GUIDE

Unlocking the Power of the CIS Critical Security Controls®

The Complete Guide

CIS Controls Hero

Introduction

In an era where cybersecurity threats loom larger than ever, organizations face a pressing need to fortify their defenses against cyberattacks. Amidst this challenging landscape, the CIS Critical Security Controls® (CIS Controls®) offer a comprehensive framework to safeguard digital assets and critical information for enterprises. 

Developed by the Center for Internet Security, Inc. (CIS®), these Controls have evolved into a global standard, providing a practical roadmap to address the most critical and common cyber threats. But how do the CIS Controls® align with various cybersecurity standards and frameworks, and how can they be tailored to meet your specific security requirements? 

Let’s delve into the key principles and guidelines of the CIS Controls®, how to categorize and prioritize CIS Controls®, how the Controls are updated to address emerging threats, and benefits experienced by organizations across industries. We’ll also cover resources, tools, and case studies to help organizations effectively implement the CIS Controls®.

CIS Controls Decorative

What are the CIS Critical Security Controls®?

The story of the CIS Controls® begins with a simple, yet compelling mission: to empower organizations to defend against the most critical and prevalent cyber threats. Developing the CIS Controls® emerged as a grassroots effort to identify real-world attacks that continually plague enterprises; translate that knowledge into positive, constructive actions for defenders; and share that information with a wider audience. 

The original goals were modest: to help people and enterprises focus their attention and get started on the most important steps to defend themselves from attacks that really matter.

The 4 goals of the CIS Controls®

The CIS Controls® reflect the combined knowledge of experts from every part of the business ecosystem, from entire companies and governments to individuals. This community spans many sectors, like government, power, defense, finance, transportation, academia, consulting, security, and IT. These community members have banded together to create, adopt, and support the CIS Controls®, working toward four common goals:

1. To identify and share insights

The journey of the CIS Controls® commences with the identification of the most common and impactful cyber threats that organizations face daily. This keen understanding forms the foundation for developing controls that directly address these threats. The first goal is to share insights into attacks and attackers, identify the root causes of these attacks, and translate this knowledge into classes of defensive action.

2. Create and share tools

Knowledge alone isn’t enough. The CIS Controls® take the insights gained from understanding attacks and transform them into actionable defense strategies. These Controls bridge the gap between awareness and implementation, providing organizations with practical steps to protect themselves.

3. Map the CIS Controls® to other regulatory compliance frameworks

The CIS Controls® are not isolated; they are carefully mapped to regulatory and compliance frameworks. This not only enhances their applicability but also provides a collective sense of priority and focus.

4. Identify common challenges

The last goal is to identify common barriers and challenges, like initial assessments and implementation roadmaps, so the community can come together to solve those challenges. The community shares insights, creates tools, and solves these common problems to strengthen the Controls and ensure they remain relevant.

The power of the CIS Controls® lies in their collective wisdom, representing the combined knowledge of experts across various domains, roles, and sectors. Whether you’re a threat responder, technologist, auditor, or policy maker, the CIS Controls® encompass insights and strategies to bolster your organization’s cyber defense. This inclusive approach to cybersecurity has propelled the CIS Controls® into a global standard that organizations can rely on to safeguard their digital assets.

The CIS Controls® are more than a mere list of best practices; they are an organized and prioritized framework that empowers organizations to enhance their cybersecurity posture effectively. These Controls are structured to address the most critical threats first and are categorized to guide organizations on their journey to robust security.

The structure of the CIS Controls®

The CIS Controls® are organized into 18 top-level Controls. These Controls represent overarching measures that help strengthen an organization’s cybersecurity posture. Each of the Controls focuses on critical security aspects, providing a comprehensive framework for defense.

The 18 CIS Critical Security Controls®

1. Inventory and Control of Enterprise Assets

Catalog all “enterprise assets” attached to your enterprise (physically and virtually) to have a complete understanding of what needs to be monitored and to identify potentially harmful unauthorized or unmanaged devices.

