CIS SecureSuite Financial Sector Guide 2024 06
CIS SecureSuite Financial Sector Guide 2024 06
Cybersecurity for
Finance Organizations
June 2024
This is where the CIS Critical Security Controls® The Controls counterbalance a lack of
(CIS Controls®) and the CIS Benchmarks™ can cybersecurity skills and/or expertise internally.
help. We’ll examine both in detail below. A global community of IT and security experts
develop the Controls via consensus. Each
Control consists of multiple CIS Safeguards,
The CIS Critical Security Controls which prescribe individual actions you can
take to improve your cybersecurity posture.
The CIS Controls are prioritized, prescriptive, This removes the guesswork from building
and simplified, and essential security actions the foundations of an effective cyber defense
you can implement to strengthen your cyber program so that you can grow your cyber
defenses against today’s common attack types. maturity regardless of your level of security
In fact, they’re proven to help mitigate common expertise. What’s more, the Controls — which
MITRE ATT&CK are free to download and implement — map
(sub-)techniques to popular frameworks such as the National
associated with Institute of Standards and Technology (NIST)
today’s top common attack types, as shown in Cybersecurity Framework (CSF) v2, helping you
our CIS Community Defense Model v2.0. More to meet your compliance objectives.
specifically,
2 Laying a Foundation with CIS Security Best Practices A Guide to Improving Cybersecurity for Finance Organizations
The CIS Benchmarks The value of the Benchmarks is that they
explain specifically what you need to do to
CIS Control 4 involves securely configuring your securely configure a piece of technology so you
enterprise assets and software. This Control don’t have to guess. Prioritize security efforts
includes Safeguards you can implement in a based on industry best practices. This reduces
general sense, but those Safeguards don’t have human error and minimizes misconfigurations,
specific recommendations for a specific asset or thus shrinking your attack surface. Each
software CIS Benchmark also contextualizes each
you’re using. recommendation with its impact so that you can
Nor could plan your system hardening efforts accordingly.
they. As a finance organization, your business
requirements and technology landscape are Like the Controls, the Benchmarks go through
evolving at an ever increasing ratetoo quickly. a community-driven consensus development
process. In fact, they map back to the Controls,
Fortunately, the CIS Benchmarks can serving as a natural extension of your cyber
help. They consist of secure configuration defense program at the technology level.
guidance for hardening 100+ technologies Additionally, they map to numerous frameworks,
including desktops, mobile devices, and cloud helping you to save time on your compliance
environments across more than 25 product objectives.
vendor families.
In fact, PCI DSS Requirement 2 references
the CIS Benchmarks for security. Combined
with the CIS Controls, the CIS Benchmarks can
help with multiple aspects of PCI compliance,
including firewall and router configurations,
patch management, access control, and
change control.
A Guide to Improving Cybersecurity for Finance Organizations Laying a Foundation with CIS Security Best Practices 3
PCI DSS v4.0
A Case Study in Keeping Up With
Cybersecurity Change for Finance
The CIS Controls and CIS Benchmarks can help The most significant change introduced in
your finance organization to lay a foundation for PCI DSS 4.0 is the Customized Approach,
your cybersecurity and compliance objectives. which allows your finance organization greater
The issue is change. The threat landscape flexibility in selecting methods and controls
keeps changing. Your business environment to manage risks associated with specific
keeps changing. The regulatory environment requirements.
keeps changing.
Moving beyond the strict adherence to technical
Let’s look at PCI DSS as an example. controls mandated by the traditional Defined
Approach, the Customized Approach enables
you to adopt innovative solutions tailored to
The Shift from v3.2.t to v4.0 your environment—provided you can document
and demonstrate to a Qualified Security
PCI DSS v4.0 includes 64 new requirements Assessor (QSA) that your chosen methods
covering the formal requirement of risk meet the stated requirement objectives. This
assessment, strengthened authentication approach offers adaptability but requires
controls (multi-factor and enhanced password additional documentation and custom testing
complexity), software development lifecycle, procedures by the QSA.
automated mechanisms for audit log reviews,
intrusion-detection/prevention techniques, Organizations can use either the Defined
and other areas. On March 31, 2024, 13 of those Approach or the Customized Approach for
requirements went into effect. (PCI DSS 3.2.1 each requirement depending on their specific
retired on that date, as well.) The remaining 51 needs and circumstances. Just make sure
new requirements are future-dated to enter into you discuss the Customized Approach with a
effect on March 31, 2025. QSA before implementation to ensure proper
documentation and assessment.
The changes introduced in PCI DSS 4.0 reflect Acknowledging the changes introduced by PCI
the need to build in and leverage processes to DSS v4.0, the challenge or opportunity will be to
standardize your security controls. The 64 new enhance internal practices to address the new
requirements provide a threat-aware approach controls as well as the updated requirements.
to managing your systems and data against The emphasis on proactive approaches and
the ever-changing landscape of cybersecurity complete awareness of data processing across
threats, the availability of new defensive options, your payment infrastructure in particular will
and the impact of new regulatory requirements. certainly have implications for those meeting
The Customized Approach in particular only the minimum requirements of compliance.
acknowledges this dynamic environment and If you’re a more mature organization engaged
provides you with the flexibility to adapt your with building security programs, you will have
security controls accordingly. some items to augment. Overall, however, you
won’t face too many issues incorporating these
Take the addition of the Targeted Risk Analysis security controls and updates into your program.
