Use CIS Controls to establish solid protection against the most common attacks. Use Tripwire to provide coverage for the controls.
The CIS Controls are a prioritized list of actions aimed at reducing risk against real-world threats. The list of control areas was initially created by an international consortium of agencies and security experts by analyzing actual incidents. It is regularly updated based on evolving global cybersecurity threats. Tripwire solutions address the top controls, and can help with nearly all of the controls. Implementing these processes establishes a solid foundation upon which additional security and compliance controls can be layered.
Asset discovery is the foundation of any security program. As a defender, you can't protect what you don't know about. Attackers look for the exploitable systems to gain access into your network. Once in, they can attack other systems to further infiltrate your organization. Tripwire products provide an accurate inventory of what's on your network, allowing you to verify they are authorized devices with appropriate configurations, patches and user access controls.
Once you know what’s on your network, the next step is to make sure devices are configured securely. Incorrectly configured systems are one of the most common sources of security breaches. Reduce your attack surface with proactive configuration hardening from Tripwire. Use the system hardening guidelines prescribed in the CIS Controls and supplement them with your specific compliance requirements. Tripwire supports 800 policy and platform combinations.
Unpatched system vulnerabilities are a leading cause of security breaches, and another top six CIS Controls. But with tens of thousands of known vulnerabilities, how do you keep up? With Tripwire's vulnerability prioritization, vulnerabilities are scored between 0 and 50,000 based on impact, ease of exploit, and age. Combine asset value with the vulnerability score to determine an overall prioritization based your organization's business context and exposure.
Device logs record all system activities and are often the key to early detection of a breach. They can also provide the forensic evidence needed to assess past attacks. Collecting and retaining logs is another top security control. But managing the huge volume of log data generated by a typical organization can seem like an impossible task. Tripwire LogCenter enables you to reliably collect, compress, normalize, store and search all log data from a central manager. Gain insight into relationships between suspicious events, system changes, weak configurations, and vulnerabilities. Use the correlation engine to automatically identify and respond to suspicious events.