CIS Control 9: Email and Web Browser Protections
Improve protections and detections of threats from email and web vectors, as these are opportunities for attackers to manipulate human behavior through direct engagement.
Why is this CIS Control Critical?
Web browsers and email clients are very common points of entry for attackers because of their direct interaction with users inside an enterprise. Content can be crafted to entice or spoof users into disclosing credentials, providing sensitive data, or providing an open channel to allow attackers to gain access, thus increasing the risk to the enterprise. Since email and the web are the main means that which users interact with external and untrusted users and environments, these are prime targets for both malicious code and social engineering. Additionally, as enterprises move to web-based email or mobile email access, users no longer use traditional full-featured email clients, which provide embedded security controls like connection encryption, strong authentication, and phishing reporting buttons.
9.1: Ensure Use of Only Fully Supported Browsers and Email Clients
Ensure only fully supported browsers and email clients are allowed to execute in the enterprise, only using the latest version of browsers and email clients provided through the vendor.
Asset Type | Security Function | Implementation Groups |
---|---|---|
Software | Protect | 1, 2, 3 |
Dependencies
- Safeguard 2.1: Establish and Maintain a Software Inventory
Inputs
GV5
: Authorized software inventory- Authoritative source of information indicating supported/unsupported details by product.
Operations
-
Use
GV5
to identify and enumerate web browser and email client software (M1) -
Compare each software identified in Operation 1 to Input 2
- Identify and enumerate software labeled as "supported" that is currently supported (M2)
- Identify and enumerate software labeled as "supported" that is currently unsupported (M3)
- Identify and enumerate software labeled as "unsupported" that is currently unsupported (M4)
- Identify and enumerate software labeled as "unsupported" that is currently supported (M5)
Measures
- M1 = Count of authorized web browser and email client software
- M2 = Count of software labeled as "supported" and currently supported
- M3 = Count of software labeled as "supported" and currently unsupported
- M4 = Count of software labeled as "supported" and currently unsupported
- M5 = Count of software labeled as "supported" and currently supported
Metrics
Percentage of Unsupported Web Browser/Email Client Software in Use
Metric | The percentage of unsupported web browser and email client software in use |
---|---|
Calculation | (M3 + M4) / M1 |
Rate of False Positives
Metric | The percentage of authorized web browser and email client software labeled as "supported" but found to be unsupported |
---|---|
Calculation | M3 / M1 |
Rate of False Negatives
Metric | The percentage of authorized web browser and email client software labeled as "unsupported" but found to be supported |
---|---|
Calculation | M5 / M1 |
9.2: Use DNS Filtering Services
Use DNS filtering services on all end-user devices, including remote and on-premises assets, to block access to known malicious domains.
Asset Type | Security Function | Implementation Groups |
---|---|---|
Devices | Protect | 1, 2, 3 |
Dependencies
- Safeguard 1.1: Establish and Maintain Detailed Enterprise Asset Inventory
- Safeguard 4.1: Establish and Maintain a Secure Configuration Process
Inputs
GV1
: Enterprise asset inventoryGV5
: Authorized software inventoryGV3
: Configuration standards
Operations
-
Use
GV1
to identify and enumerate assets that support DNS filtering (M1) -
Use
GV5
to identify and enumerate authorized DNS filtering services -
For each asset identified in Operation 1, check to see if it is configured properly
GV3
to support authorized DNS filtering services from Operation 2- Identify and enumerate assets properly configured (M2)
-
- Identify and enumerate assets not properly configured (M3)
Measures
- M1 = Count of enterprise assets capable of supporting DNS filtering
- M2 = Count of assets properly configured to support DNS filtering
- M3 = Count of assets not properly configured to support DNS filtering
Metrics
DNS Filtering Coverage
Metric | The percentage of assets configured to use authorized DNS filtering services |
---|---|
Calculation | M2 / M1 |
9.3: Maintain and Enforce Network-Based URL Filters
Enforce and update network-based URL filters to limit an enterprise asset from connecting to potentially malicious or unapproved websites. Example implementations include category-based filtering, reputation-based filtering, or through the use of block lists. Enforce filters for all enterprise assets.
