IG2 (Intermediate Cyber Hygiene): Designed for organizations with moderate resources and risk exposure. Includes all IG1 controls plus additional safeguards for more advanced protection and oversight.
Actively manage all enterprise assets (end-user devices including portable and mobile; network devices; non-computing/IoT devices; and servers) connected to the infrastructure physically; virtually; remotely; and those within cloud environments to accurately know the totality of assets that need to be monitored and protected within the enterprise.
Actively manage (inventory; track; and correct) all enterprise assets (end-user devices including portable and mobile; network devices; non-computing/IoT devices; and servers) connected to the infrastructure physically; virtually; remotely; and those within cloud environments to accurately know the totality of assets that need to be monitored and protected within the enterprise.
Implement a process to identify and manage assets that are not authorized.
Establish and maintain a secure method for remotely accessing and managing enterprise assets.
Actively manage all enterprise software installed on enterprise assets to accurately know the totality of software that needs to be monitored and protected within the enterprise.
Actively manage (inventory; track; and correct) all enterprise software installed on enterprise assets to accurately know the totality of software that needs to be monitored and protected.
Only use software that is licensed and supported.
Implement a process to identify and manage software that is not authorized.
Utilize automated tools to collect and maintain the software inventory.
Integrate software inventory data with the broader enterprise asset inventory.
Track and manage software licenses to ensure compliance.
Establish and maintain processes to identify; classify; securely handle; retain; and dispose of data.
Develop and document a data management process to identify; classify; handle; retain; and dispose of data.
Maintain an inventory of sensitive data.
Configure access control lists based on the principle of least privilege.
Retain data as long as required and securely dispose of it afterward.
Use secure methods for data destruction.
Encrypt sensitive data stored on enterprise assets.
Encrypt sensitive data transmitted over networks.
Implement controls to prevent the loss of sensitive data.
Implement monitoring and alerting for access to sensitive data.
Implement controls to restrict the copying or transfer of sensitive data to removable media.
Establish and maintain the secure configuration of enterprise assets (end-user devices including portable and mobile; network devices; non-computing/IoT devices; and servers) and software (operating systems; applications; and firmware).
Establish and maintain secure configuration standards for all enterprise assets and software.
Establish and maintain secure configuration standards for network devices.
Change default passwords and disable unnecessary default accounts.
Remove or disable any software or services that are not required.
Configure automatic session locking after a period of inactivity.
Deploy and maintain a firewall on the network perimeter.
Develop and deploy hardened standard builds for all types of enterprise assets.
Implement strong authentication and access controls for network device management interfaces.
Establish and maintain secure configurations for cloud infrastructure services.
Use processes and tools to assign and manage authorization to enterprise assets and resources.
Maintain a list of all enterprise accounts.
Require unique passwords for all accounts.
Disable accounts that have been inactive for a defined period.
Limit administrative privileges to only those who require them.
Use groups to manage access rights.
Mandate strong password complexity and minimum length requirements.
Implement account lockout mechanisms after a specified number of failed login attempts.
Ensure that service accounts have strong; unique credentials that are managed securely.
Establish specific controls and monitoring for privileged accounts.
Require the use of separate accounts for administrative tasks.
Use processes and tools to manage; grant; and revoke access to enterprise assets and resources.
Define a process for granting access to enterprise assets and data.
Define a process for revoking access when it is no longer needed.
Implement MFA for all accounts.
Implement MFA for all externally facing services.
Securely manage service accounts.
Utilize a centralized system for managing access rights and permissions.
Assign access rights based on roles and responsibilities.
Implement specific access controls for cloud-based resources and services.
Develop a process to identify; report; and manage vulnerabilities.
Develop and maintain a process for identifying; assessing; and remediating vulnerabilities.
Conduct regular automated vulnerability scans.
Address identified vulnerabilities in a timely manner.
Automate the patching of applications.
Integrate vulnerability scanning into the software development lifecycle for internally developed applications.
Regularly scan externally facing websites and applications for vulnerabilities.
Collect; manage; and analyze audit logs of events that could help detect; understand; or recover from a security incident.
Define a process for collecting; reviewing; and retaining audit logs.
Ensure that audit logs are collected from relevant systems.
Retain audit logs for a sufficient period.
Consolidate audit logs from various systems into a central repository.
Regularly review and analyze audit logs for suspicious activity or security incidents.
Ensure that audit logs are retained for the defined retention period.
Minimize the attack surface and the interaction with dangerous websites and email.
Implement measures to filter malicious emails and prevent phishing attacks.
Use security features and extensions to protect web browsers.
Utilize DNS filtering services to block access to malicious or inappropriate websites.
Configure SPF records to prevent email spoofing.
Implement DKIM to add a digital signature to outgoing emails.
Implement DMARC to define how recipient email servers should handle emails that fail SPF and DKIM checks.
Prevent or control the installation; spread; and execution of malicious software (malware) at multiple points in the enterprise.
Install and maintain anti-malware software on all enterprise assets.
Ensure that anti-malware signatures are updated automatically.
Prevent automatic execution of programs from removable media.
Deploy anti-malware solutions at email gateways to scan incoming and outgoing emails.
Deploy anti-malware solutions at web gateways to scan web traffic for malicious content.
Establish and maintain a process to perform data recovery in order to restore systems and data in a timely manner after an event.
Develop and maintain a plan for recovering data in case of loss.
Implement automated backups of critical data.
Securely store backup data.
Ensure that recovery capabilities are isolated from the primary environment.
Conduct periodic testing of data recovery processes.
Establish and maintain network infrastructure devices.
Keep network devices updated and securely configured.
Divide the network into logical segments to limit the impact of security incidents.
Control access to the network based on device and user identity.
Ensure that wireless access points are securely configured and protected.
Implement monitoring of network traffic for suspicious activity.
Implement a security awareness and training program to inform workforce members about threats and required behaviors.
Implement a program to educate users about security threats and best practices.
Provide training on identifying and avoiding social engineering tactics.
Educate users on creating strong passwords and using MFA.
Instruct users on how to handle sensitive data securely.
Perform security awareness training on an ongoing basis.
Educate users on how to identify and report security incidents.
Develop a process to manage service providers.
Maintain a list of all third-party service providers.
Ensure that security requirements are included in agreements with service providers.
Regularly assess the security practices of service providers.
Establish and maintain an incident response plan to prepare for; detect; contain; eradicate; and recover from incidents.
Identify individuals responsible for managing security incidents.
Provide clear instructions and contact information for reporting incidents.
Define a process for reporting and escalating security incidents.
Create a comprehensive plan for responding to security incidents.
Form a dedicated team responsible for handling security incidents.
Regularly test the incident response plan through simulations and exercises.