CSC consists of best practices compiled from a variety of sectors, including power, defense, transportation, finance and more. Many organizations – especially those with multinational operations – utilize CSC to protect their network by focusing on the top security controls -- those that provide the best protection against the most dangerous threats.
Tenable SecurityCenter Continuous View™ (SecurityCenter CV™) provides an automated approach to implementing and monitoring the CIS Critical Security Controls. It delivers continuous monitoring and out-of-the-box reports, dashboard and the industry’s only Assurance Report Cards (ARCs) to help you address CSC’s five critical tenets: offense informs defense, prioritization, metrics, continuous diagnostics and mitigation, and automation.
Get the Solution Story
Security Frameworks & Tenable
Learn how Tenable SecurityCenter CV automates and continuously monitors technical controls.
Advanced Security With Tenable
SecurityCenter Continuous View (SecurityCenter CV) collects data from multiple sensors to provide advanced analysis of vulnerability, threat, network traffic and event information and deliver a continuous view of IT security across your environment. It gives you the information you need to continuously adapt and improve your security posture to protect your organization.
Supports most technical controls prescribed in the NIST CSF, ISO/IEC 27002 and CIS CSC frameworks, and builds them into an automated control foundation for managing risk and securing the business.
Use active scanning combined with continuous listening to obtain a complete view of control conformance across your environment.
Analyze third-party security products
Audit configurations of many third party products and analyze events generated by them to identify control weaknesses.
Dynamic asset grouping
Focus dashboards to display a complete security and compliance view for services in your industrial control system and IT networks, including physical and virtual infrastructure, cloud and mobile environments.
Measure, visualize, and communicate adherence to controls
Easily measure, visualize and understand your technical control conformance status by using dashboard templates, and identify gaps between where you are and where you want to be.
Map technical control status to business objectives
Use SecurityCenter CV Assurance Report Cards to compare your current security status to the desired status and help you build a roadmap for demonstrating a defensible security program.
“32% of organizations are using the CIS Critical Security Controls. An additional 12% expect to adopt it in the coming year.”Dimensional Research: Trends in Security Framework Adoption, March, 2016