CIS Controls: What They Are and How They Are Used (2024)

Posted by Adam Marget

Adam Marget

CIS Cybersecurity

The cybersecurity landscape is changing with every new victim. To keep up a solid cybersecurity program in a volatile environment is incredibly challenging. This is where the Centre for Internet Security (CIS) comes into play.

The CIS provides a set of standards that helps organizations build a framework for gauging the effectiveness of their cybersecurity programs. These standards are known as CIS Critical Security Controls or CIS Controls.

What are CIS Controls?

The CIS Critical Security Controls (CIS Controls) are a recommended set of cybersecurity best practices and defensive actions that provide specific and actionable ways to thwart the most pervasive attacks and support compliance in a multiframework environment.

The CIS controls are updated through an informal community process to remain in sync with current cybersecurity best practices and an evolving threat landscape. Experts from government, industry, and academia build up this community, pooling their expertise to identify effective cybersecurity controls.

What is the purpose of CIS Controls?

The CIS Controls are important because they minimize the risk of data breaches, data leaks, IP theft, corporate espionage, privacy loss, DoS and other cyberthreats. CIS controls help companies continuously monitor and maintain cyber defenses irrespective of the alert level (low, mid or high).

The CIS Controls help address the following:

  • Critical areas to establish a risk management program
  • Defensive steps to provide the best value
  • Track risk management program maturity
  • Map your organization’s regulatory and compliance frameworks

Who uses CIS Controls?

The CIS Controls are utilized by thousands of global enterprises, large and small, and are supported by numerous security solution vendors, integrators and consultants. Some users include the Federal Reserve Bank of Richmond, the University of Massachusetts, the states of Idaho, Colorado and Arizona, and the cities of Oklahoma, Portland and San Diego.

Who has endorsed the CIS Controls?

  • The CIS Controls are referenced by the U.S. Government in the National Institute of Standards and Technology (NIST) Cybersecurity Framework as a recommended implementation approach for the Framework.
  • The European Telecommunications Standards Institute (ETSI) has adopted and published the CIS Controls and several of the Controls companion guides.
  • In 2016, in her state’s Data Breach Report, Kamala D. Harris, then California Attorney General, said: “The set of 20 Controls constitutes a minimum level of security – a floor – that any organization that collects or maintains personal information should meet.”
  • The CIS Controls are recommended by organizations as diverse as the National Governors Association (NGA) and the U.K.’s Centre for the Protection of National Infrastructure (CPNI).
  • The National Highway Traffic Safety Administration (NHTSA) recommended the CIS Controls in its draft security guidance to automotive manufacturers.

What is the latest version of CIS Controls?

The latest version of V8 was launched in 2018, which was enhanced from the previous version (V7), aka the CIS Top 20. CIS Control V8 compromises the following:

  • Set of 18 cyber defense Controls from the previous 20 Controls (recommendations)

  • Implementation Group (IG): IGs are divided into three groups and are new recommended guidance for prioritizing the implementation of the Controls

  • The new version consolidates the CIS Controls by activities rather than by who manages the devices

What’s new with the CIS Controls v8?

CIS Controls: What They Are and How They Are Used (1)

CIS Controls List

Under the latest version, the set of 18 cyber defenseControls(recommendations) is classified by activities.

Control 1: Inventory and Control of Enterprise Assets: Organizations should actively manage every end-user device connected to the infrastructure physically, virtually and remotely to their network.

Control 2: Inventory and Control of Software Assets: The active management of all software on the network, including operating systems and individual applications, so that only authorized software is installed and can be executed.

Control 3: Data Protection: Develop processes and technical controls to ensure the safety and integrity of data stored on the network.

Control 4: Secure Configuration of Enterprise Assets and Software: Ensure software (OS and applications) and end-user devices (including portable and mobile, network devices, IoT devices and servers) are configured securely.

Control 5: Account Management: Use processes and tools to assign and manage authorization to credentials for user accounts (admin accounts, service accounts, end-user devices and software).

Control 6: Access Control Management: Manage user credentials and authorization to ensure secure access control across the network.

Control 7: Continuous Vulnerability Management: Develop a plan to continuously identify and monitor vulnerabilities.

Control 8: Audit Log Management: Collect, alert, review and maintain event logs of events that could help detect, understand or recover from an attack.

Control 9: Email and Web Browser Protections: Improve protections and detections of threats from email and web vectors.

Control 10: Malware Defenses: Prevent or control the installation, spread and execution of malware by ensuring sufficient antivirus monitoring.

Control 11: Data Recovery: Establish and maintain data recovery practices to ensure successful recovery following a cyberattack.

Control 12: Network Infrastructure Management: Establish, implement and actively manage network devices to stop attackers from exploiting vulnerabilities.

Control 13: Network Monitoring and Defense: Ensure network infrastructure is monitored and maintained.

Control 14: Security Awareness and Skills Training: Establish and maintain a security awareness program to help employees identify social engineering and phishing attacks.

Control 15: Service Provider Management: Vet third-party service providers and ensure outside partners have robust cybersecurity policies.

Control 16: Application Software Security: Ensure no applications running on the network pose a security risk or create vulnerabilities.

Control 17: Incident Response Management: Establish a program to develop plans for a rapid and robust response to any security incidents.

Control 18: Penetration Testing: Run attack simulations on your network to identify weak points and fix any vulnerabilities.

CIS Implementation Groups

Implementation Groups (IGs) help organizations prioritize CIS Controls based on their resources and risk profile. There are three IGs based on the latest version.

