The Center for Internet Security (CIS), established in 2000, is a non-profit organization that develops configurable policy standards that enable organizations to improve security and compliance programs and postures.
CIS Controls™ and its CIS Benchmarks™ are global standards and accepted best practices for securing IT systems and data against the most common attacks. These proven guidelines are continuously refined and verified by experienced IT professional volunteers worldwide.
CIS is also home to the Multi-State Information Sharing and Analysis Center® (MSISAC®), a resource devoted to preventing, protecting, responding, and recovering cyber threats for state, local, tribal, and territorial government entities. And the Election Infrastructure Information Sharing and Analysis Center™ (EIISAC™) serving the cybersecurity needs of US state, regional, and territorial election offices. Recently, CIS released no-cost best practice guidance in the form of the Community Defense Model mapping the CIS Controls to the MITRE ATT&CK model, CIS Foundations Benchmarks for cloud service providers, a guide to the Shared Responsibility Model for security in the cloud, the CIS Password Policy Guide, the CIS Videoconferencing Security Guide, and more.
CIS Controls
CIS Controls were developed starting in 2008 and are a recommended set of actions for cyber defense that provide specific and actionable ways to thwart the most pervasive attacks. The CIS Controls are a relatively short list of high-priority, highly effective defensive actions that offer a “must-do, do-first” starting point for every enterprise seeking to improve their cyber defense. The last version of CIS Controls is v8 with 18 safeguards.
The CIS Controls are not a replacement for any existing regulatory, compliance, or authorization scheme. The CIS Controls map to most major compliance frameworks such as the NIST Cybersecurity Framework, NIST 800-53, ISO 27000 series, and regulations such as PCI DSS, HIPAA, NERC CIP, and FISMA. Mappings from the CIS Controls have been defined for these other frameworks to give a starting point for action.
It is essential to look for CIS Controls as an ecosystem and recognize that “it’s not about the list.” The true power of the CIS Controls is not about creating the best list; it is about harnessing the experience of a community of individuals and enterprises to make security improvements through the sharing of ideas, tools, lessons, and collective action. CIS Controls are grouped into three Implementation Groups (IGs). The CIS Controls IGs are self-assessed categories for enterprises. These IGs represent a horizontal look across the CIS Controls tailored to different types of enterprises. Specifically, IG1 is “basic cyber hygiene,” the foundational set of cyber defense Safeguards that every enterprise should apply to guard against the most common attacks. Each IG then builds upon the previous one: IG2 includes IG1, and IG3 includes all CIS Safeguards in IG1 and IG2.
Implementation Groups
Implementation Groups (IGs) are the recommended guidelines to prioritize the CIS Controls implementation.
IG1
CIS Controls v8 defines Implementation Group 1 (IG1) as essential cyber hygiene and represents an emerging minimum standard of information security for all enterprises. An IG1 enterprise is small to medium-sized with limited IT and cybersecurity expertise to protect IT assets and personnel. The principal concern of these enterprises is to keep the business operational, as they have limited tolerance for downtime. It should be implementable with limited cybersecurity expertise.
IG2
An IG2 enterprise employs individuals responsible for managing and protecting IT infrastructure. These enterprises support multiple departments with differing risk profiles based on job function and mission. Small enterprise units may have regulatory compliance burdens. IG2 enterprises often store and process sensitive client or enterprise information and can withstand short service interruptions. It helps security teams cope with increased operational complexity.
IG3
An IG3 enterprise employs security experts specializing in the different facets of cybersecurity (e.g., risk management, penetration testing, application security). IG3 assets and data contain sensitive information or functions subject to regulatory and compliance oversight. An IG3 enterprise must address the availability of services and the confidentiality and integrity of sensitive data. Successful attacks can cause significant harm to the public welfare.
