Skip to main content
  • MassTech
  • Broadband
  • Cyber
  • eHealth
  • Innovation
  • Manufacturing
  • NEMC
MassCyberCenter Logo
  • About
    • Overview
    • Strategy Council
    • Ecosystem
    • Team
    • News
    • Newsletters
    • Events
    • Add an Event
    • Past Events
    • Contact
  • Programs & Grants
    • Cyber Resilient MA Grant
    • ACE Talent Grant
    • Mentorship Program
    • SOC RFP
    • Health Care
  • Municipalities
    • Cyber Resilient Massachusetts
    • Cyber Resilient Massachusetts Working Group
    • Minimum Baseline for Municipalities
    • CyberSecure Deck
    • SOC Range Initiative
    • Resources
  • Small Business/Non-Profit
    • Minimum Baseline for Small Businesses
    • CyberSecure Deck
    • Cyber Resilient MA Grant
    • SOC Range Initiative
    • Resources
  • Workforce Development
    • Jobs Board
    • Cybersecurity Training & Education Working Group
    • ACE Talent Grant
    • SOC Range Initiative
    • Mentorship Program
    • Workforce Development Resources
  • Get Involved
  • MassTech
  • Broadband
  • Cyber
  • eHealth
  • Innovation
  • Manufacturing
  • NEMC

Search

Breadcrumb

  1. Home
  2. Maintain Self Awareness

Maintain Self Awareness

Develop a plan to continuously assess and track vulnerabilities on all enterprise assets within the enterprise's infrastructure in order to remediate and minimize the window of opportunity for attackers. Monitor public and private industry sources for new threats and vulnerability information.

Collect, alert, review, and retain audit logs of events that could help detect, understand, or recover from an attack.

Applicable Controls

CIS ControlCIS SafeguardAsset TypeSecurity FunctionTitleDescription

7

7.1

Applications

Protect

Establish and Maintain a Vulnerability Management ProcessEstablish and maintain a documented vulnerability management process for enterprise assets. Review and update documentation annually, or when significant enterprise changes occur that could impact this Safeguard.

8

8.2

Network

Detect

Collect Audit LogsCollect audit logs. Ensure that logging, per the enterprise’s audit log management process, has been enabled across enterprise assets.

Policy Templates for Security Controls

Vulnerability Management Policy Template for CIS Control 7 
This template can assist an enterprise in developing a data management policy.
Download the template

Audit Log Management Policy Template for CIS Control 8 
This template can assist an enterprise in developing an audit log management policy.
Download the template

Public and Non-profit Tools

CyberTrust Massachusetts Advisory Services
Comprehensive assessment services that review Active Directory, antivirus, internal system, and email vulnerabilities. Free for Plymouth County municipalities.

CISA Cyber Hygiene Service – Vulnerability Scanning
Free to U.S.-based federal, state, local, tribal and territorial governments, as well as public and private sector critical infrastructure organizations. Services include Vulnerability Scanning (continuous monitoring and assessment of internet-accessible network assess to assess host and vulnerability status)  

CISA's Logging Made Easy (LME)
This service is a no-cost log management solution for small to medium-sized organizations with limited resources.  It provides centralized logging and proactive threat detection and delivers enhanced security by allowing organizations to monitor their network, identify users, and actively analyze Sysmon data to quickly identify potential malicious activity.

CISA Cyber Hygiene Service – Web Application Scanning
Free to U.S.-based federal, state, local, tribal and territorial governments, as well as public and private sector critical infrastructure organizations. Web Application Scanning (uncovers exploitable vulnerabilities and misconfigurations) Reports delivered on-demand as well as monthly.  

NSA DIB Cybersecurity Services – Protective DNS 
NSA offers no-cost cybersecurity services to any company that contracts with DoD (sub or prime) or has access to non-public DoD information. Protective DNS (PDNS) is a DNS filter that blocks users from connecting to malicious or suspicious domains. To date, NSA’s PDNS program has blocked 1 billion malicious or suspicious domains, including nation-state spearphishing, malware, botnets, and ransomware activity.

NSA DIB Cybersecurity Services - Attack Surface Management
NSA offers no-cost cybersecurity services to any company that contracts with DoD (sub or prime) or has access to non-public DoD information. Through this service, NSA takes an adversarial approach to illuminate any internet-facing assets, searching for ways your network might be vulnerable. This allows customers to identify and remediate issues before they become compromises. Each customer receives a tailored, prioritized report of issues for mitigation, along with an overview of their organization’s Internet footprint.

CISA SCUBA Tool
The Secure Cloud Business Applications (SCuBA) project provides guidance and capabilities to secure agencies’ cloud business application environments and protect federal information that is created, accessed, shared and stored in those environments.

Nmap ("Network Mapper")
Free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.
 

Form
Get MassCyberCenter news from the Massachusetts Technology Collaborative in your inbox.
CAPTCHA
This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.
By submitting this form, you are consenting to receive marketing emails from: Massachusetts Technology Collaborative, 75 North Drive, Westborough, MA, 01581, US, https://www.masstech.org.

No thanks, please take me to the website. 

MassCyberCenter Logo

Sign Up for Our Newsletter

  • Contact
  • Procurement
  • Public Notices
  • Privacy Policy
  • Accessibility

Main Campus:
75 North Drive
Westborough, MA 01581
(508) 870-0312

Boston Office:
2 Center Plaza, Suite 200
Boston, MA 02108
(617) 371-3999

  • Visit our page (opens in new tab)
  • Visit our page (opens in new tab)
  • Visit our page (opens in new tab)
  • Visit our page (opens in new tab)
  • Visit our page (opens in new tab)

Privacy Policy Accessibility © 2024 Massachusetts Technology Collaborative