CIS Control 12: Network Infrastructure Management
Establish, implement, and actively manage (track, report, correct) network devices in order to prevent attackers from exploiting vulnerable network services and access points.
Why is this CIS Control Critical?
Secure network infrastructure is an essential defense against attacks. This includes an appropriate security architecture, addressing vulnerabilities that are, often times, introduced with default settings, monitoring for changes, and reassessment of current configurations. Network infrastructure includes devices such as physical and virtualized gateways, firewalls, wireless access points, routers, and switches.
Default configurations for network devices are geared for ease of deployment and ease-of-use -- not security. Potential default vulnerabilities include open services and ports, default accounts and passwords (including service accounts), support for older vulnerable protocols, and pre-installation of unneeded software. Attackers search for vulnerable default settings, gaps, or inconsistencies in firewall rule sets, routers, and switches and use those holes to penetrate defenses. They exploit flaws in these devices to gain access to networks, redirect traffic on a network, and intercept data while in transmission.
Network security is a constantly changing environment that necessitates regular re-evaluation of architecture diagrams, configurations, access controls, and allowed traffic flows. Attackers take advantage of network device configurations becoming less secure over time as users demand exceptions for specific business needs. Sometimes, the exceptions are deployed but not removed when they are no longer applicable to the business's needs. In some cases, the security risk of an exception is neither properly analyzed nor measured against the associated business need and can change over time.
12.1: Ensure Network Infrastructure is Up-to-Date
Ensure network infrastructure is kept up-to-date. Example implementations include running the latest stable release of the software and/or using currently supported network-as-a-service (NaaS) offerings. Review software versions monthly, or more frequently, to verify software support.
Asset Type | Security Function | Implementation Groups |
---|---|---|
Network | Protect | 1, 2, 3 |
Dependencies
- Safeguard 1.1: Establish and Maintain Detailed Enterprise Asset Inventory
Inputs
GV1
: Enterprise asset inventory- Authoritative source of latest version information
- Date of last review of network infrastructure
Operations
-
Use
GV1
to identify and enumerate assets that are part of the network infrastructureGV35
(M1) -
Compare the network infrastructure asset version to the version in Input 2
- Identify and enumerate assets that match the most recent version (M2)
- Identify and enumerate assets that don't match the most recent version (M3)
-
Compare Input 3 to the current date and capture the timeframe in days (M4)
Measures
- M1 = Count of network infrastructure assets
- M2 = Count of network infrastructure assets up to date
- M3 = Count of network infrastructure assets not up to date
- M4 = Timeframe since the last review of network infrastructure
Metrics
- If M4 is greater than thirty days, then this Safeguard is measured at a 0 and receives a failing score. The other metrics don't apply.
Coverage
Metric | The percentage of network infrastructure assets that are up to date |
---|---|
Calculation | M2 / M1 |
12.2: Establish and Maintain a Secure Network Architecture
Design and maintain a secure network architecture. A secure network architecture must address segmentation, least privilege, and availability, at a minimum. Example implementations will not solely include documentation, but also policy and design components.
Asset Type | Security Function | Implementation Groups |
---|---|---|
Network | Protect | 2, 3 |
Dependencies
- Safeguard 12.4: Establish and Maintain Architecture Diagram(s)
- Safeguard 2.1: Establish and Maintain a Software Inventory
Inputs
GV4
: Enterprise network architecture documentationGV5
: Authorized software inventory
Operations
-
Use the network architecture
GV4
to identify and enumerate the segments within the enterprise networkGV36
(M1) -
For each network segment identified in Operation 1, attempt to connect an unauthorized device
- Identify and enumerate segments that allow you to connect unauthorized devices (M2)
- Identify and enumerate segments that do not allow you to connect unauthorized devices (M3)
-
Use
GV5
to identify authorized availability monitoring software -
For each network segment identified in Operation 1, determine whether an authorized availability monitoring software from Operation 3 covers the segment
- Identify and enumerate segments that are covered by availability monitoring software (M4)
- Identify and enumerate segments that are not covered by availability monitoring software (M5)
Measures
- M1 = Count of network segments within the enterprise
- M2 = Count of segments not compliant with least privilege
- M3 = Count of segments compliant with least privilege
- M4 = Count of segments monitored for availability
- M5 = Count of segments not monitored for availability
Metrics
Segmentation
Metric | If M1 is equal to 1, this metric is measured at a 0. Subsequent metrics can still be assessed. |
---|---|
Calculation | If M1 <= 1, Fail or If M1 >= 1, Pass |
Least Privilege
Metric | The percentage of network segments implementing least privilege |
---|---|
Calculation | M3 / M1 |
Availability
Metric | The percentage of network segments monitored for network availability |
---|---|
Calculation | M4 / M1 |
12.3: Securely Manage Network Infrastructure
Securely manage network infrastructure. Example implementations include version-controlled infrastructure-as-code (IaC), and the use of a secure network protocols, such as SSH and HTTPS.