Controls and Safeguards Index
01 Inventory and Control of Enterprise Assets
- Establish and Maintain Detailed Enterprise Asset Inventory
- Address Unauthorized Assets
- Utilize an Active Discovery Tool
- Use Dynamic Host Configuration Protocol (DHCP) Logging to Update Enterprise Asset Inventory
- Use a Passive Asset Discovery Tool
02 Inventory and Control of Software Assets
- Establish and Maintain a Software Inventory
- Ensure Authorized Software is Currently Supported
- Address Unauthorized Software
- Utilize Automated Software Inventory Tools
- Allowlist Authorized Software
- Allowlist Authorized Libraries
- Allowlist Authorized Scripts
- Establish and Maintain a Data Management Process
- Establish and Maintain a Data Inventory
- Configure Data Access Control Lists
- Enforce Data Retention
- Securely Dispose of Data
- Encrypt Data on End-User Devices
- Establish and Maintain a Data Classification Scheme
- Document Data Flows
- Encrypt Data on Removable Media
- Encrypt Sensitive Data in Transit
- Encrypt Sensitive Data at Rest
- Segment Data Processing and Storage Based on Sensitivity
- Deploy a Data Loss Prevention Solution
- Log Sensitive Data Access
04 Secure Configuration of Enterprise Assets and Software
- Establish and Maintain a Secure Configuration Process
- Establish and Maintain a Secure Configuration Process for Network Infrastructure
- Establish and Maintain a Secure Configuration Process for Network Infrastructure
- Implement and Manage a Firewall on Servers
- Implement and Manage a Firewall on End-User Devices
- Securely Manage Enterprise Assets and Software
- Manage Default Accounts on Enterprise Assets and Software
- Uninstall or Disable Unnecessary Services on Enterprise Assets and Software
- Configure Trusted DNS Servers on Enterprise Assets
- Enforce Automatic Device Lockout on Portable End-User Devices
- Enforce Remote Wipe Capability on Portable End-User Devices
- Separate Enterprise Workspaces on Mobile End-User Devices
- Establish and Maintain an Inventory of Accounts
- Use Unique Passwords
- Disable Dormant Accounts
- Restrict Administrator Privileges to Dedicated Administrator Accounts
- Establish and Maintain an Inventory of Service Accounts
- Centralize Account Management
- Establish an Access Granting Process
- Establish an Access Revoking Process
- Require MFA for Externally-Exposed Applications
- Require MFA for Remote Network Access
- Require MFA for Administrative Access
- Establish and Maintain an Inventory of Authentication and Authorization Systems
- Centralize Access Control
- Define and Maintain Role-Based Access Control
07 Continuous Vulnerability Management
- Establish and Maintain a Vulnerability Management Process
- Establish and Maintain a Remediation Process
- Perform Automated Operating System Patch Management
- Perform Automated Application Patch Management
- Perform Automated Vulnerability Scans of Internal Enterprise Assets
- Perform Automated Vulnerability Scans of Externally-Exposed Enterprise Assets
- Remediate Detected Vulnerabilities
- Establish and Maintain an Audit Log Management Process
- Collect Audit Logs
- Ensure Adequate Audit Log Storage
- Standardize Time Synchronization
- Collect Detailed Audit Logs
- Collect DNS Query Audit Logs
- Collect URL Request Audit Logs
- Collect Command-Line Audit Logs
- Centralize Audit Logs
- Retain Audit Logs
- Conduct Audit Log Reviews
- Collect Service Provider Logs
09 Email and Web Browser Protections
- Ensure Use of Only Fully Supported Browsers and Email Clients
- Use DNS Filtering Services
- Maintain and Enforce Network-Based URL Filters
- Restrict Unnecessary or Unauthorized Browser and Email Client Extensions
- Implement DMARC
- Block Unnecessary File Types
- Deploy and Maintain Email Server Anti-Malware Protections
- Deploy and Maintain Anti-Malware Software
- Configure Automatic Anti-Malware Signature Updates
- Disable Autorun and Autoplay for Removable Media
- Configure Automatic Anti-Malware Scanning of Removable Media
