Do Data & More ApS comply to The CIS 18?

The CIS 18 (Critical Information Security Controls 18) is a set of controls established by the Center for Internet Security (CIS)This describe how D&M comply against cyber threats.

1. Inventory and Control of Hardware Assets:

 We actively manage (inventory, track, and correct) all hardware devices on the network.

  

2. Inventory and Control of Software Assets:

We actively manage (inventory, track, and correct) all software on the network.


3. Continuous Vulnerability Management:

We continuously acquire, assess, and take action on new information in order to identify vulnerabilities, remediate, and minimize the window of opportunity for attackers.


4. Controlled Use of Administrative Privileges:

We have processes and tools used to track/control/prevent/correct the use, assignment, and configuration of administrative privileges on computers, networks, and applications.


5. Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers:

We have established, implemented, and actively managed (track, report on, correct) the security configuration of mobile devices, laptops, servers, and workstations using a rigorous configuration management and change control process to prevent attackers from exploiting vulnerable services and settings.


6. Maintenance, Monitoring, and Analysis of Audit Logs:

We collect, manage, and analyze audit logs of events that could help detect, understand, or recover from an attack.


7. Email and Web Browser Protections:

We minimize the attack surface and the opportunities for attackers to manipulate human behavior through their interaction with web browsers and email systems.


8. Malware Defenses:

We have controls to prevent, detect, and respond to malware.


9. Limitation and Control of Network Ports, Protocols, and Services:

We manage (track/control/correct) the ongoing operational use of ports, protocols, and services on networked devices in order to minimize windows of vulnerability available to attackers.


10. Data Recovery Capabilities:

We have processes and tools used to properly back up critical information with a proven methodology for timely recovery of it.


11. Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches:

We have established, implemented, and actively managed (track, report on, correct) the security configuration of network infrastructure devices using a rigorous configuration management and change control process in order to prevent attackers from exploiting vulnerable services and settings.


12. Boundary Defense:

We have detected/prevented/corrected the flow of information transferring between networks of different trust levels with a focus on security-damaging data.


13. Data Protection:

We have processes and tools used to prevent data exfiltration, mitigate the effects of exfiltrated data, and ensure the privacy and integrity of sensitive information.


14. Controlled Access Based on the Need to Know:

We have processes and tools used to track/control/prevent/correct secure access to critical assets according to the formal determination of which persons, computers, and applications have a need and right to access these assets based on an approved classification.


15. Wireless Access Control:

We have processes and tools used to track/control/prevent/correct the security use of wireless local area networks (LANS), access points, and wireless client systems.


16. Account Monitoring and Control:

We actively manage the life cycle of system and application accounts – their creation, use, dormancy, deletion – in order to minimize opportunities for attackers to leverage them.


17. Security Skills Assessment and Appropriate Training to Fill Gaps:

We have processes and tools used to identify the need for employee training and to execute such training.


18. Incident Response and Management:

We have established and maintained an incident response capability.