CIS Control 4 Explained: Secure Configuration of Enterprise Assets and Software

CIS Control 4 involves the secure configuration of enterprise assets and software. This means establishing a continuous process to manage and ensure that all enterprise assets including endpoints, mobile devices, servers, cloud resources and software are configured securely.

The Importance of Control 4

Not all software and hardware assets are secure in their default configurations. Common issues include default passwords, weak access control policies and unnecessary debugging interfaces, which can create vulnerabilities across various products. Additionally, enterprises often have unique business requirements that necessitate configuration changes such as enabling legacy protocols or using weak cryptography. This further increases their exposure to potential attacks.

Effectively managing security configurations is crucial. Organizations should apply secure default settings for all assets and ensure that any configuration changes or updates go through a formal review and approval process. This helps prevent unauthorized modifications that could compromise security.

Implementation Groups (IGs)

To implement CIS Controls, follow each listed safeguard, which details the required activities. Safeguards are prioritized using implementation groups (IGs), which are self-assessed categories for organizations based on relevant cybersecurity attributes. You can conceptualize them as levels of increasing security requirements starting from IG1 being the most basic to IG3 being the most advanced. The higher level groups are included in the lower ones.

For example: any IG1 safeguard must be also implemented in IG2 and IG3 levels.

The Safeguards of Control 4

There are twelve safeguards in CIS Control 4. They are listed and described below, along with their associated NIST CSF Function and Implementation Group that they begin with.

Safeguard NumberSafeguard TitleNIST Security FunctionStartingImplementation Group
Safeguard 4.1Establish and Maintain a Secure Configuration ProcessGovernIG1
Safeguard 4.2Establish and Maintain a Secure Configuration Process for Network InfrastructureGovernIG1
Safeguard 4.3Configure Automatic Session Locking on Enterprise AssetsProtectIG1
Safeguard 4.4Implement and Manage a Firewall on ServersProtectIG1
Safeguard 4.5Implement and Manage a Firewall on End-User DevicesProtectIG1
Safeguard 4.6Securely Manage Enterprise Assets and SoftwareProtectIG1
Safeguard 4.7Manage Default Accounts on Enterprise Assets and SoftwareProtectIG1
Safeguard 4.8Uninstall or Disable Unnecessary Services on Enterprise Assets and SoftwareProtectIG2
Safeguard 4.9Configure Trusted DNS Servers on Enterprise AssetsProtectIG2
Safeguard 4.10Enforce Automatic Device Lockout on Portable End-User DevicesProtectIG2
Safeguard 4.11Enforce Remote Wipe Capability on Portable End-User DevicesProtectIG2
Safeguard 4.12Separate Enterprise Workspaces on Mobile End-User DevicesProtectIG3