A large consortium of users, vendors, and insurers known as the
Center for Internet Security (CIS) this week will hold a meeting to
promote standard security settings for Microsoft’s Windows 2000.
Meanwhile, the group is testing products from Symantec, BindView,
NetIQ, and other companies for use with its own emerging set of
template-based benchmarks, meant to give network managers hands-on
tools for living up to enterprise security policies in Windows, UNIX,
and Linux environments.
The CIS benchmarks “go ‘down in the weeds,’ where detailed
operational security parameters are set, to configure workstations,
servers, routers, firewalls, and other devices,” said CIS
President and CEO Clint Kreitner.
At many organizations, these devices “are either
misconfigured, or they haven’t been properly patched,” according
to Kreitner.
Level 1 Benchmarks Completed
The CIS has more than 170 members, including major insurance
companies, auditing firms, banks, government agencies, manufacturers,
hospitals, manufacturers, software vendors and consultants.
The consortium has already completed “Level 1” security
benchmarks and scoring tools for Solaris, HP-UX, W2K, Linux, as well
as “Level 1 and 2” benchmarks and tools for Cisco IOS
routers. The finished benchmarks and tools are available for free
download on the group’s Web site, at http://www.cisecurity.org
.
The Level 1 benchmarks provide cut-and-paste command lines that
network managers, systems administrators, and other technicians can
use for setting up devices to comply with “industry best
practice” security policies.
The Level 2 benchmarks are aimed more at security consultants and
others who are “slightly more sophisticated about security,”
Kreitner said. Technicians can use the scoring tools to rate policy
compliance, as well as to help find and fix configuration errors.
The benchmarks and tools also “begin to create a language
that can be understood by both (business) managers and technical
people,” according to Kreitner.
The CIS is also certifying commercial software products for use in
specific operating environments. BindView’s bv-Control has already
been certified for W2K and Solaris.
Testing will begin today on Symantec’s Enterprise Security Suite.
Vendors that will undergo certification testing in the future include
NetIQ, among others.
Vendors Leaving Security Up To Users
At the same time, the CIS is urging vendors to ship products with
preconfigured security settings.
“How can we improve security? Vendors are leaving security up
to the users, many of whom don’t have the knowledge or time to
properly deal with it. Why do we accept it when vendors (leave) all
the services widen open? We the users have to push the vendors,”
Kreitner said.
Many organizations tend to want to “get (a product) going
first. Then we worry about security, if we ever do,” he added.
“Does this sound familiar? A (network) break-in occurs. A
well known vulnerability was exploited. Security staff and system
administrators argue about who was to blame. Senior management sees
the process as broken. Staffs are reorganized; managers are
reassigned. The new managers hire a consultant to do a vulnerability
analysis and penetration test. The consultant’s analysis shows an
average of up to 30 vulnerabilities per system,” according to
Kreitner.
“Management writes a memo telling system administrators and
department heads to fix these vulnerabilities within xx weeks. The
work would take months; system administrators don’t make all the
fixes – not even a small fraction. At the same time, new software is
installed, and new vulnerabilities are created.”
CIS benchmarks and scoring tools have already undergone more than
150,000 downloads. Users of the W2K tools include Cervalis, Tulane
University, Virginia Tech, and the US Central Credit Union, for
example. On the Solaris side, users include Agilent Technologies,
Utah State University, Mt. Clements General Hospital, and the US Air
Force Research Laboratory.
“We started with Solaris because there are so many Sun
servers in enterprise environments,” Kreitner noted. The CIS has
already released an upgrade to the original set of benchmarks and
scoring tools for Solaris.
Next to come are a W2K Level 2 IIS benchmark; Solaris Apache Level
1 benchmark; IBM AIX Level 1 benchmark and scoring tools; and
Checkpoint Firewall/VPN Level 1 benchmark and tool.
Also planned for the future are benchmarks and scoring tools for
databases, applications, network appliances, printers, and copiers.
Support Policies With Practical Procedures
Many observers outside the CIS agree that network administrators
need practical tools for implementing enterprise security policies.
“Many security problems are due to operator error. To avoid
those kinds of mishaps, the policies and standards set by managers
should be supported by ‘keystroke to keystroke” procedures,”
said Bob Robinson of Sprint’s Security Practice.
“Any participant in the CIS is doing a great service to its
clients and customers,” said Anil Phull, senior analyst for
security solutions at the Yankee Group.
The CIS was established in October, 2000 to help network users and
operators, as well as their insurers and auditors, reduce the risk of
business disruption due to technical failures or security incursions.
The five founding partners were the Information Systems Audit and
Control Association (ISACA); The American Institute of Certified
Public Accountants (AICPA); the International Information Systems
Security Certification Consortium (ISC); and the SANS Institute.
The organization’s use of benchmark and scoring tools is based on
an approach pioneered in the late 1990s by another CIS member, First
Union (recently merged with Wachovia Bank).
This article was first published on CrossNodes, an internet.com site.
Ethics and Artificial Intelligence: Driving Greater Equality
FEATURE | By James Maguire,
December 16, 2020
AI vs. Machine Learning vs. Deep Learning
FEATURE | By Cynthia Harvey,
December 11, 2020
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
FEATURE | By Samuel Greengard,
November 05, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
FEATURE | By Cynthia Harvey,
October 07, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
Top 10 Machine Learning Companies 2021
FEATURE | By Cynthia Harvey,
September 22, 2020
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.
Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.
Advertise with Us
Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this
site are from companies from which TechnologyAdvice receives
compensation. This compensation may impact how and where products
appear on this site including, for example, the order in which
they appear. TechnologyAdvice does not include all companies
or all types of products available in the marketplace.