← Frameworks / Security Controls

CIS Critical Security Controls Version 8

Prioritized set of actions to protect organizations and data from known cyber attack vectors. Developed by a global community of IT experts.

Clause Title SP 800-53 Controls
CIS 1 Inventory and Control of Enterprise Assets
CIS 1.1 Establish and Maintain Detailed Enterprise Asset Inventory
CIS 1.2 Address Unauthorized Assets
CIS 1.3 Utilize DHCP Logging to Update Enterprise Asset Inventory
CIS 1.4 Use Dynamic Host Configuration Protocol (DHCP) Logging to Update Enterprise Asset Inventory
CIS 1.5 Use a Passive Asset Discovery Tool
CIS 2 Inventory and Control of Software Assets
CIS 2.1 Establish and Maintain a Software Inventory
CIS 2.2 Ensure Authorized Software is Currently Supported
CIS 2.3 Address Unauthorized Software
CIS 2.4 Utilize Automated Software Inventory Tools
CIS 2.5 Allowlist Authorized Software
CIS 2.6 Allowlist Authorized Libraries
CIS 2.7 Allowlist Authorized Scripts
CIS 3 Data Protection
CIS 3.1 Establish and Maintain a Data Management Process
CIS 3.2 Establish and Maintain a Data Inventory
CIS 3.3 Configure Data Access Control Lists
CIS 3.4 Enforce Data Retention
CIS 3.5 Securely Dispose of Data
CIS 3.6 Encrypt Data on End-User Devices
CIS 3.7 Establish and Maintain a Data Classification Scheme
CIS 3.8 Document Data Flows
CIS 3.9 Encrypt Data on Removable Media
CIS 3.10 Encrypt Sensitive Data in Transit
CIS 3.11 Encrypt Sensitive Data at Rest
CIS 3.12 Segment Data Processing and Storage Based on Sensitivity
CIS 3.13 Deploy a Data Loss Prevention Solution
CIS 3.14 Log Sensitive Data Access
CIS 4 Secure Configuration of Enterprise Assets and Software
CIS 4.1 Establish and Maintain a Secure Configuration Process
CIS 4.2 Establish and Maintain a Secure Configuration Process for Network Infrastructure
CIS 4.3 Configure Automatic Session Locking on Enterprise Assets
CIS 4.4 Implement and Manage a Firewall on Servers
CIS 4.5 Implement and Manage a Firewall on End-User Devices
CIS 4.6 Securely Manage Enterprise Assets and Software
CIS 4.7 Manage Default Accounts on Enterprise Assets and Software
CIS 4.8 Uninstall or Disable Unnecessary Services on Enterprise Assets and Software
CIS 4.9 Configure Trusted DNS Servers on Enterprise Assets
CIS 4.10 Enforce Automatic Device Lockout on Portable End-User Devices
CIS 4.11 Enforce Remote Wipe Capability on Portable End-User Devices
CIS 4.12 Separate Enterprise Workspaces on Mobile End-User Devices
CIS 5 Account Management
CIS 5.1 Establish and Maintain an Inventory of Accounts
CIS 5.2 Use Unique Passwords
CIS 5.3 Disable Dormant Accounts
CIS 5.4 Restrict Administrator Privileges to Dedicated Administrator Accounts
CIS 5.5 Establish and Maintain an Inventory of Service Accounts
CIS 5.6 Centralize Account Management
CIS 6 Access Control Management
CIS 6.1 Establish an Access Granting Process
CIS 6.2 Establish an Access Revoking Process
CIS 6.3 Require MFA for Externally-Exposed Applications
CIS 6.4 Require MFA for Remote Network Access
CIS 6.5 Require MFA for Administrative Access
CIS 6.6 Establish and Maintain an Inventory of Authentication and Authorization Systems
CIS 6.7 Centralize Access Control
CIS 6.8 Define and Maintain Role-Based Access Control
CIS 7 Continuous Vulnerability Management
CIS 7.1 Establish and Maintain a Vulnerability Management Process
CIS 7.2 Establish and Maintain a Remediation Process
CIS 7.3 Perform Automated Operating System Patch Management
CIS 7.4 Perform Automated Application Patch Management
CIS 7.5 Perform Automated Vulnerability Scans of Internal Enterprise Assets
CIS 7.6 Perform Automated Vulnerability Scans of Externally-Exposed Enterprise Assets
CIS 7.7 Remediate Detected Vulnerabilities
CIS 8 Audit Log Management
CIS 8.1 Establish and Maintain an Audit Log Management Process
CIS 8.2 Collect Audit Logs
CIS 8.3 Ensure Adequate Audit Log Storage
CIS 8.4 Standardize Time Synchronization
CIS 8.5 Collect Detailed Audit Logs
CIS 8.6 Collect DNS Query Audit Logs
CIS 8.7 Collect URL Request Audit Logs
CIS 8.8 Collect Command-Line Audit Logs
CIS 8.9 Centralize Audit Logs
CIS 8.10 Retain Audit Logs
CIS 8.11 Conduct Audit Log Reviews
CIS 8.12 Collect Service Provider Logs
CIS 9 Email and Web Browser Protections
CIS 9.1 Ensure Use of Only Fully Supported Browsers and Email Clients
