Skip to main content
  • MassTech
  • Broadband
  • Cyber
  • eHealth
  • Innovation
  • Manufacturing
  • NEMC
MassCyberCenter Logo
  • About
    • Overview
    • Strategy Council
    • Ecosystem
    • Team
    • News
    • Newsletters
    • Events
    • Add an Event
    • Past Events
    • Contact
  • Programs & Grants
    • Cyber Resilient MA Grant
    • ACE Talent Grant
    • Mentorship Program
    • SOC RFP
    • Health Care
  • Municipalities
    • Cyber Resilient Massachusetts
    • Cyber Resilient Massachusetts Working Group
    • Minimum Baseline for Municipalities
    • CyberSecure Deck
    • SOC Range Initiative
    • Resources
  • Small Business/Non-Profit
    • Minimum Baseline for Small Businesses
    • CyberSecure Deck
    • Cyber Resilient MA Grant
    • SOC Range Initiative
    • Resources
  • Workforce Development
    • Jobs Board
    • Cybersecurity Training & Education Working Group
    • ACE Talent Grant
    • SOC Range Initiative
    • Mentorship Program
    • Workforce Development Resources
  • Get Involved
  • MassTech
  • Broadband
  • Cyber
  • eHealth
  • Innovation
  • Manufacturing
  • NEMC

Search

Breadcrumb

  1. Home
  2. Have a Plan

Have a Plan

Actively manage (inventory, track, and correct) all enterprise assets (end-user devices, including portable and mobile; network devices; non-computing/Internet of Things (IoT) devices; and servers) connected to the infrastructure, physically, virtually, remotely, and those within cloud environments, to accurately know the totality of assets that need to be monitored and protected within the enterprise. This will also support identifying unauthorized and unmanaged assets to remove or remediate.

Actively manage (inventory, track, and correct) all software (operating systems and applications) on the network so that only authorized software is installed and can execute, and that unauthorized and unmanaged software is found and prevented from installation or execution.

Use processes and tools to assign and manage authorization to credentials for user accounts, including administrator accounts, as well as service accounts to enterprise assets and software.

Develop a plan to continuously assess and track vulnerabilities on all enterprise assets within the enterprise's infrastructure in order to remediate and minimize the window of opportunity for attackers. Monitor public and private industry sources for new threats and vulnerability information.

Establish a program to develop and maintain an incident response capability (e.g., policies, plans, procedures, defined roles, training, and communications) to prepare, detect, and quickly respond to an attack.
 

Applicable Controls

CIS CONTROLCIS SAFEGUARDASSET TYPESECURITY FUNCTIONTITLEDESCRIPTION

1

1.2

Devices

Respond

Address Unauthorized AssetsEnsure that a process exists to address unauthorized assets on a weekly basis. The enterprise may choose to remove the asset from the network, deny the asset from connecting remotely to the network, or quarantine the asset.

2

2.3

Applications

Respond

Address Unauthorized AssetsEnsure that unauthorized software is either removed from use on enterprise assets or receives a documented exception. Review monthly, or more frequently.

5

5.3

Users

Respond

Disable Dormant AccountsDelete or disable any dormant accounts after a period of 45 days of inactivity, where supported.

7

7.2

Applications

Respond

Establish and Maintain a Remediation ProcessEstablish and maintain a risk-based remediation strategy documented in a remediation process, with monthly, or more frequent, reviews.

17

17.1

N/A

Respond

Designate Personnel to Manage Incident HandlingDesignate one key person, and at least one backup, who will manage the enterprise’s incident handling process. Management personnel are responsible for the coordination and documentation of incident response and recovery efforts and can consist of employees internal to the enterprise, third-party vendors, or a hybrid approach. If using a third-party vendor, designate at least one person internal to the enterprise to oversee any third-party work. Review annually, or when significant enterprise changes occur that could impact this Safeguard.

17

17.2

N/A

Respond

Establish and Maintain Contact Information for Reporting Security IncidentsEstablish and maintain contact information for parties that need to be informed of security incidents. Contacts may include internal staff, third-party vendors, law enforcement, cyber insurance providers, relevant government agencies, Information Sharing and Analysis Center (ISAC) partners, or other stakeholders. Verify contacts annually to ensure that information is up-to-date.

17

17.3

N/A

Respond

Establish and Maintain an Enterprise Process for Reporting IncidentsEstablish and maintain an enterprise process for the workforce to report security incidents. The process includes reporting timeframe, personnel to report to, mechanism for reporting, and the minimum information to be reported. Ensure the process is publicly available to all of the workforce. Review annually, or when significant enterprise changes occur that could impact this Safeguard.

Policy Templates for Security Controls

Acceptable Use Policy Template for the CIS Controls

This template can assist an enterprise in developing acceptable use for the CIS Controls.

Download Template

Enterprise Asset Management Policy Template for CIS Control 1

This template can assist an enterprise in developing an enterprise asset management policy.

Download Template

Software Asset Management Policy Template for CIS Control 2

This template can assist an enterprise in developing a software asset management policy.

Download Template

Account and Credential Management Policy Template for CIS Controls 5 and 6

This template can assist an enterprise in developing an account and credential management policy.

Download Template

Vulnerability Management Policy Template for CIS Control 7 

This template can assist an enterprise in developing a data management policy.

Download Template

Incident Response Policy Template for CIS Control 17

This template can assist an enterprise in developing an incident response policy.

Download Template

Public and Non-Profit Tools

Public and non-profit tools that may support small business and municipalities with inventory discovery.

MassCyberCenter Incident Reporting Planning Brochure

MassCyberCenter Incident Response Planning Resources

SANS Institute Incident Handler’s Handbook

National Institute of Standards and Technology (NIST) Computer Security Incident Handling Guide

 ITS78: Statewide Contract for Data, Cybersecurity, and Related Audit, Compliance, and Incident Responses Services 

Form
Get MassCyberCenter news from the Massachusetts Technology Collaborative in your inbox.
CAPTCHA
This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.
By submitting this form, you are consenting to receive marketing emails from: Massachusetts Technology Collaborative, 75 North Drive, Westborough, MA, 01581, US, https://www.masstech.org.

No thanks, please take me to the website. 

MassCyberCenter Logo

Sign Up for Our Newsletter

  • Contact
  • Procurement
  • Public Notices
  • Privacy Policy
  • Accessibility

Main Campus:
75 North Drive
Westborough, MA 01581
(508) 870-0312

Boston Office:
2 Center Plaza, Suite 200
Boston, MA 02108
(617) 371-3999

  • Visit our page (opens in new tab)
  • Visit our page (opens in new tab)
  • Visit our page (opens in new tab)
  • Visit our page (opens in new tab)
  • Visit our page (opens in new tab)

Privacy Policy Accessibility © 2024 Massachusetts Technology Collaborative