Security builder & leader

Which Information Security Controls Are Most Important?

Comparing Securosis, PwC, and SANS 20 Critical Controls projects, system hardening appears across all three lists. Other consistently important controls include centralized security event monitoring, vulnerability management programs, and data leakage prevention. A risk assessment should guide which controls apply to each organization.

Which of the many information security controls that an organization could implement should it focus on implementing? I don’t think one can answer this question in a generic sense, especially since there is little data to indicate what actually, really works in security. However, I can recommend a few starting points for building a security program.

The authoritative framework published as part of ISO 27001 and 27002 lists numerous controls, many of which are relevant to enterprises looking to manage information security risks. Yet, where should one start? Which of the measures are most important, providing the most bang for the buck? ISO 27001 highlights the importance of undergoing a risk assessment to decide which of the controls are relevant for the particular organization. Unfortunately, many companies don’t know how to conduct a risk assessment or, having conducted one, didn’t get much out of the exercise.

Are there any security controls that are so essential, that they should apply to most environments? PCI Data Security Standard (DSS) attempts to provide such guidance, but even that prescriptive document can be overwhelming to many organizations. Is there a simpler starting point?

A Quick Look at 3 Security Projects

Seeking to understand which security controls are deemed to be particularly useful by my peers, I looked at the following projects:

Each organization used different approaches for determining which controls to focus on, and I cannot directly compare the listing of security measures produces as part of these independent efforts. However, I feel comfortable using them to assess which security measures come to mind of security professionals when they are asked to prioritize controls.

Highlighting a Few Security Controls

There was one security control that was present in all 3 listings, though in slightly different forms: The definition and enforcement of security standards for the configuration and hardening of computer systems. Not only can this make the system more resilient to a compromise, but also this step can act as a starting point for a change management program. An unwanted change—a deviation from the baseline—can make the system more vulnerable and might, in itself, be an indicator of compromise.

Another control that I’d like to highlight is the centralized collection and monitoring of security events. (It was mentioned in 2 listings.) Without having visibility into what goes on within your environment, you will have a hard time identifying policy violations, noticing security incidents and responding to intrusions.

I’d also like to mention the need to establish a vulnerability management program to identify and remediate security configuration weaknesses and missing security patches*.*(This control was present in 2 listings.) Many attacks succeed by taking advantage of security vulnerabilities for which patches existed, but weren’t applied.

Lastly, it’s worth pointing out the need to monitor and restrict the distribution of sensitive data throughout the enterprise, especially as it is transported out of the network or through the use of removable media. (This control was in 2 listings under the heading of Data Leakage Prevention, a.k.a. DLP.) Even of attackers bypass your other security controls and access sensitive data, you may be able to detect and block their attempts to exfiltrate the data out of the environment.

Perhaps these few controls present a good start that applies to many enterprises. Many more controls are necessary to establish an effective information security program and, as pointed out by ISO 27001, their selection and implementation should be based on the risk assessment conducted by the organization.

Listing of Controls from the 3 Security Projects

Below is my summary of the controls referenced in the security projects I mentioned above. The reason for the limited overlap is mostly because the controls were selected using different criteria and for different purposes. Also, I think it highlights the difference in opinions across the information security industry.

To view the large version of the table, click the image.

About the Author

Lenny Zeltser is a cybersecurity executive with deep technical roots, product management experience, and a business mindset. As CISO at Axonius, he leads the security and IT program, focusing on trust and growth. He is also a Faculty Fellow at SANS Institute and the creator of REMnux, a popular Linux toolkit for malware analysis. Lenny shares his perspectives on security leadership and technology at zeltser.com.

Learn more →