Monday, April 19, 2021
  • Events
  • Interviews
  • Jobs
  • Community Forum
  • Expert Blog
  • Whitepapers
  • Directory
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > The Center for Internet Security to announce its Community Defense Model

The Center for Internet Security to announce its Community Defense Model

The Center for Internet Security (CIS) released its Community Defense Model (CDM). CDM can mitigate approximately 83 percent of all attack techniques found in the MITRE ATT&CK Framework.

Seda Nur Cinar by Seda Nur Cinar
August 31, 2020 5:30 pm
in Cybersecurity
2 min read
0 0
0
The Center for Internet Security to announce its Community Defense Model

The Center for Internet Security (CIS) unveiled its Community Defense Model (CDM). This defense model shows that the CIS Controls – a prioritized and prescriptive set of safeguards that mitigate the most common cyberattacks against systems and networks – mitigate approximately 83 percent of all attack techniques found in the MITRE ATT&CK Framework.

Providing a defensible basis

The CDM maps the Controls to the MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) Framework, and describes how data sources are used to support the mapping to specific Controls and their associated Sub-Controls (Safeguards). In addition to this, the CDM formalizes the documentation of the specific attack patterns mitigated by the Controls including web-application hacking, insider and privilege misuse, malware, ransomware, and targeted intrusions.

CIS President and CEO, John Gilligan
CIS President and CEO, John Gilligan

CIS President and CEO, John Gilligan, said,

“Consistent with our mission, CIS is committed to providing both public and private sector organizations with the tools they can use to help mitigate cyber-attacks. The rigorous and data-driven analysis mapping of the CIS Controls to the MITRE ATT&CK Framework in our Community Defense Model is the most recent step we’re taking to help all organizations start secure and stay secure with basic cyber hygiene. The data and analysis behind this model provide a defensible basis for applying specific best practices to mitigate cyber-attacks.”

While ransomware attacks are the most common types of attacks over the last several years, there are several other attack techniques that can be just as challenging for any organization. the CIS Controls model is separated into three Implementation Groups (IGs), against a variety of other attack techniques:

  • Malware: Implementing IG1 of the CIS Controls can mitigate 79 percent of malware attack pattern techniques. Implementing IG1 is the definition of Basic Cyber Hygiene.
  • Web-Application Hacking: 100 percent of instances of web-application hacking techniques can be defended against by implementing all of the CIS Controls.
  • Insider Privilege & Misuse: 100 percent of the techniques can be defended against by properly implementing the CIS Sub-Controls in IG1.
  • Targeted Intrusion: 80 percent of targeted intrusion techniques can be defended against by implementing all of the CIS Controls.

CIS developed this model by using publicly available data from sources including the Multi-State Information Sharing & Analysis Center (MS-ISAC), the 2019 Verizon DBIR, and CrowdStrike. These sources is to identify the most relevant attack patterns and their frequency.

See more Cyber Security News


Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy
Previous Post

China and Hong Kong Data Center market size will reach $27 billion by 2025

Next Post

Top 7 Data Center News: August 2020

Seda Nur Cinar

Seda Nur Cinar

Editor of Cloud7, Seda is a Linux and opensource enthusiast, security researcher and a web application developer.

Related News

What is cloud security?

What is cloud security?

April 17, 2021 9:02 pm
Radware increases its cloud DDoS attack mitigation capacity to 8 Tbps

Radware increases its cloud DDoS attack mitigation capacity to 8 Tbps

April 17, 2021 4:19 pm
Hostinger launches Patchstack WordPress Security

Hostinger launches Patchstack WordPress Security

April 16, 2021 5:47 pm
GitLab acquires Peach Tech and Fuzzit

GitLab acquires Peach Tech and Fuzzit

April 14, 2021 4:46 am
Next Post

Top 7 Data Center News: August 2020

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Editor's Choice

Ubuntu 21.04 (Hirsute Hippo) Beta ISO’s are ready to download

AlmaLinux OS first stable release is out! Download it now!

Interview: Christian Jäger, CEO of CloudFest

Heficed announced IPXO, World’s first IP marketplace

Interview with Igor Seletskiy on AlmaLinux

7 top hosting control panels for Linux servers

Five trends for data centers in 2021

CentOS co-founder Gregory Kurtzer introduced CentOS replacement: Rocky Linux

How to update Linux Kernel without rebooting?

7 best Linux mail servers

Moosend

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

Check your inbox or spam folder to confirm your subscription.

Recent News

  • What is cloud security?
  • Firefox to remove built-in FTP implementation
  • Crate.io launches CrateDB Edge
  • Radware increases its cloud DDoS attack mitigation capacity to 8 Tbps
  • Kemp introduced enhanced Network Telemetry to load balancer

Dome Binasi, Yesilce Mah. Dalgic Sok. No: 3/5 Kat: 1, Kagithane / Istanbul / Turkey

We bring you the latest news, articles, interviews, reviews, solutions, and videos related to cloud tech, data center, cyber security, web hosting, Linux and so on.

News Categories

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Blockchain

Our Free Modules

  • Events
  • Interviews
  • Jobs
  • Community Forum
  • Expert Blog
  • Whitepapers
  • Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About Us
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2021 Cloud7 News

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
  • Events
  • Interviews
  • Jobs
  • Community Forum
  • Expert Blog
  • Whitepapers
  • Directory

© 2021 Cloud7 News

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.