Skip to main content
Skip table of contents

Center for Internet Security Critical Security Controls Module Suite


The LogRhythm CIS Critical Security Controls Module (CIS CSCM) is a collection of AI Engine rules, investigations, reports and lists to help organizations detect and respond to the most important security and operational events, as well as map to other controls, such as NIST 800.

This guide describes how to deploy the LogRhythm CIS CSCM.


Matrices  

Module Revisions

The AIE Rules, Investigations, and Reports from version 6.1 of the CIS CSCM were remapped to match version 7 of the CIS Controls. The following tables detail the old and new mappings.

AIE Rule ID

AIE Rule Name

CIS v6 control(s)

CIS v7 control(s)

12

CSC: Port Scan then Attack

CSC 9.6, CSC 12.4

CSC 9.5, CSC 12.7

13

CSC: Possible DDoS Detected

CSC 9.6, CSC 12.4

CSC 9.5, CSC 12.7

14

CSC: Multiple Unique Attacks Observed

CSC 8.1, CSC 12.4

CSC 8.1, CSC 12.7

16

CSC: Data Exfiltration Observed

CSC 13.6

deleted

18

CSC: Attack then External Connection

CSC 12.3

CSC 12.6

34

CSC: Password Modified on Multiple Accounts

CSC 16.14, CSC 5.1

CSC16.4

36

CSC: Audit Disabled by Admin

CSC 6.2, CSC 5.1

CSC 6.2

37

CSC: Temporary Account Used

CSC 5.4

CSC 4.8

40

CSC: Local Account Created and Used

CSC 5.4

CSC 4.8

58

CSC: Lateral Movement then Exfil

CSC 13.6

deleted

76

CSC: Disabled Account Auth Failures

CSC 16.8

CSC 16.12

81

CSC: Config Change then Critical Error

CSC 3.6

CSCS 5.1

82

CSC: Recon after Attack

CSC 12.4

CSC 12.7

88

CSC: Disabled Account Auth Success

CSC 16.8

CSC 16.12

95

CSC: SQL Injection Detected

CSC 18.2

CSC 18.10

97

CSC: Cross-site Scripting (XSS) Detected

CSC 18.2

CSC 18.10

99

CSC: Directory Traversal URL

CSC 18.2. CSC 8.1

CSC 18.10, CSC 8.1

158

CSC: Accounts Deleted by Admin

CSC 16.3, CSC 3.6

CSC 16.7, CSC 5.5

159

CSC: Accounts Disabled by Admin

CSC 16.3, CSC 3.6

CSC 16.7, CSC 5.5

160

CSC: Users Added to Admin Group

CSC 5.4, CSC 3.6

CSC 4.8, CSC 5.5

161

CSC: Users Removed from Admin Group

CSC 5.4, CSC 3.6

CSC 4.8, CSC 5.5

162

CSC: Windows RunAs Privilege Escalation

CSC 5.8, CSC 3.6

CSC 4.3, CSC 5.5

165

CSC: Linux sudo Privilege Escalation

CSC 5.8, CSC 3.6

CSC 4.3, CSC 5.5

250

CSC: Password Modified by Another User

CSC 16.14, CSC 5.1

CSC16.4

287

CSC: Abnormal File Access

CSC 3.5

CSC 14.9

383

CSC: New Network Host

CSC 1.2

CSC 1.3

420

CSC: Attack then Inbound Traffic

CSC 12.3

CSC 12.6

432

CSC: DMZ Jumping

CSC 12.9

CSC 12.8

436

CSC: Port Misuse: 80

CSC 12.2

CSC 12.5

437

CSC: Port Misuse: 53

CSC 12.2

CSC 12.5

439

CSC: Allowed Traffic from Non-Whitelist Country

CSC 12.1

CSC 12.3

448

CSC: Inbound SSH on Non-standard Port

CSC 12.2

CSC 12.5

449

CSC: Large Outbound Transfer

CSC 12.10, CSC 13.6

deleted

452

CSC: New Application Detected

CSC 2.3, CSC 12.2

CSC 2.3, CSC 12.5

453

CSC: Excessive Inbound Firewall Denies

CSC 6.5, CSC 12.1

CSC 6.2, CSC 12.3

457

CSC: ICMP Flood Detected

CSC 12.3

CSC 12.6

458

CSC: TCP Flood Detected

CSC 12.3

CSC 12.6

459

CSC: UDP Flood Detected

CSC 12.3

CSC 12.6

460

CSC: Excessive Unknown Application

