Control 5 Mapping to the NIST Cybersecurity Framework

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

9 hours 54 minutes
Video Transcription
Hey, everyone, welcome back to the course. So in the last video, we took a look at a brief overview of CS Control number five, which again is secure configuration for hardware and software on mobile devices, laptops, workstations and servers.
And this video were to take a look at how control over five maps up to the next cybersecurity framework.
So some control 5.1 establishing secure configurations writes We need to have a baseline configuration for our I T systems are side security devices as well as if we're working in the critical infrastructure space or I C s R o t. Etcetera. We need to make sure we've got a good secure baseline.
Some control 5.2 talks about maintaining secure images. So we want to make sure that the images were using to go out and put that on the end user device is actually secure image from us and not just something else. So that maps up to P. R I. P. Dash one
some control 5.3. We're talking about securely storing the master images because we don't want someone to corrupt that image. Now, one thing I've actually seen on as part of an attack before the health care sector was the corporate intranet. Where
and users could go and they could click a link to download like software updates for
various applications
that the company was using. Attackers actually got in there and manipulated and created a, ah malicious image, and no one knew right. And so people would go in there and download every time there was an update. They'd be downloading a malicious image. So it took a while to get that attack, that infection out
for that particular organization, and they lost a lot of money doing so. So just
again, make sure you're securely storing the master images where someone can't just come in once they've breached your network
and get in there and manipulate this software, right? So just make sure you've got a good master image that securely stored
some control. 5.4. Talking about deploying System configuration management tools There's not really a one on one match in the next cybersecurity framework for this
some control. 5.5 implementing automated configuration monitoring system. So as we're
detecting, things are trying to detect things. We can run vulnerability scans that will then
automatically detect what's going on with her network. Right where? Where the weaknesses and our software. What's going on here? And so that maps up to the next obvious pretty framework. We kind of seen it before about running vulnerability scans.
So in this for you, what is? Take a look at how control number five, which again is secure configuration for hardware and software on mobile devices, laptops, workstations and our servers. We took a look at how that maps up to the next cybersecurity framework.
In the next module, we're gonna take a look in control number six, which is maintenance, monitoring and the analysis of our audit logs.
Up Next