CISA Resources
Who is CISA
The Cybersecurity and Infrastructure Security Agency (CISA) leads the national effort to understand, manage, and reduce risks to the cyber and physical infrastructure of the United States. It connects stakeholders in industry and government with resources, analyses, and tools to improve their cyber, communications, and physical security and resilience. This ensures a secure infrastructure for the American people. Source: CISA Overview
CISA Free Cybersecurity Services and Tools
On September 24, 2022, CISA released a list of free cybersecurity tools and services:
"As part of our continuing mission to reduce cybersecurity risk across U.S. critical infrastructure partners and state, local, tribal, and territorial governments, CISA has compiled a list of free cybersecurity tools and services to help organizations further advance their security capabilities. This living repository includes cybersecurity services provided by CISA, widely used open-source tools, and free tools and services offered by private and public sector organizations across the cybersecurity community." Source: CISA Free Cybersecurity Services
General CISA Cybersecurity Guidelines
Fix known security flaws in software by referencing the CISA Known Exploited Vulnerabilities Catalog. Regularly update software to the latest versions as per vendor instructions.
Implement multifactor authentication (MFA). MFA requires two or more authenticators to verify identity, providing enhanced protection over just a username and password.
Halt bad practices such as using end-of-life software, systems with default passwords, and lacking MFA for critical systems.
Sign up for CISA’s Cyber Hygiene Vulnerability Scanning by emailing vulnerability@cisa.dhs.gov. Weekly reports help secure internet-facing systems.
Get your Stuff Off Search (S.O.S.) by reducing internet-visible attack surfaces. Learn more at Get Your Stuff Off Search (S.O.S.).
CISA Tool Recommendations
Reducing the Likelihood of a Cyber Incident
| Service | Skill Level | Owner | Description | Link |
|---|---|---|---|---|
| Network Reporting | Basic | ShadowServer | Reports on network state and security exposures | ShadowServer |
| Vulcan Cyber Remedy Cloud | Basic | Vulcan Cyber | Searchable database of vulnerability remedies | Remedy Cloud |
| Ransomware Risk Assessment | Basic | Zscaler | Assesses ransomware-specific intrusion defenses | Test My Defenses |
| Internet Threat Exposure | Basic | Zscaler | Evaluates cyber risk posture | Zscaler Scan |
| CISA Vulnerability Scanning | Basic | CISA | Scans public IPs for vulnerabilities | vulnerability@cisa.dhs.gov |
| CISA Web Application Scanning | Basic | CISA | Evaluates web applications for security risks | vulnerability@cisa.dhs.gov |
| Cloudflare DDoS Protection | Basic | Cloudflare | Protects against DDoS attacks | Cloudflare Free |
| Quad9 | Basic | Open Source | Blocks malware and phishing sites | Quad9 |
| Wireshark | Advanced | Open Source | Network protocol analyzer | Wireshark |
| Snort | Advanced | Cisco | Intrusion detection and prevention | Snort |
Other Tools
Microsoft Defender Application Guard: Provides isolated browsing to protect against malware.
BitLocker: Encrypts Windows systems to secure data.
Aircrack: Tests wireless network security.
Ensure Preparedness for Intrusions
Cyber Readiness
Cyber Readiness Check (CRCs): Evaluates organizational security readiness.
Purple Knight: Scans Active Directory for vulnerabilities and risks.
Categorty:Tech