CSC 12.3

CSC 12.6

464

CSC: Allowed Traffic from Blacklist Country

CSC 12.1

CSC 12.3

471

CSC: Blocked Traffic then Allowed

CSC 12.3

CSC 12.6

488

CSC: Malware Event

CSC 8.1

CSC 8.1

490

CSC: Config Deleted/Disabled

CSC 3.5, CSC 11.3

CSC 5.5, CSC 11.3

492

CSC: Config Modified

CSC 3.5, CSC 11.3

CSC 5.5, CSC 11.3

493

CSC: Config Change After Attack

CSC 11.3, CSC 3.6

CSC 11.3, CSC 5.1

494

CSC: Vulnerability after Software Installed

CSC 4.1

CSC 3.1

495

CSC: Repeat Vulnerability Detected

CSC 4.7

CSC 3.6

496

CSC: Repeat Attacks Against a Host

CSC 12.2

CSC 12.5

497

CSC: Blacklisted User-Agent String

CSC 12.1, CSC 18.2

CSC 12.3, CSC 18.10

498

CSC: Backup Failure Detected

CSC 10.1

CSC 10.1

499

CSC: Blacklisted Egress Port Observed

CSC 9.2, CSC 12.1

CSC 9.4, CSC 12.3

500

CSC: Blacklisted Ingress Port Observed

CSC 9.2, CSC 12.1

CSC 9.4, CSC 12.3

501

CSC: Multiple Passwords Modified by Different User

CSC 16.14, CSC 5.1

CSC 16.4

502

CSC: External DNS Observed

CSC 12.1, CSC 12.8

CSC 12.3

506

CSC: Multiple Failed Access Attempts

CSC 16.6, CSC 5.1

CSC 16.8

507

CSC: Multiple Object Access Failures

CSC 16.6, CSC 5.1

CSC 16.8

508

CSC: New Wireless Host

CSC 1.2, CSC 15.3

CSC 1.3, CSC 15.3

509

CSC: Malware Not Cleaned

CSC 8.1

CSC 8.1

1112

CSC: External Malicious User-Agent

CSC 12.2, CSC 8.1

CSC 12.5, CSC 8.1

1113

CSC: External Malicious URL Characters

CSC 12.2, CSC 8.1

CSC 12.5, CSC 8.1

Report IDReport NameCIS v6 control(s)CIS v7 control(s)

15

Policy Activity Summary

CSC 16.3

CSC 16.7

67

Compliance: Top Attackers

CSC 12.2

CSC 12.5

84

Compliance: System Critical And Error Conditions

CSC 6.4

CSC 6.7

959

Rogue Host Detection Summary

CSC 1.1, CSC 1.4

CSC 1.1, CSC 1.4

1004

Software Installation Summary

CSC 2.3

CSC 2.3

1005

Vulnerabilities By Entity

CSC 4.1, CSC 4.6, CSC 4.7, CSC 4.8

CSC 3.1, CSC 3.6, CSC 3.7

1006

Vulnerabilities By Vulnerability

CSC 4.1, CSC 4.6, CSC 4.7, CSC 4.8

CSC 3.1, CSC 3.6, CSC 3.7

1007

Malware Summary

CSC 8.1

CSC 8.1

1008

Backups Completed

CSC 10.1

CSC 10.1

1015

Top Attackers Summary

CSC 6.4, CSC 6.6

CSC 6.7, CSC 6.6

1019

Top Targeted Applications

CSC 18.2

CSC 18.10

1020

Configuration Change Summary

CSC 11.3

CSC 11.3

1021

Denial Of Service Summary

CSC 9.6

CSC 9.5

1022

Host Compromise Summary

CSC 3.2

CSC 5.2

1023

Backup Critical/Error Summary

CSC 10.1

CSC 10.1

1024

Backup Restore Summary

CSC 10.1, CSC 10.2

CSC 10.1, CSC 10.3

Investigation IDInvestigations NameCIS v6 control(s)CIS v7 control(s)

218

Generic Account Usage

CSC 16.6

CSC 16.8

219

New Domain Hosts

CSC 1.4, CSC 16.9

CSC 1.4, CSC 16.2

220

Removed Domain Hosts

CSC 1.4, CSC 16.9

CSC 1.4, CSC 16.2

221

Configuration Changes

CSC 3.5, CSC 3.2

CSC 5.5, CSC 3.2

222

File Access

CSC 13.6

deleted

223

New Network Hosts

CSC 1.4

CSC 1.4

224

File Access Failure

CSC 13.6

deleted

225

Authentication Failures

CSC 14.6

CSC 14.9

226

Online Storage Usage

CSC 13.7, CSC 13.8

CSC 13.5, CSC 13.4

227

Application Usage

CSC 2.2, CSC 6.4

CSC 2.7, CSC 6.7

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.