top of page
Search

Continuous Control Monitoring: The Missing Link in Security Visibility

  • Writer: Avraham Cohen
    Avraham Cohen
  • 2 minutes ago
  • 6 min read

By Avraham Cohen, CISO Advisor

In today’s threat landscape, “we think we have this control” is no longer good enough.


Controls are either working or they aren’t, and if you're a CISO trying to defend your organization in real time, relying on outdated spreadsheets, static audits, or periodic attestation won’t cut it.


This is where Continuous Control Monitoring (CCM) comes in.


Do you need any help? Contact me directly at avraham.cohen@sdosecurity.com.


You can download the complete control list below:


What is CCM — and Why Should CISOs Care?

Continuous Control Monitoring automatically and continuously validates that security controls are present, appropriately configured, and operating effectively across your environment.


Think of it as real-time assurance for your security architecture - with clear, measurable evidence that the basics (and beyond) are in place.


However, to make CCM actionable, you must structure your controls meaningfully.


That’s where the Cyber Defense Matrix comes into play.


Organizing CCM With the Cyber Defense Matrix

Control Name

Mapped CDM Category

Risk Level

What is the % of "End of Life" assets used?

Users, Devices

High

What is the % of "End of Support" assets used?

Users, Devices

High

What is the % of "End of Security" assets used?

Users, Devices

High

What is the % of production deployments (last 90 days) with a connected backlog item or incident in case of own development/configuration?

Apps, Network

Medium

What is the % of production deployments (last 90 days) where all code changes part of a production release were peer reviewed and approved?

Apps, Network

High

What is the % of "Everyone with access to the repository has write access" for the main branch enabled?

Apps, Network

High

What is the % of "Deleting this branch is not allowed" for the main branch disabled?

Apps, Network

Medium

What is the % of "Rewriting branch history is not allowed" for the main branch disabled?

Apps, Network

Medium

What is the % of "Check for at least two approvals from default reviewers" for the main branch enforced?

Apps, Network

High

What is the % of "Reset requested changes when the source branch is modified" for the main branch disabled?

Apps, Network

Medium

What is the % of servers without outbound monitoring?

Device, Apps, Network

High

What is the % of internet-facing resources without DDOS Protection?

Apps

Medium

What is the % of Instances that are accessible from the internet?

Device, Apps, Network

High

What is the % of applications with more than two administrators?

Users

Medium

What is the % of inactive users for more than 30 days?

Users

High

What is the % of external users with high-privilege access?

Users

High

What is the % of users with MFA enabled?

Users

High

What is the % of high-privileged users that are required to enable MFA?

Users

High

What is the % of users with MFA enabled that are phishing resistant?

Users

High

What is the % of users that are required to enable MFA?

Users

High

What is the % of users who have access to key vaults?

Users

High

What is the % of users who have access to PAM?

Users

High

What is the % of sensitive business applications with local users?

Users

High

What is the % of users who haven't rotated their password in the last 90 days?

Users

High

What is the % of business applications not using SSO?

Users

High

What is the % of business applications not using strong password complexity?

Users

High

What is the % of non-personal accounts?

Users

Medium

What is the % of non-personal accounts with high-privilege access?

Users

Medium

What is the % of non-personal accounts with multiple roles?

Users

Medium

What is the % of non-personal account requests without reasoning?

Users

Medium

What is the % of employees who are not present in the HR system?

Users

High

What is the % of cloud subscriptions not hosted in multiple zones/regions?

Apps

Medium

What is the % of servers that require a patch?

Device, Apps, Network

Medium

What is the % of servers that have an overdue pending patch?

Device, Apps, Network

High

What is the % of external connections without a web application firewall?

Device, Apps, Network

High

What is the % of firewalls running in blocking mode?

Device, Apps, Network

High

What is the % of servers with RDP port open?

Device, Apps, Network

High

What is the % of servers with SSH port open?

Device, Apps, Network

High

What is the % of managed devices without an EDR solution?

Device, Apps, Network

Medium

What is the % of devices that are not managed by device management?

Device, Apps, Network

High

What is the % of managed devices without disk encryption?

Device, Apps, Network

High

What is the % of managed devices without media storage block enabled?

Device, Apps, Network

High

What is the % of managed devices with outdated operating systems?

Device, Apps, Network

High

What is the % of managed devices with pending security patches?

Device, Apps, Network

High

What is the % of managed devices with vulnerabilities?

Device, Apps, Network

Medium

What is the % of managed devices without a firewall enabled?

Device, Apps, Network

High

What is the % of managed devices with local admin?

Device, Apps, Network

High

What is the % of unmanaged devices that can connect to the network (physical/wireless/VPN)?

Device, Apps, Network

High

What is the % of remote sessions that are not behind a VPN?

Device, Apps, Network

Medium

What is the % of employees who had phishing awareness training in the last 12 months?

Users, Devices

High

What is the % of employees who had password security training in the last 12 months?

Users, Devices

High

What is the % of employees who had social engineering training in the last 12 months?

Users, Devices

High

What is the % of employees who had safe web browsing training in the last 12 months?

Users, Devices

Medium

What is the % of employees who had mobile device security training in the last 12 months?

Users, Devices

Medium

What is the % of employees who had ransomware awareness training in the last 12 months?

Users, Devices

Medium

What is the % of employees who had incident reporting training in the last 12 months?

Users, Devices

Low

What is the % of employees who had insider threat training in the last 12 months?

Users, Devices

Medium

What is the % of engineers who have had secure coding training in the last 12 months?

Users, Devices

High

What is the % of servers that are monitored by an SIEM solution?

All

Medium

What is the % of critical/high alerts in the last 90 days?

All

Medium

What is the % of servers that are scanned by a vulnerability scanner?

Device, Apps, Network

High

What is the % servers that are not scanned in the last 7 days?

Device, Apps, Network

High

What is the % vulnerabilities that are not solved within the defined SLA?

Device, Apps, Network

High

What is the % of internet-facing resources with a high-profile vulnerability?

Device, Apps, Network

High

What is the % of secrets found in the application source code?

Device, Apps, Network

High

What is the % of cloud subscriptions without CIS benchmark?

Device, Apps, Network

High

What is the % of cloud subscriptions with less than 80% CIS compliance?

Device, Apps, Network

Critical

What is the % of VPN login logs sent to the SIEM?

All

High

What is the % of applications utilizing secrets vaults for secret management?

Device, Apps, Network

Medium

What is the % of critical business systems with verified backup in place?

Apps

Medium

What is the % of corporate accounts monitored for credential leaks on the dark web?

Apps

High

What is the % of sensitive data access limited to approved individuals?

Data

High

What is the % of sensitive data stores with access logging enabled?

Data

High

What is the % of managed devices sending logs to the SIEM?

All

High

What is the % of devices with at least one non-default compliance policy assigned?

Device, Apps, Network

Medium

What is the % of email systems with anti-spam and anti-phishing controls enabled?

Device, Apps, Network

Medium

What is the % of inbound emails scanned for malware in attachments and links?

Device, Apps, Network

Medium

What is the % of email domains correctly configured with SPF, DKIM, and DMARC?

Device, Apps, Network

Medium

What is the % of high-risk accounts protected by a PAM solution?

Users

High

What is the % of systems with immutable backups enabled and tested?

Apps

High


Final Words for the CISO

As a CISO, your mandate isn't just to deploy controls, it's to ensure they work continuously everywhere.


CCM bridges the gap between security intention and execution, and when structured through the Cyber Defense Matrix, you gain:

  • Clear visibility across functions and assets

  • A way to prioritize based on real risk and control gaps

  • A living maturity model you can explain to your board


You don’t need perfection, but you do need evidence.


Security isn’t static, and your assurance model shouldn’t be either.



 
 

Recent Posts

See All

The New Standard
in Cyber Security

Knowledge Base

Address

Alkmaar, 1827NR
Netherlands

Contact

+31-619069970

info@sdosecurity.com

Opening Hours

Mon - Fri

8:00 am – 8:00 pm

© 2020 by SDO Security

  • LinkedIn
bottom of page