2. Inventory and Control of Software Assets

Track all software on your network to prevent others from installing software that hasn’t been reviewed or authorized by your enterprise.

3. Data Protection

Securely manage and monitor data by creating detailed data protection processes and controls.

4. Secure Configuration of Enterprise Assets and Software

Develop comprehensive processes to ensure that your enterprise’s assets and software are configured securely.

5. Account Management

Track user credentials for all accounts. Whether an account is tied to confidential data or is purely administrative, no account should be discounted or overlooked as a potential security risk.

6. Access Control Management

Create detailed processes to track and manage who has credentials or access to what assets and software — the process of revoking user access should be just as carefully monitored as assigning access.

7. Continuous Vulnerability Management

Build processes that regularly track and monitor vulnerabilities in order to identify potential risks and better prevent security incidents.

8. Audit Log Management

Create an audit log where your team can track and manage events tied to security incidents. This log can be used to understand why incidents occur and as a means to help prevent future attacks.

9. Email and Web Browser Protections

Identify potential email and web browser threats, then develop new protections or improve existing protections against those threats.

10. Malware Defenses

Build processes focused on defending against the installation or spread of malware on your enterprise’s physical and virtual assets.

11. Data Recovery

Develop robust practices to ensure that your enterprise’s assets can recover from, and potentially be restored after, any security incidents.

12. Network Infrastructure Management

Protect vulnerable network services and access points by carefully tracking and monitoring your enterprise’s devices (physical and virtual).

13. Network Monitoring and Defense

Utilize tools and processes to monitor and defend against potential security threats to your network.

14. Security Awareness and Skills Training

Increase employee knowledge and awareness of potential security issues via a security awareness program that includes regular cross-departmental training sessions.

15. Service Provider Management

Thoroughly evaluate service providers who have access to your enterprise’s sensitive data to ensure that they are managing data securely and appropriately.

16. Application Software Security

Assess software that is developed, housed, or acquired by your company for security weaknesses, then protect and monitor those weaknesses to prevent potential incidents.

17. Incident Response Management

Create a detailed incident response plan that will detect and analyze security incidents when they occur and then trigger the appropriate actions needed to mitigate such incidents.

18. Penetration Testing

Identify and test weaknesses of enterprise assets in order to better understand how effective your controls are.

Each of these 18 top-level Controls is further broken down into specific Safeguards (formerly referred to as Sub-Controls). These Safeguards are individual and unique actions that guide the logic of the top-level CIS Controls®. They define precise measurements as part of the implementation process, ensuring that they require minimal interpretation to put into practice. This level of detail and specificity ensures that organizations have clear guidance for implementing security measures.

How do I get started with adopting the CIS Controls®?

How do I get started with adopting the CIS Controls®?

Adopting the CIS Controls® is typically done in three phases, called Implementation Groups (IGs). IGs are self-assessed categories based on an organization’s risk profile and access to resources. Each IG identifies a set of Safeguards that businesses need to implement based on their business maturity and needs. 

Your business will need to self-assess based on your risk profile and business maturity to see which of the IGs you fall into. From there, you can get started with implementing the suggested Safeguards.

Implementation Groups

To further guide organizations in prioritizing the implementation efforts, the CIS Controls® are grouped into three IGs, which we will explore in more detail below. There are a total of 153 Safeguards in CIS Controls® v8. The IGs offer organizations flexibility in how they approach the CIS Controls® based on their specific needs and maturity levels.

CIS Controls Implementation Groups IG1 IG2 IG3
Source CIS
Implementation Group 1 (IG1)

Every enterprise should start with IG1, as it is defined as essential cyber hygiene — the foundational set of cyber defense Safeguards that every enterprise should apply to guard against the most common attacks. It’s a foundational set of 56 Safeguards against the most common attacks and constitute baseline protection for enterprises. IG1 is an ideal starting point for organizations looking to establish a solid security foundation — it’s essentially the onramp to the CIS Controls®.