Asset Type | Security Function | Implementation Groups |
---|---|---|
Network | Protect | 2, 3 |
Dependencies
- Safeguard 1.1: Establish and Maintain Detailed Enterprise Asset Inventory
- Safeguard 2.1: Establish and Maintain a Software Inventory
- Safeguard 4.1: Establish and Maintain a Secure Configuration Processs
Inputs
GV1
: Enterprise asset inventoryGV3
: Configuration standardsGV5
: Authorized software inventory
Operations
-
Use
GV1
to identify and enumerate enterprise assets capable of supporting network-based URL filters (M1) -
Use
GV5
to identify authorized web browsers/clients -
For each asset identified in Operation 1 check to see if it is configured properly
GV3
to support authorized web browsers/clients from Operation 2- Identify and enumerate assets properly configured (M2)
- Identify and enumerate assets not properly configured (M3)
Measures
- M1 = Count of enterprise assets capable of supporting network-based URL filters
- M2 = Count of assets properly configured to support network-based URL filters
- M3 = Count of assets not properly configured to support network-based URL filters
Metrics
Coverage
Metric | The percentage of assets configured to use authorized network-based URL filters |
---|---|
Calculation | M2 / M1 |
9.4: Restrict Unnecessary or Unauthorized Browser and Email Client Extensions
Restrict, either through uninstalling or disabling, any unauthorized or unnecessary browser or email client plugins, extensions, and add-on applications.
Asset Type | Security Function | Implementation Groups |
---|---|---|
Software | Protect | 2, 3 |
Dependencies
- Safeguard 1.1: Establish and Maintain Detailed Enterprise Asset Inventory
- Safeguard 2.1: Establish and Maintain a Software Inventory
Inputs
GV1
: Enterprise asset inventoryGV5
: Authorized software inventory
Operations
-
Use
GV1
to identify and enumerate assets subject to browser/email plugin restrictions (M1) -
Use
GV5
to identify authorized browser and email plugins -
For each asset listed in Operation 1, collect the list of installed browser plugins and compare to the output of Operation 2
- Identify and enumerate assets with only authorized browser plugins installed or enabled (M2)
- Identify and enumerate assets with one or more unauthorized browser plugins installed or enabled (M3)
-
For each asset listed in Operation 1, collect the list of installed email plugins and compare to the output of Operation 2
- Identify and enumerate assets with only authorized email plugins installed or enabled (M4)
- Identify and enumerate assets with one or more unauthorized browser plugins installed or enabled (M5)
Measures
- M1 = Count of assets subject to browser/email plugin restrictions
- M2 = Count of assets with only authorized browser plugins installed or enabled
- M3 = Count of assets with unauthorized browser plugins installed or enabled
- M4 = Count of assets with only authorized email plugins installed or enabled
- M5 = Count of assets with unauthorized email plugins installed or enabled
Metrics
Browser Plugin Enforcement Quality
Metric | The percentage of assets compliant with authorized browser plugins |
---|---|
Calculation | M2 / M1 |
Email Client Plugin Enforcement Quality
Metric | The percentage of assets compliant with authorized email plugins |
---|---|
Calculation | M4 / M1 |
9.5: Implement DMARC
To lower the chance of spoofed or modified emails from valid domains, implement DMARC policy and verification, starting with implementing the Sender Policy Framework (SPF) and the DomainKeys Identified Mail (DKIM) standards.
Asset Type | Security Function | Implementation Groups |
---|---|---|
Network | Protect | 2, 3 |
Dependencies
- Safeguard 2.1: Establish and Maintain a Software Inventory
Inputs
- DMARC Policy
- TXT record published in DNS
- The Mail Transfer Agent used by the enterprise
- The Mail User Agent used by the enterprise
Assumptions
- The DMARC configuration policy includes instructions to produce either Aggregate (rua) or Forensic (ruf) reports.
