11192122 - Cybersecurity Training Book

Use Mapping to find the Gaps

CIS Control Group 2, Control 2.7, Asset Type = Application, Security Function = Protect

AllowlistAuthorized Scripts

Use technical controls, such as digital signatures and version control, to ensure that only authorized scripts, such as specific .ps1, .py, etc., files, are allowed to execute. Block unauthorized scripts from executing. Reassess bi-annually, or more frequently.

This is a gap.

Create and apply a group policy to restrict execution of unauthorized PowerShell scripts. https://learn.microsoft.com/en- us/powershell/module/microsoft.powe rshell.core/about/about_execution_po licies?view=powershell-7.2

Made with FlippingBook - Online catalogs