Time
9 hours 54 minutes
Difficulty
Intermediate
CEU/CPE
4

Video Transcription

00:00
Hey, everyone, welcome back to the core. So in the last video, we took a brief overview of CIA's control number 11 which again a secure configuration for network devices like our firewalls, routers and switches.
00:11
In this video, we're to take a look at how that maps up to the noose cybersecurity framework.
00:16
So So control 11.1. This is where we're talking about maintaining standards, security configurations across our network devices. And that matches up to CSF for P R I. P. Dash one
00:30
sub control 11 point twos where we're talking about documentation of our traffic configuration rules.
00:37
Sub control 11.3. This is where we're going to be using automated tools to verify our standard device configurations and then also detect any changes that might transpire.
00:47
So when we talk about this obscure the framework were talking back on things like performing vulnerability scans and just basically monitoring any types of software that we have to see if there's changes. Made.
00:59
Sub Control 11.4 and Song, the latest stable version of any security related updates on all network devices. So just because Microsoft, for example, comes out with packs Tuesday and they come out with all these patches to fix things. It doesn't mean that they're actually going to be stable. Eso a lot of times organizations will wait to see
01:17
what bugs are in there and let those bugs get fixed first and then roll out
01:21
the patches to their systems. It's not always the case, but sometimes that happens.
01:26
Some control. 11.5 matches up to P. R A c. Dash seven. So managing the network devices using multi factor authentication. We talked about that earlier, as well as encrypted sessions.
01:40
Some control 11.6 Just talking about using dedicated machines for all of your administrative tasks. So in this example, it's network administrative task. But again, it's just a good practice for anything you're doing as an admin to have dedicated machines just for that and have checks and balances in place on those machines.
01:59
Some control 11.7 So we were talking about managing the network infrastructure through a dedicated network, and that matches up to P. R. A. C. Dash five.
02:08
So in this video, we just covered a brief overview of how control 11 maps to the next cybersecurity framework again control 11
02:15
is the secure configuration for dark network devices. So such as firewalls, routers and switches.
02:22
In the next video, we're gonna go ahead and set up a firewall. So we're gonna be using PF sense and we'll do a hands on labs. So again, with all these labs in this course, there is a step by step guide of the resource is section sheikhoun. Download that to follow along with the lab.

Up Next

CIS Top 20 Critical Security Controls

This course will provide students with an overview of the CIS Top 20 Critical Security Controls v7.1. Students in this course will learn each CIS control and why it is important to an organization.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor