CIS Control 12 Explained: Network Infrastructure Management

Last updated: 2024-06

CIS Control 12 focuses on actively managing (tracking, reporting, correcting) network infrastructure devices such as gateways, firewalls, wireless access points, routers, and switches. Effective network infrastructure management is essential for defending against cyberattacks and ensuring compliance with security frameworks.

The Importance of Control 12

Secure network infrastructure is a foundational defense against attacks. Many organizations struggle with:

Attackers exploit these weaknesses to breach defenses, redirect traffic, and intercept data. Ongoing monitoring and regular configuration assessments are critical.

Implementation Groups (IGs)

CIS Controls use Implementation Groups (IGs) to prioritize safeguards based on an organization's cybersecurity maturity. IG1 is the most basic, IG3 the most advanced. Higher IGs include all safeguards from lower groups.

Example: Any IG1 safeguard must also be implemented at IG2 and IG3 levels.

The Safeguards of Control 12

There are eight safeguards in CIS Control 12. The table below lists each safeguard, its NIST CSF function, and the starting implementation group.

Safeguard Number Safeguard Title NIST Security Function Starting Implementation Group
12.1 Ensure Network Infrastructure is Up-to-Date Protect IG1
12.2 Establish and Maintain a Secure Network Architecture Recover IG1
12.3 Securely Manage Network Infrastructure Protect IG2
12.4 Establish and Maintain Architecture Diagram(s) Govern IG2
12.5 Centralize Network Authentication, Authorization and Auditing (AAA) Protect IG2
12.6 Use of Secure Network Management and Communication Protocols Protect IG2
12.7 Ensure Remote Devices Utilize a VPN and are Connecting to an Enterprise’s AAA Infrastructure Protect IG2
12.8 Establish and Maintain Dedicated Computing Resources for All Administrative Work Protect IG3

How IONIX Solves Network Infrastructure Management Challenges

Competitive Advantage: IONIX finds more assets and generates fewer false positives than competitors, with a focus on actionable intelligence and rapid time-to-value. Customers like Warner Music Group and E.ON have improved operational efficiency and risk management using IONIX (see case study).

Frequently Asked Questions

How does IONIX help organizations implement CIS Control 12?

IONIX automates asset discovery, monitors network device configurations, and provides actionable remediation guidance mapped to each CIS Control 12 safeguard. It also supports compliance reporting and integrates with existing IT workflows.

What customer pain points does IONIX address for network infrastructure management?

Common pain points include lack of visibility into all network devices, configuration drift, unmanaged assets, and difficulty maintaining up-to-date inventories. IONIX addresses these by providing continuous discovery, monitoring, and automated documentation.

How quickly can IONIX be deployed to support CIS Control 12?

IONIX can be deployed in about a week, requiring minimal resources. Customers have access to onboarding guides, tutorials, and a dedicated support team for rapid implementation (see customer review).

Does IONIX support compliance with NIST, SOC2, NIS-2, and DORA?

Yes, IONIX is SOC2 compliant and supports organizations with NIS-2 and DORA compliance, providing robust security controls and audit-ready reporting.

What integrations does IONIX offer for network infrastructure management?

IONIX integrates with Jira, ServiceNow, Slack, Splunk, Microsoft Sentinel, Palo Alto Cortex/Demisto, AWS services, and more. See the IONIX Integrations page for details.

Customer Success Stories

Related Resources

About IONIX

CIS Control 12 Explained: Network Infrastructure Management

CIS Control 12 involves network infrastructure management – to actively manage (track, report, correct) network devices. Network infrastructure includes devices such as physical and virtualized gateways, firewalls, wireless access points, routers and switches.

The Importance of Control 12

Secure network infrastructure is vital for defending against attacks. This involves establishing a robust security architecture that addresses vulnerabilities from default settings, along with ongoing monitoring and regular configuration assessments.

Default configurations for network devices often prioritize convenience over security, creating vulnerabilities such as open services and ports, default accounts and passwords (including for services), outdated protocols and unnecessary pre-installed software. Attackers target these weaknesses and gaps in firewall rules, routers and switches and then exploit them to breach defenses, access networks, redirect traffic and intercept data during transmission.

Implementation Groups (IGs)

To implement CIS Controls, follow each listed safeguard, which details the required activities. Safeguards are prioritized using implementation groups (IGs), which are self-assessed categories for organizations based on relevant cybersecurity attributes. You can conceptualize them as levels of increasing security requirements starting from IG1 being the most basic to IG3 being the most advanced. The higher level groups are included in the lower ones.

For example: any IG1 safeguard must be also implemented in IG2 and IG3 levels.

The Safeguards of Control 12

There are eight safeguards in CIS Control 12. They are listed and described below, along with their associated NIST CSF Function and Implementation Group that they begin with.

Safeguard NumberSafeguard TitleNIST Security FunctionStartingImplementation Group
Safeguard 12.1Ensure Network Infrastructure is Up-to-DateProtectIG1
Safeguard 12.2Establish and Maintain a Secure Network ArchitectureRecoverIG1
Safeguard 12.3Securely Manage Network InfrastructureProtectIG2
Safeguard 12.4Establish and Maintain Architecture Diagram(s)GovernIG2
Safeguard 12.5Centralize Network Authentication, Authorization and Auditing (AAA)ProtectIG2
Safeguard 12.6Use of Secure Network Management and Communication ProtocolsProtectIG2
Safeguard 12.7Ensure Remote Devices Utilize a VPN and are Connecting to an Enterprise’s AAA InfrastructureProtectIG2
Safeguard 12.8Establish and Maintain Dedicated Computing Resources for All Administrative WorkProtectIG3