Asset Type | Security Function | Implementation Groups |
---|---|---|
Network | Protect | 2, 3 |
Dependencies
- Safeguard 1.1: Establish and Maintain Detailed Enterprise Asset Inventory
- Safeguard 4.2: Establish and Maintain a Secure Configuration Process for Network Infrastructure
- Safeguard 12.4: Establish and Maintain Architecture Diagram(s)
Inputs
GV36
: Segments within the enterprise networkGV35
: Assets that are part of the network infrastructureGV37
: Network architecture configuration standards
Operations
-
For each asset in Input 2
GV35
, use Input 3GV37
to check for the use of encrypted sessions- Identify and enumerate assets using encrypted sessions (M2)
- Identify and enumerate assets not using encrypted sessions (M3)
-
For each network segment in Input 1
GV36
, check for the use of infrastructure-as-code- Identify and enumerate network segments that use infrastructure-as-code for the whole segment or partial (M5)
- Identify and enumerate network segments that do not use infrastructure-as-code for any portion of the segment (M6)
-
For each network segment identified in Operation 1, use Input 3
GV37
to determine whether the infrastructure-as-code is managed using version control- Identify and enumerate network segments covered by version-controlled infrastructure-as-code (M7)
- Identify and enumerate network segments covered by infrastructure-as-code is not managed through version control (M8)
Measures
- M1 = Count of
GV35
assets that are part of the network infrastructure - M2 = Count of network infrastructure assets using encrypted sessions
- M3 = Count of network infrastructure assets not using encrypted sessions
- M4 = Count of
GV36
segments within the enterprise network - M5 = Count of network segments using infrastructure-as-code
- M6 = Count of network segments not using infrastructure-as-code
- M7 = Count of network segments covered by version-controlled infrastructure-as-code
- M8 = Count of network segments covered by unmanaged infrastructure-as-code
Metrics
Encrypted Session Coverage
Metric | The percentage of network infrastructure assets using encrypted sessions |
---|---|
Calculation | M2 / M1 |
Infrastructure-As-Code Coverage
Metric | The percentage of network segments covered by version-controlled infrastructure-as-code |
---|---|
Calculation | M7 / M4 |
12.4: Establish and Maintain Architecture Diagram(s)
Establish and maintain architecture diagram(s) and/or other network system documentation. Review and update documentation annually, or when significant enterprise changes occur that could impact this Safeguard.
Asset Type | Security Function | Implementation Groups |
---|---|---|
Documentation | Govern | 2, 3 |
Dependencies
- None
Inputs
GV4
: Enterprise network architecture documentation- Date of last review or update to documentation
Operations
-
Determine if Input 1
GV4
exists within the enterprise- If the network architecture documentation exists, M1 = 1
- If the network architecture documentation does not exist, M1 = 0
-
Compare Input 2 to the current date. Capture the timeframe in months.
Measures
- M1 = Output of Operation 1.
- M2 = Timeframe in months of the last review or update to the documentation
Metrics
- If M1 is not provided or available, then this Safeguard is measured at a 0 and receives a failing score. The other metrics don't apply.
- If M2 is greater than twelve months, then this Safeguard is measured at a 0 and receives a failing score. The other metrics don't apply.
12.5: Centralize Network Authentication, Authorization, and AuCentralize network AAA
Centralize network AAA.