Implementation Group 2 (IG2)

Building on the foundation laid by IG1, IG2 introduces 74 additional Safeguards that offer enhanced protection against more sophisticated attacks. While IG1 is about essential cyber hygiene, IG2 elevates an organization’s security posture.

Implementation Group 3 (IG3)

IG3 implements 23 additional Safeguards, meaning all 153 Safeguards are implemented for your business. This extends your security measures to defend critical systems and protect against advanced, targeted attacks, like ransomware, malware, web application hacking, insider and privilege misuse, and targeted intrusion. IG3 is suitable for organizations that face complex and high-stakes threats.

Who typically uses the CIS Controls®?

Who typically uses the CIS Controls®

The CIS Controls® offer a universal approach to cybersecurity applicable across all industries. Regardless of your sector or domain, the principles and strategies encapsulated within the CIS Controls® provide a robust defense against a wide spectrum of cyber threats.

From government and power to defense, finance, transportation, academia, consulting, security, IT, and more, organizations have adopted the CIS Controls® across a wide range of industries. The Controls are designed to address common cybersecurity challenges that transcend specific sectors.

Which frameworks do the CIS Controls® map to?

The CIS Controls® map to most major compliance frameworks. Currently, the Controls map to 25 frameworks:

These mappings offer a starting point for action, simplifying the process of compliance alignment. Organizations can leverage the structure and guidance provided by the CIS Controls® to meet the specific requirements of their industry and region.

How customizable are the CIS Controls®?

How customizable are the CIS Controls®?

The CIS Controls® are prescriptive. However, because organizations can select their own IGs, they can tailor their approach to meet their specific security requirements, industry regulations, and risk profiles. For instance, organizations of any size should begin with IG1 for essential cyber hygiene and can advance to IGs 2 and 3 when they feel ready since each subsequent IG group is designed to incorporate a more complex threat landscape. By customizing the CIS Controls® to address their unique challenges, organizations can create a cybersecurity strategy that aligns with their goals and resources.

Common Challenges to Avoid When Adopting the CIS Controls®

While implementing the CIS Controls® is highly beneficial for organizations, there are a few common challenges to avoid:

1. Not knowing where to start

For many organizations, the biggest challenge is knowing where to begin. The CIS Controls® provide a structured framework, but selecting the right starting point can be daunting. This is where the Implementation Groups (IGs) come into play, helping organizations choose an appropriate level of security maturity to begin with.

2. Budgetary constraints

Implementing comprehensive cybersecurity measures can be resource-intensive. Smaller organizations often face budget constraints when implementing the CIS Controls®. However, selecting the right IG and implementing a governance, risk, and compliance (GRC) tool can help balance security requirements with available resources.

3. Resource availability

Many organizations may lack the in-house expertise required to implement the CIS Controls® effectively. Acquiring the necessary skills and resources can pose a challenge. In such cases, organizations can consider outsourcing or seeking external assistance.

4. Manually mapping the CIS Controls® to other frameworks

Organizations operating in heavily regulated industries may find it challenging to align the CIS Controls® with specific regulatory requirements. However, the mappings provided by CIS via their Controls Navigator and a GRC tool that automates these mappings can simplify the process and save hours of time.

5. Overly ambitious goals

Organizations may be tempted to implement all CIS Controls® simultaneously. This can lead to inefficiencies and resource allocation issues. Avoid the trap of trying to do too much at once and focus on what’s most critical.

6. Inadequate measurement

Some organizations may not establish effective metrics for measuring the impact of Control implementation. Measuring the effectiveness of each Control is crucial for ensuring that security improvements are realized.

7. Inconsistent interpretation

The CIS Controls® are designed to be specific and practical. However, organizations may interpret them differently. It’s important to avoid inconsistent interpretations by clearly defining implementation standards.

8. Threshold misunderstanding

Some Controls may have specific thresholds that organizations must meet. Understanding these thresholds and ensuring they are met is essential to control effectiveness.

