Control 5 Mapping to the NIST Cybersecurity Framework
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Difficulty
Intermediate
Video Transcription
00:00
Hey, everyone, welcome back to the course. So in the last video, we took a look at a brief overview of CS Control number five, which again is secure configuration for hardware and software on mobile devices, laptops, workstations and servers.
00:12
And this video were to take a look at how control over five maps up to the next cybersecurity framework.
00:18
So some control 5.1 establishing secure configurations writes We need to have a baseline configuration for our I T systems are side security devices as well as if we're working in the critical infrastructure space or I C s R o t. Etcetera. We need to make sure we've got a good secure baseline.
00:37
Some control 5.2 talks about maintaining secure images. So we want to make sure that the images were using to go out and put that on the end user device is actually secure image from us and not just something else. So that maps up to P. R I. P. Dash one
00:53
some control 5.3. We're talking about securely storing the master images because we don't want someone to corrupt that image. Now, one thing I've actually seen on as part of an attack before the health care sector was the corporate intranet. Where
01:10
and users could go and they could click a link to download like software updates for
01:15
various applications
01:17
that the company was using. Attackers actually got in there and manipulated and created a, ah malicious image, and no one knew right. And so people would go in there and download every time there was an update. They'd be downloading a malicious image. So it took a while to get that attack, that infection out
01:36
for that particular organization, and they lost a lot of money doing so. So just
01:38
again, make sure you're securely storing the master images where someone can't just come in once they've breached your network
01:46
and get in there and manipulate this software, right? So just make sure you've got a good master image that securely stored
01:53
some control. 5.4. Talking about deploying System configuration management tools There's not really a one on one match in the next cybersecurity framework for this
02:02
some control. 5.5 implementing automated configuration monitoring system. So as we're
02:09
detecting, things are trying to detect things. We can run vulnerability scans that will then
02:15
automatically detect what's going on with her network. Right where? Where the weaknesses and our software. What's going on here? And so that maps up to the next obvious pretty framework. We kind of seen it before about running vulnerability scans.
02:30
So in this for you, what is? Take a look at how control number five, which again is secure configuration for hardware and software on mobile devices, laptops, workstations and our servers. We took a look at how that maps up to the next cybersecurity framework.
02:43
In the next module, we're gonna take a look in control number six, which is maintenance, monitoring and the analysis of our audit logs.
Up Next
Overview of Control 6
Control 6 Mapping to the NIST Cybersecurity Framework
Overview of Control 7
Control 7 Mapping to the NIST Cybersecurity Framework
Overview of Control 8
Instructed By
Similar Content