a-cult-2017-07-10&quot;&gt;husband of 24 years sending over $600,000 to a temple&lt;/a&gt; in another country. In a very unusual scheme, an &lt;a href=&quot;https://punchng.com/wife-hires-brother-to-impersonate-husband-empties-retirement-savings-account/&quot;&gt;Indiana woman&lt;/a&gt; cleaned out her husband’s retirement and savings accounts with the help of the husband’s brother who impersonated him. &lt;br /&gt;&lt;br /&gt;There are more extreme cases where people suffer from physical, mental, and financial abuse, such as this UK woman whose &lt;a href=&quot;https://www.dailymail.co.uk/home/you/article-4136046/Financial-abuse-just-destructive-physical-abuse.html&quot;&gt;husband used money to control every aspect of her life&lt;/a&gt;. A Florida woman went from living into a mansion and running a multi-million dollar business to &lt;a href=&quot;https://www.naplesnews.com/story/news/crime/2018/08/11/abusers-can-use-finances-make-victims-stay-swfl/755929002/&quot;&gt;living in a shelter and making $8.25 an hour&lt;/a&gt; as a result of her husband’s physical, mental, and financial abuse. He left her emotionally traumatized and with $4 million of debt.&lt;br /&gt;&lt;br /&gt;Parents, too, can be the insider threat — to their children’s finances. Like the B.B. King song goes — “Nobody loves me but my mother. She could be jivin’ too.” &lt;a href=&quot;https://www.marketwatch.com/story/my-mother-was-a-psychopath-who-stole-my-identity-and-racked-up-500000-in-debt-2016-10-04&quot;&gt;This woman’s identity was stolen by her mother when she was 11-years-old&lt;/a&gt;. The mother racked up $500,000 worth of credit card debt in her daughter’s name over many years. The daughter grew up and became an expert in child identity-theft. It was only at the age of thirty-four, after her mother’s death, that she learned that the woman who raised her was the culprit in her own identity-theft case.    &lt;br /&gt;&lt;br /&gt;There is no end to the number of ways one can fall victim to being financially defrauded or by people they know. But there are steps you can take to protect yourself from insider threats and reduce your exposure. &lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;&quot;&gt;
&lt;li&gt;Shutdown or Log out of your computer when not using it, particularly when you know guests are visiting. Don’t let them have access to sensitive data such as tax records or online your online financial websites. A guest could easily plug in a USB thumb drive and copy all of your personal files to it in minutes.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Encrypt your computer hard drive. If someone pulls the drive from your system, the person can easily access all of your data if it&#39;s not encrypted.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Don’t give your children of any age access to your credit cards or online financial accounts. Most teenage and adult children are trustworthy, but people’s lives can go off the rails in a flash due to substance abuse or gambling addictions.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;For guests or young children, create a separate account on your computer so they can browse the web. If you have an old iPad or tablet, let them use that instead of your primary device. Clear any saved passwords for your financial accounts and any sensitive data from it.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Store your important papers such as tax records, financial statements, etc., in a secure place in your home — a safe or file cabinet, not a desk in the guest bedroom.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;When it comes to couples, consider using a joint checking account for shared expenses — the mortgage, car payment, insurance, groceries, and other regular expenses. Each person in the marriage should also have a separate account that the spouse does not have access to. It should contain enough to get you through at least a month of expenses, preferably more. The funds not only provide for some financial security but also as a fund to escape physically or emotional abuse relationships. Persons in such situations should consult the &lt;a href=&quot;https://www.thehotline.org/is-this-abuse/abuse-defined/&quot;&gt;National Domestic Abuse Hotline&lt;/a&gt;.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Review your bank, credit card, retirement, and other financial statements regularly. Be transparent about this and do it together with your spouse. Each person will know everything that the other is doing and can help keep everyone on the same page financially. It can help build trust and alleviate suspicion. As the saying goes, trust but verify.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Review your credit reports each year or more often to determine if any unauthorized accounts have been opened in your name or your spouse’s.&lt;/li&gt;
&lt;li&gt;Put a freeze on your credit so others do not open accounts in your name.&lt;a href=&quot;https://www.cnbc.com/2018/09/20/free-credit-freezes-now-in-effect.html&quot;&gt; It’s now free to do so&lt;/a&gt;.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Stay on top of your financial matters.&lt;/li&gt;
&lt;/span&gt;&lt;/ul&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;&quot;&gt;
&lt;div&gt;
Photo Credit: &lt;a href=&quot;https://unsplash.com/photos/gbQ3EsFSdG8&quot; target=&quot;_blank&quot;&gt;Illuminati&lt;/a&gt; by Thought Catalog&lt;/div&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://www.greghalpin.net/feeds/3256199139467451956/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.greghalpin.net/2018/10/the-insider-threat-to-your-finances.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/3256199139467451956'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/3256199139467451956'/><link rel='alternate' type='text/html' href='http://www.greghalpin.net/2018/10/the-insider-threat-to-your-finances.html' title='The Insider Threat To Your Finances'/><author><name>Greg Halpin</name><uri>http://www.blogger.com/profile/17719118542703009589</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3-t4qOKvt4VAXacR2IW5Cxa1LkMpWAiHeVhAwVAvu78I7MyzoHJkjLlFOITeM-okQwWq9iCwZL8aqvw-95-UaJrfotaoBgl6QmHYFHA1oxn5yQy31sp12ZGTZqWASjA/s220/IMG_4976+copy.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAE1-MxD_fXXM2x2LQupZ5cmaw0m0du18QWRuK3JRWLMk49kd0J8Hc9aRo139wfLj0xhuy6Eghu8CXsLLi1bSS4FchunkT0sqeXa2ImYKHWeen9gYLJvH1lGF4UnVJ3pG6CO9Bs-gW4QEy/s72-c/thought-catalog-back-of-dollar.