to Requirement 12 as an example. This
Analysis is mandatory for organizations that Indeed, while PCI DSS v4.0 introduces
choose to leverage the flexibility offered by significant changes, the core process of
the Customized Approach or for any PCI DSS achieving compliance remains largely similar to
control where the organization has discretion version v3.2.1. The following considerations can
over the frequency of implementation. The guide you to compliance with v4.0:
Targeted Risk Analysis process evaluates
factors that could contribute to the likelihood • If you have intricate and interconnected
and/or impact of a threat to your assets. systems, you may find it a complex endeavor to
By conducting this Analysis, you can make determine the scope of PCI DSS compliance.
informed decisions about which appropriate You’ll need a comprehensive assessment of
security measures to implement based upon your cardholder data environment to identify
your specific risk profile. the systems and processes that fall within the
purview of PCI DSS 4.0.
As another example, PCI DSS v4.0 emphasizes
the importance of awareness and training toof • The implementation process for technical
internal controls. It also identifies multitenant security measures outlined in PCI DSS 4.0 can be
service providers, which reflects the changing a demanding one. You must ensure that you’ve
reality of modern finance and the evolution of properly configured and effectively deployed
the security controls framework. encryption, firewalls, access controls, and other
security technologies to protect cardholder
data. Additionally, you must carefully evaluate
whether to adopt the Defined or Customized
Approach for each requirement, as this decision
will impact your implementation process.
You can save time and money on implementing CIS Build Kits
the Controls and Benchmarks by becomingwith
a CIS SecureSuite® Membership in your CIS Build Kits save you even more time on
journey of continuous compliance and security your system hardening efforts by enabling
improvement. It comes with benefits, tools, you to rapidly deploy secure configurations
and resources to help you strategize your on your technologies in conformance to the
implementation plan and meet the requirements Benchmarks, thus sparing you manual effort
of PCI DSS v4.0, among other standards. Let’s and reducing errors. They’re available as Group
take a look at a few of those benefits now. Policy Objects (GPOs) on Windows and shell
scripts on Linux and Unix machines.
CIS-CAT® Pro
CIS CSAT Pro
The pro version of our CIS Configuration
Assessment Tool (CIS-CAT Pro) enables you The pro version of our Controls Self Assessment
to run automated scans and identify gaps Tool (CIS CSAT Pro) enables you to track
inof your systems’ settings against the secure and prioritize your implementation of the CIS
recommendations of the CIS Benchmarks. Controls. Your environment and security needs
That way, you can quickly see which are unique to you. You can use CIS CSAT Pro to
recommendations you’ve passed and failed, prioritize your implementation of CIS Controls
saving you time and money so that you can plan and Safeguards based on your specific risk
out future hardening tasks and while tracking profile as well as track your progress toward
and addressing instances of configuration drift your cyber maturity goals.
with your team.
Toward that end, you can assign implementation
CIS-CAT Pro also comes with a Dashboard tasks and roles to team members so that you
component that graphically displays the impact collaborate together on strengthening your
of your hardening efforts over a recent period cyber defenses. You can also use CIS CSAT
of time. You can use these results to track Pro to monitor your alignment to frameworks
configuration drift so that you can stay on top like PCI DSS and collect evidence for
of your compliance commitments as well as upcoming audits.
communicate the progress of your efforts to
leadership.
Prior to CIS, he served as the Global Phil’s journey in the tech industry began when
Information Security Compliance Officer for he obtained a Bachelor of Science degree in
GLOBALFOUNDRIES, serving Governance, Electrical and Computer Engineering from
Risk and Compliance (GRC) across the globe. Wayne State University. Later he earned a
Prior to GLOBALFOUNDRIES, Atkinson led Master of Science in Computer Science from
the security implementation for the New Union College, further solidifying his expertise
York State Statewide Financial System (SFS) in the field. Early in his career he worked for
implementation from 2007 to 2014, and his IBM, where he contributed significantly to the
last role and responsibility was as the Internal development and implementation of automated
Control, Risk and Information Security Manager. manufacturing systems. His skills caught the
attention of various industries, leading him to
Atkinson was born in Brooklyn, N.Y. and lived in venture into Industrial Control Systems (ICS),
England for 18 years, graduating from Sheffield Supervisory Control and Data Acquisition
Hallam University in 2000. After moving back (SCADA), and E911 product development
to the United States, he has pursued multiple and deployment. Over the past 12+ years,
degrees and certifications in the IT arena. he has focused on offensive and defensive
cybersecurity strategies. His dedication to
In addition to his work with CIS, Atkinson is also product development and cybersecurity
an adjunct professor of Computer Science at innovation has resulted in four issued patents.
the College of Saint Rose.
Phil’s passion for improving the security of
individuals and organizations alike has become
a driving force in his career. He has earned
considerable recognition for his knowledge
and commitment to the industry, including an
invitation to serve as the CIS representative
on the Board of Advisors for the PCI Security
Standards Council. This role allows him to
contribute his insights to the development
and maintenance of security standards for the
payment card industry, further reinforcing his
commitment to protecting businesses and
consumers from potential cyber risks.
cisecurity.org
info@cisecurity.org
518-266-3460
Center for Internet Security
@CISecurity
TheCISecurity
cisecurity