Asset Type | Security Function | Implementation Groups |
---|---|---|
Network | Protect | 2, 3 |
Dependencies
- Safeguard 2.1: Establish and Maintain a Software Inventory
Inputs
GV5
: Authorized Software InventoryGV35
: Assets that are part of the network infrastructure
Operations
-
Use Input 1
GV5
to identify and enumerate all AAA services within the enterpriseGV38
(M1) -
For each centralized AAA point identified in Operation 1, determine whether it is necessary or can be consolidated
- Identify and enumerate authentication points that are unnecessary or can be consolidated (M2)
- Identify and enumerate authentication points that are necessary and cannot be consolidated (M3)
-
Use the output of Operation 1 to check if each asset in Input 2
GV35
is covered by at least one AAA system- Identify and enumerate network infrastructure assets that are covered by at least one AAA system (M4)
- Identify and enumerate network infrastructure assets that are not covered by an AAA system (M5)
Measures
- M1 = Count of AAA services within the enterprise
- M2 = Count of unnecessary AAA services
- M3 = Count of necessary AAA services
- M4 = Count of network infrastructure covered by AAA services
- M5 = Count of network infrastructure not covered by AAA services
- M6 = Count of
GV35
Metrics
Centralized AAA
Metric | Percentage of properly centralized AAA services |
---|---|
Calculation | M3 / M1 |
Network Coverage
Metric | Percentage of network infrastructure assets managed through AAA |
---|---|
Calculation | M4 / M6 |
12.6: Use of Secure Network Management and Communication Protocols
Use secure network management and communication protocols (e.g., 802.1X, Wi-Fi Protected Access 2 (WPA2) Enterprise or greater).
Asset Type | Security Function | Implementation Groups |
---|---|---|
Network | Protect | 2, 3 |
Dependencies
- Safeguard 4.2: Establish and Maintain a Secure Configuration Process for Network Infrastructure
- Safeguard 12.2: Establish and Maintain a Secure Network Architecture
Inputs
GV36
: Segments within the enterprise networkGV37
: Network infrastructure configuration standards- Authorized list of secure network management and communication protocols
Operations
-
For each network segment in Input 1
GV36
, use Input 3 to identify communication protocols- Identify and enumerate segments using only communication protocols on the authorized list (M2)
- Identify and enumerate segments using communication protocols not on the authorized list (M3)
-
For each communication protocol identified in Operation 1.1, check configuration standards
GV37
- Identify and enumerate segments using properly configured communication protocols (M4)
- Identify and enumerate segments using improperly configured communication protocols (M5)
-
For each network segment in Input 1
GV36
, use Input 3 to identify network management protocols- Identify and enumerate segments using only network management protocols on the authorized list (M6)
- Identify and enumerate segments using network management protocols not on the authorized list (M7)
-
For each communication protocol identified in Operation 1.1, check configuration standards
GV37
-
Identify and enumerate segments using properly configured network management protocols (M8)
- Identify and enumerate segments using improperly configured network management protocols (M9)
Measures
- M1 = Count of
GV36
- M2 = Count of segments using authorized communication protocols
- M3 = Count of segments using unauthorized communication protocols
- M4 = Count of segments using properly configured authorized communication protocols
- M5 = Count of segments using improperly configured authorized communication protocols
- M6 = Count of segments using unauthorized network management protocols
- M7 = Count of segments using unauthorized network management protocols
- M8 = Count of segments using properly configured authorized network management protocols
- M9 = Count of segments using improperly configured authorized network management protocols
Metrics
Communication Protocol Coverage
Metric | The percentage of network segments using properly configured and authorized communication protocols |
---|---|
Calculation | M4 / M1 |
Network Management Protocol Coverage
Metric | The percentage of network segments using properly configured and authorized network management protocols |
---|---|
Calculation | M8 / M1 |
12.7: Ensure Remote Devices Utilize a VPN and are Connecting to an Enterprise's AAA Infrastructure
Require users to authenticate to enterprise-managed VPN and authentication services prior to accessing enterprise resources on end-user devices.
