Why should I want my computer to be CIS compliant?

Home  »  Blog  »  Cyber Security  »  Why should...

By Rob Conella   |   January 31, 2023   |   0 Comments

Why should I want my computer to be CIS compliant?

CIS (Center for Internet Security) compliance refers to adherence to a set of security standards and best practices for protecting computer systems from cyber threats. By ensuring that your computer is CIS compliant, you can help to protect it from potential attacks, such as malware, hacking, and data breaches. This can help to keep your personal information, as well as any sensitive business data, secure and reduce the likelihood of costly security incidents. Additionally, compliance with industry standards such as CIS can be a requirement for many organizations and could be mandatory in certain regulated industries. For further information on CIS Benchmarks, see What are computer security standards and benchmarks?

Keystroke

What can I do to get CIS compliant?

To achieve CIS compliance, you will need to implement a number of security measures and best practices on your computer. Some steps you can take to become CIS compliant include:

  1. Keep your operating system and software up to date: Regularly install updates and patches to fix known vulnerabilities in your software.
  2. Use anti-virus and anti-malware software: Use reputable security software to protect your computer from malware and other malicious software.
  3. Use a firewall: Install and configure a firewall to help protect your computer from unauthorized access.
  4. Use strong passwords: Use long, complex passwords and avoid using the same password for multiple accounts.
  5. Limit access to sensitive data: Only grant access to sensitive data to those who need it to perform their job duties.
  6. Back up important data: Regularly back up important data to protect against data loss in case of an incident.
  7. Use encryption: Use encryption to protect sensitive data when it is stored on your computer or transmitted over the internet.
  8. Implement multi-factor authentication: Use multi-factor authentication to provide an additional layer of security for login.
  9. Regularly monitor and audit your systems: Regularly monitor your systems for security breaches and suspicious activity, and conduct regular security audits to identify vulnerabilities.
  10. Have a incident response plan: Have a plan in place to respond to security incidents in case one occurs.

Furthermore, it’s important to note that CIS compliance can be complex and depending on the size of your organization, it may require a team of security professionals with specific knowledge, experience and certifications to properly implement these controls. It may also require regular testing, monitoring and reporting.

Is there a software or app that can help?

There are several software and apps available that can help you achieve CIS compliance on your computer. Some popular options include:

  1. Secure My Desktop: Great for remote workforces that computers do not connect to a domain controller. Secure My Desktop configures computers to be CIS compliant and gives you a scorecard so you can see where each computer is at.
  2. CIS-CAT Pro: A free tool developed by the Center for Internet Security (CIS) that can assess your system’s compliance with the CIS Benchmarks.
  3. Nessus: A vulnerability scanner that can identify and report on vulnerabilities and misconfigurations on your system.
  4. Tripwire: A security configuration management tool that can help you identify and remediate configuration issues on your system.
  5. McAfee ePO: A security management platform that can help you manage and monitor security on your computer.
  6. Symantec Endpoint Protection: A software that provides endpoint security, including antivirus, firewall, intrusion prevention, and more.
  7. Microsoft Azure Security Center: A cloud-based security management solution that can help you assess the security of your Azure resources.

These are just a few examples of the types of software and apps that are available . It’s important to note that these tools can only help you identify vulnerabilities and misconfigurations. Therefore, it’s up to you to take the necessary steps to remediate them. Compliance is a continuous process and you will need to keep monitoring and updating your controls to stay compliant.


Category: Cyber Security