- The enterprise has access to these reports either daily (for Aggregate) or in real-time (for Forensic).
Operations
-
Check if enterprise has a DMARC policy
- If the enterprise has a DMARC policy, M1 = 1
- If the enterprise does not have a DMARC policy, M1 = 0
-
Examine Input 2 for a value indicative of the use of DMARC
- If a value for DMARC is identified, M2 = 1
- If a value for DMARC is not identified, M2 = 0
-
Examine Input 2 for a value indicative of the use of SPF
- If a value for SPF is identified, M3 = 1
-
- If a value for SPF is not identified, M3 = 0
-
Examine Input 2 for a value indicative of the use of DKIM
- If a value for DKIM is identified, M4 = 1
- If a value for DKIM is not identified, M4 = 0
-
Check if enterprise uses a Mail Transfer Agent
- If the enterprise uses a Mail Transfer Agent, M5 = 1
- If the enterprise does not use a Mail Transfer Agent, M5 = 1
-
Check if enterprise uses a Mail User Agent
- If the enterprise uses a Mail User Agent, M6 = 1
- If the enterprise does not use a Mail User Agent, M6 = 1
Measures
- M1 = Output of Operation 1
- M2 = Output of Operation 2
- M3 = Output of Operation 3
- M4 = Output of Operation 4
- M5 = Output of Operation 5
- M6 = Output of Operation 6
Metrics
DMARC Usage
Metric | Usage and configuration of DMARC/SPF/DKIM |
---|---|
Calculation | (M1 + M2 + M3 + M4 + M5 + M6) / 6 |
9.6: Block Unnecessary File Types
Block unnecessary file types attempting to enter the enterprise's email gateway.
Asset Type | Security Function | Implementation Groups |
---|---|---|
Network | Protect | 2, 3 |
Dependencies
- Safeguard 1.1: Establish and Maintain Detailed Enterprise Asset Inventory
- Safeguard 4.1: Establish and Maintain a Secure Configuration Process
Inputs
GV1
: Enterprise asset inventoryGV3
: Configuration standards
Operations
-
Use
GV1
to identify and enumerate assets configured as email gateways (M1) -
Using
GV3
check the attachment blocking configuration for every asset identified in Operation-1- Identify and enumerate email gateways properly configured to block unnecessary attachments (M2)
- Identify and enumerate email gateways not properly configured to block unnecessary attachments (M3)
Measures
- M1 = Count of email gateways
- M2 = Count of properly configured email gateways
- M3 = Count of improperly configured email gateways
Metrics
Coverage
Metric | The percentage of properly configured email gateways |
---|---|
Calculation | M2 / M1 |
9.7: Deploy and Maintain Email Server Anti-Malware Protections
Deploy and maintain email server anti-malware protections, such as attachment scanning and/or sandboxing.
Asset Type | Security Function | Implementation Groups |
---|---|---|
Network | Protect | 3 |
Dependencies
- Safeguard 1.1: Establish and Maintain Detailed Enterprise Asset Inventory
- Safeguard 4.1: Establish and Maintain a Secure Configuration Process
Inputs
GV1
: Enterprise asset inventoryGV3
: Configuration standard
Operations
-
Use
GV1
to identify and enumerate all email servers within the enterprise (M1) -
For each email server identified in Operation 1, use
GV3
to check if native or external anti-malware protections are configured- Identify and enumerate email servers with configured anti-malware protection (M2)
- Identify and enumerate email servers without configured anti-malware protection (M3)
Measures
- M1 = Count of email servers
- M2 = Count of properly configured email servers
- M3 = Count of improperly configured email servers
Metrics
Coverage
Metric | The percentage of properly configured email servers |
---|---|
Calculation | M2 / M1 |