Control 11 Mapping to the Cybersecurity Framework

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

9 hours 54 minutes
Video Transcription
Hey, everyone, welcome back to the core. So in the last video, we took a brief overview of CIA's control number 11 which again a secure configuration for network devices like our firewalls, routers and switches.
In this video, we're to take a look at how that maps up to the noose cybersecurity framework.
So So control 11.1. This is where we're talking about maintaining standards, security configurations across our network devices. And that matches up to CSF for P R I. P. Dash one
sub control 11 point twos where we're talking about documentation of our traffic configuration rules.
Sub control 11.3. This is where we're going to be using automated tools to verify our standard device configurations and then also detect any changes that might transpire.
So when we talk about this obscure the framework were talking back on things like performing vulnerability scans and just basically monitoring any types of software that we have to see if there's changes. Made.
Sub Control 11.4 and Song, the latest stable version of any security related updates on all network devices. So just because Microsoft, for example, comes out with packs Tuesday and they come out with all these patches to fix things. It doesn't mean that they're actually going to be stable. Eso a lot of times organizations will wait to see
what bugs are in there and let those bugs get fixed first and then roll out
the patches to their systems. It's not always the case, but sometimes that happens.
Some control. 11.5 matches up to P. R A c. Dash seven. So managing the network devices using multi factor authentication. We talked about that earlier, as well as encrypted sessions.
Some control 11.6 Just talking about using dedicated machines for all of your administrative tasks. So in this example, it's network administrative task. But again, it's just a good practice for anything you're doing as an admin to have dedicated machines just for that and have checks and balances in place on those machines.
Some control 11.7 So we were talking about managing the network infrastructure through a dedicated network, and that matches up to P. R. A. C. Dash five.
So in this video, we just covered a brief overview of how control 11 maps to the next cybersecurity framework again control 11
is the secure configuration for dark network devices. So such as firewalls, routers and switches.
In the next video, we're gonna go ahead and set up a firewall. So we're gonna be using PF sense and we'll do a hands on labs. So again, with all these labs in this course, there is a step by step guide of the resource is section sheikhoun. Download that to follow along with the lab.
Up Next