Cybersecurity Compliance

Measurable. Understable. Actionable

Critical Security Controls (CIS) for Effective Cyber Defense

Cybersecurity compliance and the management of security risk are clearly two different things. Yet achieving the optimal cyber-defense framework for your organization requires that the two are managed in a mutually supportive fashion. Genians’ Next-Gen NAC supports this approach by leveraging the Center for Internet Security (CIS) Controls.

The CIS Controls leverage the battle-tested expertise of the global IT community to defeat over 85% of common attacks

The CIS Controls provide global standards for cybersecurity. These have become recognized around the world for providing a set of best practices that can be leveraged to secure IT systems and data against attacks.

Compliance Standards

The CIS Controls enable the efficient mapping of compliance programs to standards such as PCI, NIST, ISO, and HIPAA. As Genians can help you achieve the core controls practically, you will be able to reach the balance needed between the dictates of compliance and an organization’s need to effect and maintain operational security.

References

Actionable Cybersecurity Compliance

At their core (6 basic controls among 20), these requirements are designed to ensure comprehensive network and endpoint visibility and to maintain full, ongoing intelligence of all connected devices’ activities. Genians’ Next-Gen NAC supports practical security compliance by providing real-time network surveillance for all the assets in your network and ensures that are all compliant with your IT security policies.

Basic CIS Controls Guide Genian NAC Can
1 Inventory and Control of Hardware Assets Detect all IP-enabled devices on the network and identify their specific platform information
2 Inventory and Control of Software Assets Collect installed software information on all devices.
3 Continuous Vulnerability Management Check the status of IT security policy compliance and remediate non-compliant devices.
4 Controlled Use of Administrative Privileges Authorize devices/users based on users’ roles and responsibilities.
5 Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers Inspect detected devices’ configuration and security settings and maintain security baseline.
6 Maintenance, Monitoring and Analysis of Audit Logs Monitor every single access event by devices and log all access history as part of the audit trail.

Without disturbing existing IT infrastructure or impacting systems availability, Genian NAC gathers and monitors the hardware and software asset information of all IP-enabled devices. It then leverages its Device Platform Intelligence capability to determine each device’s technical and business contextual details, identifies all known or potential device vulnerabilities, establishes the level of user access to be provided, and ensures that all detected devices are being compliant. Additionally, Genians NAC can integrate with security solutions such as NGFW, SIEM, and EMM to share intelligence to respond to cyber threats on time. Additional controls, such as those below, can also be implemented efficiently using Genian NAC.

7. Email and Web Browser Protections
8. Malware Defenses
9. Limitation and Control of Network Ports, Protocols and Services
10. Data Recovery Capabilities
11. Secure Configuration for Network Devices, such as Firewalls, Routers and Switches
12. Boundary Defense
13. Data Protection
14. Controlled Access Based on the Need to Know
15. Wireless Access Control
16. Account Monitoring and Control
17. Implement a Security Awareness and Training Program
18. Application Software Security
19. Incident Response and Management
20. Penetration Tests and Red Team Exercises

Genians’ Next-Gen NAC can support the necessary balance between the dictates of compliance and an organization’s need to maintain operational security practice in tandem.