Protect the Network from the Endpoint with the Critical Security Controls

by G. W. Ray Davidson, PhD
Sept. 1, 2017 0 comments SANS Institute network access control

The endpoint is rapidly evolving and often the first vector of attack into enterprises, according to the SANS 2016 State of Endpoint Security Survey.1 As such, all endpoints should be considered potentially hostile.The increased use of BYOD (bring your own device), COPE (corporate owned, personally enabled) and even IoT (Internet of Things) devices poses particularly challenging problems for organizations. Such devices do not support most conventional endpoint agents and tools, making them unusually difficult to detect and quarantine or remediate on connection to the network. The evolution of the endpoint threat is recognized in the most recent revision of the CIS Critical Security Controls (CSC)—Version 6—which includes a focus on identifying and controlling risk related to all types of endpoints, including corporate-owned devices.