Navigating these challenges and avoiding common pitfalls is essential to achieving the maximum benefit from implementing the CIS Controls®. By doing so, organizations can strengthen their cybersecurity defenses and reduce the risk of security breaches.

CIS Controls® Key Principles and Guidelines

The effectiveness of the CIS Controls® lies not only in their goals but also in the key principles and guidelines that underpin them. These design principles guide the selection, prioritization, and implementation of the Controls, ensuring that they are not just a theoretical framework but a practical strategy to defend against cyber threats. 

Here are the essential principles that drive the CIS Controls®:

1. Offense informs defense

At the core of the CIS Controls® is the principle that offense informs defense. These Controls are not arbitrarily selected but are chosen and prioritized based on real-world data and a deep understanding of attacker behavior. The Controls are not theoretical; they are born out of practical knowledge about how to stop cyber attacks effectively.

2. Focus

In the complex landscape of cybersecurity, it’s easy to become overwhelmed with the sheer number of potential threats and security measures. The CIS Controls® alleviate this complexity by helping defenders identify the most critical actions to take to protect against the most significant attacks. The key is to focus on what matters most and avoid the temptation to address every security problem.

3. Feasibility

All individual recommendations within the CIS Controls®, known as Safeguards, are designed to be specific and practical to implement. This means that they should not be overly abstract or challenging for organizations to put into practice. Practicality is key to ensuring that organizations of various sizes and resources can benefit from these Controls.

4. Measurability

Measuring the effectiveness of security controls is vital. The CIS Controls®, particularly for IG1, emphasize measurability. This focus on measurement ensures that organizations can assess their progress in implementing these Controls effectively. Clear metrics and measurement criteria are integral to the implementation process.

5. Alignment

The world of cybersecurity is multifaceted, with various governance, regulatory, and process management schemes, frameworks, and structures. The CIS Controls® aim to create a sense of “peaceful co-existence” with these existing standards, like the National Institute of Standards and Technology® (NIST®), Cloud Security Alliance (CSA), Software Assurance Forum for Excellence in Code (SAFECode), ATT&CK, and Open Web Application Security Project® (OWASP®). They cooperate with and point to independent standards and security recommendations wherever possible, ensuring that organizations can align their efforts with well-established industry best practices.

By adhering to these principles, the CIS Controls® ensure that they are not just a set of theoretical concepts but a practical roadmap to bolster an organization’s cybersecurity posture.

The Benefits of Adopting the CIS Controls®

Adopting the CIS Controls® can help your organization:

Enhance your security

The CIS Controls® provide a practical roadmap to bolster an organization’s defenses. By adhering to these Controls, organizations can reduce vulnerabilities and strengthen their security posture.

Align compliance across your organization

Many industries have their own compliance and regulatory requirements. The CIS Controls® are thoughtfully mapped to most major compliance frameworks, ensuring that organizations can align their cybersecurity efforts with regulatory requirements.

Mitigate risks

Effective implementation of the CIS Controls® helps organizations mitigate risks associated with cyber threats. By addressing critical security aspects, organizations reduce the likelihood of security breaches and their associated costs.

Improve operational efficiency

By following a structured framework, organizations can streamline security practices, reduce complexities, and optimize resource allocation.

Build multiple layers of defense

The CIS Controls® ensure that organizations have multiple layers of defense against cyber attacks, which enhances their resilience against both common and sophisticated attacks.

Establish cybersecurity best practices

By adopting the CIS Controls®, organizations tap into a repository of global best practices and benefit from insights and strategies collaboratively developed by experts from various sectors and backgrounds.

How are the CIS Controls® updated?

In the dynamic world of cybersecurity, staying ahead of emerging threats and vulnerabilities is paramount. The CIS Controls® aren’t static; they adapt and evolve to address the ever-changing cybersecurity landscape. Regular updates ensure that these Controls remain effective and relevant, providing organizations with a robust defense against the latest threats.