Implementation Group 1 (IG1)

IG1 focuses on basic cyber hygiene. It is comprised of the foundational set of cyber defense Safeguards that every enterprise should apply to guard against the most common attacks. These include maintaining an inventory of all digital assets so that security teams know the totality of what needs to be monitored and protected. There are 56 foundational safeguards to help smaller companies with a smaller IT team, which includes family-run businesses, SMEs and startups.

Implementation Group 2 (IG2)

CIS Implementation Group 2 (IG2) builds upon IG1 foundational Safeguards and brings an additional 74 Safeguards to help IT teams deal with greater operational complexity. IG2 layers in additional cyber defense safeguards that prevent unauthorized software use, enable remote wipe capability for portable end-user devices, document data flows and ensure secure network authentication, to name a few. Organizations with moderate resources and greater risk exposure, like non-IT businesses and medium to large manufacturing industries, will need to implement the IG2 Controls along with IG1.

Implementation Group 3 (IG3)

CIS Implementation Group 3 (IG3) adds 23 more Safeguards directed at organizations that deal with more sophisticated forms of attack. This IG is the most complex to implement and requires cybersecurity experts that specialize in different areas. Mature organizations with significant resources and high-risk exposure from handling critical assets and data need to implement the Safeguards under the IG3 category along with IG1 and IG2.

Enhance data protection with Unitrends

Unitrends Unified BCDR is a comprehensive data backup and disaster recovery platform that supports an organization’s implementation of the CIS Controls through additional hardening and securing of the backup environment.

For instance:

  • Control 11:Unitrends purpose-builtbackup appliancesrun a hardened Linux kernel to secure backups outside of Microsoft Window’s attack surface. Replication of encrypted backups to a secondary appliance, running at colocation or thecloud, enables disaster recovery.
  • Control 9:Spanning, our cloud-to-cloud backup solution for Microsoft 365 and Google Workspace offers powerful security integrations to help protect users and accounts withautomated phishing defenseandDark Web Monitoring.
  • Control 6:Unitrends central management console,UniView, secures access to the backup environment with 2FA. Once inside the environment, Role-Based Access Control may be used to limit user access or scope within the backup environment, limiting the actions they may perform or the backups they have access to, as appropriate with the functions of their role.

Want to see how Unitrends Unified BCDR can help enhance your data protection and disaster recovery posture?Request a demotoday!

CIS Controls: What They Are and How They Are Used (2024)
Top Articles
Explore GOOGLEFINANCE to Track Stocks and Currency in 2024
Here's how much equity the average homeowner has now
Busted Newspaper Zapata Tx
Fat People Falling Gif
80 For Brady Showtimes Near Marcus Point Cinema
Ross Dress For Less Hiring Near Me
9192464227
Obituary (Binghamton Press & Sun-Bulletin): Tully Area Historical Society
Elden Ring Dex/Int Build
How To Delete Bravodate Account
Walgreens On Nacogdoches And O'connor
Richmond Va Craigslist Com
Cincinnati Bearcats roll to 66-13 win over Eastern Kentucky in season-opener
Blue Beetle Showtimes Near Regal Swamp Fox
Hartland Liquidation Oconomowoc
Missed Connections Dayton Ohio
Snow Rider 3D Unblocked Wtf
Truth Of God Schedule 2023
라이키 유출
Red Devil 9664D Snowblower Manual
Lonesome Valley Barber
My Homework Lesson 11 Volume Of Composite Figures Answer Key
Panic! At The Disco - Spotify Top Songs
How to Grow and Care for Four O'Clock Plants
Regal Amc Near Me
Mini Handy 2024: Die besten Mini Smartphones | Purdroid.de
Panolian Batesville Ms Obituaries 2022
The Eight of Cups Tarot Card Meaning - The Ultimate Guide
897 W Valley Blvd
Emuaid Max First Aid Ointment 2 Ounce Fake Review Analysis
Otis Inmate Locator
UPC Code Lookup: Free UPC Code Lookup With Major Retailers
Warren County Skyward
Renfield Showtimes Near Marquee Cinemas - Wakefield 12
Envy Nails Snoqualmie
Moxfield Deck Builder
Wlds Obits
Tryst Houston Tx
If You're Getting Your Nails Done, You Absolutely Need to Tip—Here's How Much
Inducement Small Bribe
Luciane Buchanan Bio, Wiki, Age, Husband, Net Worth, Actress
Leland Nc Craigslist
Wgu Admissions Login
Paperlessemployee/Dollartree
Unblocked Games 6X Snow Rider
Ewwwww Gif
Jimmy John's Near Me Open
The Hardest Quests in Old School RuneScape (Ranked) – FandomSpot
Deviantart Rwby
The Significance Of The Haitian Revolution Was That It Weegy
Latest Posts
Article information

Author: Frankie Dare

Last Updated:

Views: 6024

Rating: 4.2 / 5 (53 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Frankie Dare

Birthday: 2000-01-27

Address: Suite 313 45115 Caridad Freeway, Port Barabaraville, MS 66713

Phone: +3769542039359

Job: Sales Manager

Hobby: Baton twirling, Stand-up comedy, Leather crafting, Rugby, tabletop games, Jigsaw puzzles, Air sports

Introduction: My name is Frankie Dare, I am a funny, beautiful, proud, fair, pleasant, cheerful, enthusiastic person who loves writing and wants to share my knowledge and understanding with you.