Asset Type | Security Function | Implementation Groups |
---|---|---|
Devices | Protect | 2, 3 |
Dependencies
- Safeguard 1.1: Establish and Maintain Detailed Enterprise Asset Inventory
- Safeguard 2.1: Establish and Maintain a Software Inventory
- Safeguard 12.5: Centralize Network Authentication, Authorization, and Auditing (AAA)
Inputs
GV1
: Enterprise Asset InventoryGV5
: Authorized Software InventoryGV38
: AAA services within the enterpriseGV37
: Network infrastructure configuration standards
Operations
-
Use Input 1
GV1
to identify and enumerate remote enterprise assetsGV39
(M1) -
Use Input 1
GV1
and Input 2GV5
to identify and enumerate all VPN devices and software (M2) -
Use the output of Operation 2 and Input 4
GV37
to check the configuration of the VPN- Identify and enumerate VPN devices and software properly configured to require authentication prior to granting access (M3)
- Identify and enumerate VPN devices and software not properly configured to require authentication prior to granting access (M4)
-
For each asset identified in Operation 1, check if is covered by a VPN device or software identified in Operation 3.1
- Identify and enumerate assets that are covered by a VPN (M5)
- Identify and enumerate assets that are not covered by a VPN (M6)
-
Use Input 3
GV38
and Input 4GV37
to check configuration of AAA services- Identify and enumerate AAA services properly configured to require authentication prior to granting access (M7)
- Identify and enumerate AAA services not properly configured to require authentication prior to granting access (M8)
-
For each asset identified in Operation 1, check if it is covered by an AAA service identified in Operation 5.1
- Identify and enumerate assets that are covered by an AAA service (M9)
- Identify and enumerate assets that are not covered by an AAA service (M10)
-
Compare the output of Operation 4.1 and 6.1
- Identify and enumerate assets covered by both VPN and AAA (M1)
Measures
- M1 = Count of remote enterprise assets
- M2 = Count of VPN devices and software
- M3 = Count of properly configured VPN devices and software
- M4 = Count of improperly configured VPN devices and software
- M5 = Count of remote assets covered by a properly configured VPN
- M6 = Count of remote assets not covered by a properly configured VPN
- M7 = Count of properly configured AAA services
- M8 = Count of improperly configured AAA services
- M9 = Count of remote assets covered by a properly configured AAA service
- M10 = Count of remote assets not covered by a properly configured AAA service
- M11 = Count of remote assets covered by both VPN and AAA
- M12 = Count of AAA services within the enterprise
Metrics
VPN Compliance
Metric | The percentage of properly configured VPN devices and software |
---|---|
Calculation | M3 / M2 |
AAA Compliance
Metric | The percentage of properly configured AAA services |
---|---|
Calculation | M7 / M12 |
Coverage
Metric | The percentage of remote assets using VPN and AAA |
---|---|
Calculation | M11 / M1 |
12.8: Establish and Maintain Dedicated Computing Resources for All Administrative Work
Establish and maintain dedicated computing resources, either physically or logically separated, for all administrative tasks or tasks requiring administrative access. The computing resources should be segmented from the enterprise's primary network and not be allowed internet access.
Asset Type | Security Function | Implementation Groups |
---|---|---|
Devices | Protect | 3 |
Dependencies
- Safeguard 1.1: Establish and Maintain Detailed Enterprise Asset Inventory
- Safeguard 4.2: Establish and Maintain a Secure Configuration Process for Network Infrastructure
Inputs
GV1
: Enterprise Asset InventoryGV37
: Network infrastructure configuration standards
Operations
-
Use Input 1
GV1
to identify and enumerate assets used for administrative purposes (M1) -
For each asset identified in Operation 1, use Input 2
GV37
to check configurations- Identify and enumerate assets that do not have internet access (M2)
- Identify and enumerate assets that have internet access (M3)
- Identify and enumerate assets that are physically or logically separated from the primary network (M4)
- Identify and enumerate assets that are not physically or logically separated from the primary network (M5)
-
Compare the output of Operation 2.1 and 2.3
- Identify and enumerate assets that do not have internet access and are physically or logically separated (M6)
Measures
- M1 = Count of assets used for administrative purposes
- M2 = Count of assets configured to not allow internet access
- M3 = Count of assets configured to allow internet access
- M4 = Count of assets physically or logically separated from the primary network
- M5 = Count of assets not physically or logically separated from the primary network
- M6 = Count of assets configured to not allow internet access and are physically or logically separated
Metrics
Compliance
Metric | The percentage of properly configured administrative assets |
---|---|
Calculation | M6 / M1 |