- Enable Anti-Exploitation Features
- Centrally Manage Anti-Malware Software
- Use Behavior-Based Anti-Malware Software
- Establish and Maintain a Data Recovery Process
- Perform Automated Backups
- Protect Recovery Data
- Establish and Maintain an Isolated Instance of Recovery Data
- Test Data Recovery
12 Network Infrastructure Management
- Ensure Network Infrastructure is Up-to-Date
- Establish and Maintain a Secure Network Architecture
- Securely Manage Network Infrastructure
- Establish and Maintain Architecture Diagram(s)
- Centralize Network Authentication, Authorization, and Auditing (AAA)
- Use of Secure Network Management and Communication Protocols
- Ensure Remote Devices Utilize a VPN and are Connecting to an Enterprise’s AAA Infrastructure
- Establish and Maintain Dedicated Computing Resources for All Administrative Work
13 Network Monitoring and Defense
- Centralize Security Event Alerting
- Deploy a Host-Based Intrusion Detection Solution
- Deploy a Network Intrusion Detection Solution
- Perform Traffic Filtering Between Network Segments
- Manage Access Control for Remote Assets
- Collect Network Traffic Flow Logs
- Deploy a Host-Based Intrusion Prevention Solution
- Deploy a Network Intrusion Prevention Solution
- Deploy Port-Level Access Control
- Perform Application Layer Filtering
- Tune Security Event Alerting Thresholds
14 Security Awareness and Skills Training
- Establish and Maintain a Security Awareness Program
- Train Workforce Members to Recognize Social Engineering Attacks
- Train Workforce Members on Authentication Best Practices
- Train Workforce on Data Handling Best Practices
- Train Workforce Members on Causes of Unintentional Data Exposure
- Train Workforce Members on Recognizing and Reporting Security Incidents
- Train Workforce on How to Identify and Report if Their Enterprise Assets are Missing Security Updates
- Train Workforce on the Dangers of Connecting to and Transmitting Enterprise Data Over Insecure Networks
- Conduct Role-Specific Security Awareness and Skills Training
15 Service Provider Management
- Establish and Maintain an Inventory of Service Providers
- Establish and Maintain a Service Provider Management Policy
- Classify Service Providers
- Ensure Service Provider Contracts Include Security Requirements
- Assess Service Providers
- Monitor Service Providers
- Securely Decommission Service Providers
16 Application Software Security
- Establish and Maintain a Secure Application Development Process
- Establish and Maintain a Process to Accept and Address Software Vulnerabilities
- Perform Root Cause Analysis on Security Vulnerabilities
- Establish and Manage an Inventory of Third-Party Software Components
- Use Up-to-Date and Trusted Third-Party Software Components
- Establish and Maintain a Severity Rating System and Process for Application
Vulnerabilities - Use Standard Hardening Configuration Templates for Application Infrastructure
- Separate Production and Non-Production Systems
- Train Developers in Application Security Concepts and Secure Coding
- Apply Secure Design Principles in Application Architectures
- Leverage Vetted Modules or Services for Application Security Components
- Implement Code-Level Security Checks
- Conduct Application Penetration Testing
- Conduct Threat Modeling
17 Incident Response Management
- Designate Personnel to Manage Incident Handling
- Establish and Maintain Contact Information for Reporting Security Incidents
- Establish and Maintain an Enterprise Process for Reporting Incidents
- Establish and Maintain an Incident Response Process
- Assign Key Roles and Responsibilities
- Define Mechanisms for Communicating During Incident Response
- Conduct Routine Incident Response Exercises
- Conduct Post-Incident Reviews
- Establish and Maintain Security Incident Thresholds
- Establish and Maintain a Penetration Testing Program
- Perform Periodic External Penetration Tests
- Remediate Penetration Test Findings
- Validate Security Measures
- Perform Periodic Internal Penetration Tests