The update process

The CIS Controls® are updated and reviewed through an informal community process. Practitioners from government, industry, academia, and various technical backgrounds come together with deep technical understanding from different viewpoints, such as vulnerability, threat analysis, defensive technology, tool vendors, enterprise management, and more. These efforts are guided by senior-level cybersecurity engineers at CIS that lead the technical research from a tactical perspective. These experts from CIS are also skilled technical writers who ensure the content provided is both relevant to the industry and digestible to C-Suites and external practitioners who might not be as familiar with the industry.

This collective knowledge is pooled to identify the most effective technical security controls needed to counter the attacks observed in the real world. The update process ensures that the CIS Controls® reflect the latest insights and strategies to thwart emerging threats effectively.

CIS Controls Frequency of updates

Frequency of updates

CIS Controls® have historically been updated every 2-3 years, with minor updates in between as-needed. Typically, the organization releases an updated version of the CIS Controls® when warranted to keep pace with new and changing technology, practices, and attack patterns. This regular updating process keeps the Controls aligned with the rapidly evolving threat landscape and helps organizations to remain resilient in the face of new and sophisticated cyber threats.

The CIS Controls® Ecosystem: Resources and tools

CIS provides a range of resources to help companies achieve compliance with the CIS Controls®. These resources empower organizations to assess, implement, and prioritize the CIS Controls®, ultimately enhancing their cybersecurity posture.

White papers and guides

CIS provides a collection of white papers and guides that cover various aspects of the CIS Controls®. These resources offer in-depth insights, explanations, and best practices for effective implementation.

How Hyperproof Can Help

Hyperproof’s powerful compliance operations platform is designed to help you maintain security controls and continuous compliance in the most efficient way possible.

Reference the CIS Controls® and tailor them for your security program

Enterprises large and small, from a variety of industries, have incorporated the CIS Controls® into their environment to support a solid security posture, but many firms also need to implement controls recommended by other cybersecurity guidelines (e.g. NIST SP 800-53, NIST CSF, Cloud Security Alliance’s Cloud Controls Matrix) for a host of reasons.

CIS Controls Decorative

In Hyperproof, it’s easy to reference the CIS Controls® and a host of other data protection control frameworks and add them to your control environment. By creating a single source of controls – or a common controls framework – within your enterprise, you’ll gain better visibility into your compliance posture, catch issues sooner, and improve the operational efficiency of your compliance program.

Implement the CIS Controls® to meet multiple compliance requirements

Use Hyperproof to cut down on the time it takes to comply with new regulatory regimes and standards. Hyperproof comes with the CIS Controls® (including IG1, IG2, and IG3) out-of-the box, making it easy to implement the CIS Controls® in your environment.

Hyperproof automatically maps the CIS Controls® to your other frameworks, standards, and regulatory regimes, like PCI DSS, SOC 2, ISO 27001, NIST SP 800-53, and more. Once a control is mapped to multiple compliance requirements, you’ll be able to collect evidence once and use that evidence to satisfy multiple auditors’ requests.

Continuously monitor your controls

While CIS provides native tools to conduct point-in-time tests of their controls, Hyperproof comes with an automation engine that enables you to set up a continuous controls monitoring system.

You can configure Hyperproof to automatically extract evidence of specific control procedures from source systems, define automated tests highlighting success or failure of each assertion, conduct tests at any frequency you need, and automate a workflow for managing the generated alarms, including communicating and investigating any failed assertion and ultimately correcting the control weakness.

The structured approach of the CIS Controls®, with their categorization, prioritization, and alignment with Implementation Groups, provides organizations with a clear roadmap for enhancing their cybersecurity defenses.

CIS Controls® Resources

Download the PDF

G2 Crowd Leader
G2 Crowd Best Estimated ROI
G2 Crowd Best Customer Support Enterprise
G2 Crowd Fastest Implementation
G2 Crowd Momentum Leader