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6569213714636569218.post-4471103883778632431</id><published>2018-10-10T21:34:00.001-04:00</published><updated>2018-11-01T19:49:47.129-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Criminals"/><category scheme="http://www.blogger.com/atom/ns#" term="Facebook"/><category scheme="http://www.blogger.com/atom/ns#" term="Finances"/><category scheme="http://www.blogger.com/atom/ns#" term="Google"/><category scheme="http://www.blogger.com/atom/ns#" term="Hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="Passwords"/><title type='text'>Protecting Your Online Financial Accounts</title><content type='html'>&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;&quot;&gt;There’s almost no limit to the number of ways cyber criminals can steal our sensitive information and hack our systems. It seems that each week brings more news about large companies announcing that customer data was accessed by hackers. In the past month, both Google and Facebook acknowledged that customer data was compromised. In Facebook’s case it was data of over &lt;a href=&quot;https://www.nytimes.com/2018/09/28/technology/facebook-hack-data-breach.html&quot; target=&quot;_blank&quot;&gt;50 million people&lt;/a&gt;. Google reported &lt;a href=&quot;https://www.washingtonpost.com/technology/2018/10/08/google-overhauls-privacy-rules-after-discovering-exposure-user-data/?utm_term=.1a42924f671c&quot; target=&quot;_blank&quot;&gt;500,000 customers&lt;/a&gt; were affected. Here are effective and simple things you can do that will go a long way toward protecting your online financial accounts:&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;Browser&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;&quot;&gt;Use a different web browser for your financial accounts than you do for Google, GMail, Facebook, Amazon, and other web sites.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;&quot;&gt;If you use Chrome, for example, for your regular web browsing, use Firefox or Safari for your online financial accounts. It prevents hackers from taking advantage of the vulnerabilities related to using one browser.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;&quot;&gt;Clear your history or cache before and after using the browser to access your accounts.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;&quot;&gt;Accounts and Password&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;&quot;&gt;Use a different password for each of your financial accounts.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;&quot;&gt;Use different passwords for your email and Facebook accounts. Facebook is a big target for hackers. If they obtain your Facebook password, the next step is your email account. From there, they target your bank accounts. By using different passwords, you’re adding an extra layer of protection to your important financial accounts.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;&quot;&gt;Definitely don’t use your Facebook password for your online financial accounts. &lt;a name=&#39;more&#39;&gt;&lt;/a&gt;Facebook is a huge target. As mentioned earlier, 500 million accounts were recently compromised. If cyber criminals get your Facebook password and it’s the same password as your financial accounts, you’re risking your wealth for convenience.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;&quot;&gt;As an extra measure, consider using a separate email account dedicated for your online financial accounts.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;&quot;&gt;Use complex passwords.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;&quot;&gt;Change your passwords for all accounts at least once a year.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;&quot;&gt;Use multi factor authentication - a password and then a code texted to your phone.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;&quot;&gt;Use a password saving app like Last Pass or the browser’s built in password saving mechanism. There is a risk that if someone hacks your system, they have access to all of your accounts via the saved passwords. That risk, however, is offset by not using the same password for multiple sites.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;&quot;&gt;If you do want to enter passwords manually, use a pattern that is hard for password cracking applications to guess but is easy for you to remember.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;&quot;&gt;&lt;b&gt;Remember The Basics&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;&quot;&gt;Install anti-virus software on your computer and set it to auto-update each day. Windows now has Defender built-in. Most people with Mac OS do not have anti-virus. That historically has been a safe bet. But everything is secure until it isn’t. Don’t wait for an outbreak or for data to be encrypted by cyber criminals. Install Symantec and McAfee antivirus programs on your Mac.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;&quot;&gt;Avoid free antivirus software from dubious vendors. You get what you pay for.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;&quot;&gt;Set your Mac or Windows computer to automatically install operating system updates.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;&quot;&gt;Don’t use an administrator account for your day-to-day tasks on your computer. Use an unprivileged account.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;&quot;&gt;Definitely don’t let your minor child have an administrator account on your computer, especially not the computer you use to conduct financial transactions.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;&quot;&gt;Use a password to log on to your computer. The last thing you want is a house guest or the babysitter accessing your sensitive files.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
</content><link rel='replies' type='application/atom+xml' href='http://www.greghalpin.net/feeds/4471103883778632431/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.greghalpin.net/2018/10/protecting-your-online-financial_10.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/4471103883778632431'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6569213714636569218/posts/default/4471103883778632431'/><link rel='alternate' type='text/html' href='http://www.greghalpin.net/2018/10/protecting-your-online-financial_10.html' title='Protecting Your Online Financial Accounts'/><author><name>Greg Halpin</name><uri>http://www.blogger.com/profile/17719118542703009589</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3-t4qOKvt4VAXacR2IW5Cxa1LkMpWAiHeVhAwVAvu78I7MyzoHJkjLlFOITeM-okQwWq9iCwZL8aqvw-95-UaJrfotaoBgl6QmHYFHA1oxn5yQy31sp12ZGTZqWASjA/s220/IMG_4976+copy.png'/></author><thr:total>0</thr:total></entry></feed>