Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • The New CIS Community Defense Model (CDM) Brings Security Within the Grasp of All Small Organizations
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

The New CIS Community Defense Model (CDM) Brings Security Within the Grasp of All Small Organizations

4 years ago Bob Covello
The New CIS Community Defense Model (CDM) Brings Security Within the Grasp of All Small Organizations

Part of operating an effective security program is the ability to never rest upon any previous success. When guarding against an adversary, yesterday’s success is quickly eclipsed by the dynamic shift in the attacker’s tactics. Just as a doctor “rules out” a particular diagnosis, an effective attacker first searches for well-known vulnerabilities using catalogs of offensive exploits. These are part of the attacker’s playbook.

Thankfully, the Center for Internet Security (CIS) has always been and continues to be dedicated to offering some of the best guidance for those entrusted with protecting online systems. Similar to the necessity of continuous improvement for any security program, the CIS team devotes itself to improving upon its previous models. 

Initiated in 2008, The CIS Controls are now in version 8, undergoing changes not only over the course of its journey but also in regards to its stewardship and its name. Initially known as the “Top 20 Controls,” “The CIS Controls” are a vast and considerable undertaking for any organization, so the authors have endeavored to make the job easier for organizations of varying sizes. For example, Version 7 introduced three “Implementation Groups” (IG), which provide a categorized approach for achieving the security level that suits an organization’s capabilities. 

Over the last few years, and in further pursuit of the goal of offering the best practice guidelines for everyone, the CIS created the Community Defense Model (CDM). The model, now updated to version 2, serves a few purposes. One is stated in the executive summary:

Enterprises naturally want to know “How effective are the CIS Controls against the most prevalent types of attacks?”The CDM was created to help answer that and other questions about the value of the Controls based on currently available threat data from industry reports.

Other purposes flow from the overall methodology of the document’s authors, such as:

  • Mapping CIS Safeguards to the MITRE ATT&CK framework.
  • Identification of the security function, that is, independent of any specific attack, the ability of a CIS Safeguard to defend against one or more attacker (sub-)techniques.
  • The use of authoritative data sources to identify the top five attack types that enterprises should defend against.
  • The use of authoritative data sources to determine the attack pattern, which are the sets of attacker (sub-)techniques used in each attack type.
  • Identification of the security value, the benefit of implementing a CIS Safeguard to defend against an individual attack or a group of attacks.

The CDM fulfills a very desperate need in that the CIS controls, coupled with the MITRE ATT&CK framework, create a seemingly overwhelming task for many small organizations. In too many instances, a company will turn away from these lofty goals, opting for a home-grown version of cybersecurity that often fails. The CDM offers the ability to accomplish a true basic hygiene posture in a manageable way.

If one had to devise a single-sentence summary of why an organization should use this model, it would be: The CIS CDM can be directly and empirically mapped to its value. A closer examination of the CDM bears this out. To start, the top five attack types are identified. Malware, Ransomware, Web Application Hacking, Insider Privilege and Misuse, and Targeted Intrusions are addressed with the goal of prevention. Even the most basic defensive steps of IG1 can result in a protection level greater than 77% and up to 86% for each specific type.

While comprehensive, the CDM makes it clear that not all ATT&CK (sub-)techniques map to CIS safeguards and not all ATT&CK (sub-)techniques can be mapped to a mitigation strategy. These are included in the appendices in the CDM. Other appendices include ATT&CK Navigator visualizations for each of the attack types outlined in the document. This is the empirical data that outlines the known attack patterns of the adversary. It is a playbook of defense.

Overall, the level of detail offered in CDM version 2.0 is breathtaking, but not as initially intimidating as the full CIS Controls. This gives small organizations a better opportunity towards establishing an effective cybersecurity program based on an established and industry-recognized set of criteria. It is still not an easy journey, but the CDM moves cybersecurity within closer reach for many who may otherwise choose other unproven methods.

The fact that many of the efforts of the Center for Internet Security are made possible through the work of volunteers shows that we can win the war on cybercrime. It demonstrates the selfless passion and commitment that many still have towards making the internet a safe place.

Of course, if you need help getting started with the CDM or even if you are already fully immersed in your efforts at applying the CIS Controls in your organization, Tripwire is here to help: https://www.tripwire.com/solutions/cis-20.


Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” The New CIS Community Defense Model (CDM) Brings Security Within the Grasp of All Small Organizations” appeared first on TripWire

Source:TripWire – Bob Covello

Tags: Encryption, Malware, Ransomware, TripWire

Continue Reading

Previous NFT Investors Lose $1.7M in OpenSea Phishing Attack
Next Hackers Backdoor Unpatched Microsoft SQL Database Servers with Cobalt Strike

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

8 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

9 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

11 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

How Samsung Knox Helps Stop Your Network Security Breach

12 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

14 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

17 hours ago [email protected] (The Hacker News)

Recent Posts

  • China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
  • CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
  • Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
  • How Samsung Knox Helps Stop Your Network Security Breach
  • Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT