9 hours 24 minutes

Video Transcription

Hey, everyone, welcome back to the core. So in the last video, we took a brief overview of CS Control number nine, which again is the limitation in control of network ports, protocols and services.
In this video, we're just gonna take a look at how control number nine maps up to the new cybersecurity framework.
So some control 9.1. We're talking about associate active port services and protocols toe asset inventory. But you'll see here that there's not a 1 to 1 match with CSF
9.2. We're talking about insuring only approved ports protocols and services are running. So a lot of times with malware, it's gonna open a random ports. And if you don't know the baseline of what should be running, then you'll never be able to identify what shouldn't be running right. So just keep that in mind that malware doesn't follow traditional ports,
and the aspect of you may get an infection one time, then you say, OK, it's coming in on portable to say port 5000
but then the next time it comes through in port 5000 and 10.
So just keep that in mind that you want to make sure that you're always ensuring only approved ports. Protocols of services are running
some control. 9.3 performed regular automated port scans to make sure that you're performing those vulnerability scans across your network. Infrastructure
Sub control 9.4 Applying host based firewalls or port filtering And I would say, actually do both but host based firewalls Go ahead and implement those. So your end user workstations are more secure. And that maps up to this opportunity framework. P R I P Dash one
and then some control 9.5. That's where you want to implement application firewall. So again, various levels of firewalls if you're not familiar with that, but application firewalls is something we definitely want to implement.
So in this video, we just took a look at how CS Control number nine again. Control number nine. It's limitation in control of network ports, protocols and services. We we took a look at how that maps up to the NUS cybersecurity framework.
In the next module, we're gonna talk about data recovery capabilities, which is C s control number 10

Up Next

CIS Top 20 Critical Security Controls

This course will provide students with an overview of the CIS Top 20 Critical Security Controls v7.1. Students in this course will learn each CIS control and why it is important to an organization.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor