4.8
IG2 IG3

Uninstall or Disable Unnecessary Services on Enterprise Assets and Software

Asset Type: Devices
Security Function: Protect

Description

Uninstall or disable unnecessary services on enterprise assets and software, such as an unused file sharing service, web application module, or service function.

Implementation Checklist

1
Assess current protection controls in place
2
Configure and deploy required security controls
3
Test control effectiveness in non-production environment
4
Deploy to production and verify functionality
5
Document configuration and operational procedures

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Exploitation of Unnecessary Services

Integrity

Attackers exploit vulnerabilities in services that are running but not needed for business operations, such as unused web servers, FTP services, or remote desktop on workstations.

Attack Surface Expansion via Unused Application Modules

Confidentiality

Unnecessary application modules and service functions provide additional code paths for attackers to exploit, even though the organization never uses the functionality.

Vulnerabilities (When Safeguard Absent)

Excessive Running Services on Enterprise Assets

Systems run unnecessary services and application modules out of the box, dramatically expanding the attack surface beyond what is required for their intended function.

No Attack Surface Reduction Process

Without a process to identify and disable unnecessary services, each system accumulates exploitable services that increase risk without providing business value.

Evidence Requirements

Type Evidence Item Collection Frequency
Technical Configuration screenshots or exports showing protection controls enabled Captured quarterly
Document Procedure documentation for protection measures Reviewed annually
Document Governing policy document (current, approved, communicated) Reviewed annually