Go back to All Blog posts

CIS Control 12 Explained: Network Infrastructure Management

Ohad Shushan
October 20th, 2022

CIS Control 12 involves network infrastructure management – to actively manage (track, report, correct) network devices. Network infrastructure includes devices such as physical and virtualized gateways, firewalls, wireless access points, routers and switches.

The Importance of Control 12

Secure network infrastructure is vital for defending against attacks. This involves establishing a robust security architecture that addresses vulnerabilities from default settings, along with ongoing monitoring and regular configuration assessments.

Default configurations for network devices often prioritize convenience over security, creating vulnerabilities such as open services and ports, default accounts and passwords (including for services), outdated protocols and unnecessary pre-installed software. Attackers target these weaknesses and gaps in firewall rules, routers and switches and then exploit them to breach defenses, access networks, redirect traffic and intercept data during transmission.

Implementation Groups (IGs)

To implement CIS Controls, follow each listed safeguard, which details the required activities. Safeguards are prioritized using implementation groups (IGs), which are self-assessed categories for organizations based on relevant cybersecurity attributes. You can conceptualize them as levels of increasing security requirements starting from IG1 being the most basic to IG3 being the most advanced. The higher level groups are included in the lower ones.

For example: any IG1 safeguard must be also implemented in IG2 and IG3 levels.

The Safeguards of Control 12

There are eight safeguards in CIS Control 12. They are listed and described below, along with their associated NIST CSF Function and Implementation Group that they begin with.

Safeguard NumberSafeguard TitleNIST Security FunctionStartingImplementation Group
Safeguard 12.1Ensure Network Infrastructure is Up-to-DateProtectIG1
Safeguard 12.2Establish and Maintain a Secure Network ArchitectureRecoverIG1
Safeguard 12.3Securely Manage Network InfrastructureProtectIG2
Safeguard 12.4Establish and Maintain Architecture Diagram(s)GovernIG2
Safeguard 12.5Centralize Network Authentication, Authorization and Auditing (AAA)ProtectIG2
Safeguard 12.6Use of Secure Network Management and Communication ProtocolsProtectIG2
Safeguard 12.7Ensure Remote Devices Utilize a VPN and are Connecting to an Enterprise’s AAA InfrastructureProtectIG2
Safeguard 12.8Establish and Maintain Dedicated Computing Resources for All Administrative WorkProtectIG3

REQUEST A THREAT EXPOSURE REPORT TODAY

Discover the full extent of your online exposure so you can protect it.