CIS Safeguard 2.4: Utilize Automated Software Inventory Tools

CIS Safeguard 2.4: Utilize Automated Software Inventory Tools

By Steve Gold
Posted in Security
On January 14, 2025

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation

Keeping an accurate and up-to-date inventory of software is essential. CIS Safeguard 2.4, "Utilize Automated Software Inventory Tools," ensures that this task is handled with the precision and efficiency reminiscent of Tony Stark's (a.k.a. Iron Man) technological prowess from the Marvel Universe.

Stark's Inventory Management

Imagine Tony Stark, surrounded by his multitude of Iron Man suits and high-tech gadgets. Each piece of technology is meticulously cataloged and tracked by J.A.R.V.I.S., his AI assistant. Similarly, automated software inventory tools act as your own J.A.R.V.I.S., continuously monitoring and recording the software running on your network. This automated process provides real-time visibility into your software assets, much like Stark’s ever-watchful AI.

Real-Time Updates

Tony Stark’s technology is always evolving, with constant updates and modifications. Automated software inventory tools work in the same way, ensuring your inventory is always current. Whether it's a new software installation or an update to an existing application, these tools capture every change, maintaining an accurate inventory without manual intervention.

Efficient and Effective

Just as Stark's high-tech systems allow him to focus on innovation and defense, automated software inventory tools free up valuable IT resources. Instead of manually tracking software, your team can concentrate on more strategic initiatives, confident that the inventory is always accurate and up-to-date.

The Reality

Relying solely on automation for software inventory, as suggested in CIS Safeguard 2.4, is tempting, but it shouldn’t be the end-all solution. Automated software inventory tools are invaluable for efficiency, speed, and accuracy, offering a real-time snapshot of all applications running across an organization’s network. However, these tools have limitations. Automated tools may miss applications that are deeply embedded or only intermittently active or overlook legacy software that isn't well-documented. By combining automation with periodic manual reviews, cross-referencing with IT asset management records, and engaging with end users to identify any unreported software, organizations can build a more complete and accurate inventory. This layered approach ensures that nothing falls through the cracks, enhancing the effectiveness of the CIS safeguard and strengthening overall security posture.

Resources

Here’s a link to the Software Asset Management Policy Template for CIS Control 2 provided free of charge from the fine folks at the Center for Internet Security:

Looking for even more detail? Here you go. If this still doesn’t satisfy your curiosity, DM me.

CIS Control 2 – Inventory and Control of Software Assets

Actively manage (inventory, track, and correct) all software (operating systems and applications) on the network so that only authorized software is installed and can execute, and that unauthorized and unmanaged software is found and prevented from installation or execution.

CIS Safeguard 2.4 - Utilize Automated Software Inventory Tools

Utilize software inventory tools, when possible, throughout the enterprise to automate the discovery and documentation of installed software.

Steve Gold

Steve Gold

Steve Gold is the Cybersecurity Practice Director at Gotham Technology Group (Gotham). He is responsible for providing the vision and thought leadership to expand Gotham’s legacy of success and build a world-class cybersecurity practice. He works closely with Gotham’s customers, industry partners, and subject matter experts to develop relevant solutions for Gotham’s clients and prospects.

Prior to joining Gotham, Steve worked with the Center for Internet Security (CIS), where he expanded the global reach, revenue, and impact of the CIS Benchmarks, CIS Controls, and CIS Hardened Images. He led the efforts to promote the CIS portfolio of low-cost and no-cost cybersecurity products and services that help private and public organizations stay secure in the connected world. He grew a team of security specialists from 12 to over 40 to assist organizations with implementing security best practices in their continual journey of cybersecurity maturity.

During his more than 20-year career, Steve led teams responsible for developing and implementing technology solutions at some of the industry’s most recognized companies such as Varonis, VMware, Dell & Wyse Technology

Steve is a frequent speaker/moderator at industry conferences and webinars, covering a wide array of information security topics. He resides and works remotely in Baltimore, MD.