CIS 9.2 Use DNS Filtering Services
CIS 9.3 Maintain and Enforce Network-Based URL Filters
CIS 9.4 Restrict Unnecessary or Unauthorized Browser and Email Client Extensions
CIS 9.5 Implement DMARC
CIS 9.6 Block Unnecessary File Types
CIS 9.7 Deploy and Maintain Email Server Anti-Malware Protections
CIS 10 Malware Defenses
CIS 10.1 Deploy and Maintain Anti-Malware Software
CIS 10.2 Configure Automatic Anti-Malware Signature Updates
CIS 10.3 Disable Autorun and Autoplay for Removable Media
CIS 10.4 Configure Automatic Anti-Malware Scanning of Removable Media
CIS 10.5 Enable Anti-Exploitation Features
CIS 10.6 Centrally Manage Anti-Malware Software
CIS 10.7 Use Behavior-Based Anti-Malware Software
CIS 11 Data Recovery
CIS 11.1 Establish and Maintain a Data Recovery Process
CIS 11.2 Perform Automated Backups
CIS 11.3 Protect Recovery Data
CIS 11.4 Establish and Maintain an Isolated Instance of Recovery Data
CIS 11.5 Test Data Recovery
CIS 12 Network Infrastructure Management
CIS 12.1 Ensure Network Infrastructure is Up-to-Date
CIS 12.2 Establish and Maintain a Secure Network Architecture
CIS 12.3 Securely Manage Network Infrastructure
CIS 12.4 Establish and Maintain Architecture Diagram(s)
CIS 12.5 Centralize Network Authentication, Authorization, and Auditing (AAA)
CIS 12.6 Use of Secure Network Management and Communication Protocols
CIS 12.7 Ensure Remote Devices Utilize a VPN and are Connecting to an Enterprise's AAA Infrastructure
CIS 12.8 Establish and Maintain Dedicated Computing Resources for All Administrative Work
CIS 13 Network Monitoring and Defense
CIS 13.1 Centralize Security Event Alerting
CIS 13.2 Deploy a Host-Based Intrusion Detection Solution
CIS 13.3 Deploy a Network Intrusion Detection Solution
CIS 13.4 Perform Traffic Filtering Between Network Segments
CIS 13.5 Manage Access Control for Remote Assets
CIS 13.6 Collect Network Traffic Flow Logs
CIS 13.7 Deploy a Host-Based Intrusion Prevention Solution
CIS 13.8 Deploy a Network Intrusion Prevention Solution
CIS 13.9 Deploy Port-Level Access Control
CIS 13.10 Perform Application Layer Filtering
CIS 13.11 Tune Security Event Alerting Thresholds
CIS 14 Security Awareness and Skills Training
CIS 14.1 Establish and Maintain a Security Awareness Program
CIS 14.2 Train Workforce Members to Recognize Social Engineering Attacks
CIS 14.3 Train Workforce Members on Authentication Best Practices
CIS 14.4 Train Workforce on Data Handling Best Practices
CIS 14.5 Train Workforce Members on Causes of Unintentional Data Exposure
CIS 14.6 Train Workforce Members on Recognizing and Reporting Security Incidents
CIS 14.7 Train Workforce on How to Identify and Report if Their Enterprise Assets are Missing Security Updates
CIS 14.8 Train Workforce on the Dangers of Connecting to and Transmitting Enterprise Data Over Insecure Networks
CIS 14.9 Conduct Role-Specific Security Awareness and Skills Training
CIS 15 Service Provider Management
CIS 15.1 Establish and Maintain an Inventory of Service Providers
CIS 15.2 Establish and Maintain a Service Provider Management Policy
CIS 15.3 Classify Service Providers
CIS 15.4 Ensure Service Provider Contracts Include Security Requirements
CIS 15.5 Assess Service Providers
CIS 15.6 Monitor Service Providers
CIS 15.7 Securely Decommission Service Providers
CIS 16 Application Software Security
CIS 16.1 Establish and Maintain a Secure Application Development Process
CIS 16.2 Establish and Maintain a Process to Accept and Address Software Vulnerabilities
CIS 16.3 Perform Root Cause Analysis on Security Vulnerabilities
CIS 16.4 Establish and Manage an Inventory of Third-Party Software Components
CIS 16.5 Use Up-to-Date and Trusted Third-Party Software Components
CIS 16.6 Establish and Maintain a Severity Rating System and Process for Application Vulnerabilities
CIS 16.7 Use Standard Hardening Configuration Templates for Application Infrastructure
CIS 16.8 Separate Production and Non-Production Systems
CIS 16.9 Train Developers in Application Security Concepts and Secure Coding
CIS 16.10 Apply Secure Design Principles in Application Architectures
CIS 16.11 Leverage Vetted Modules or Services for Application Security Components
CIS 16.12 Implement Code-Level Security Checks
CIS 16.13 Conduct Application Penetration Testing
CIS 16.14 Conduct Threat Modeling
CIS 17 Incident Response Management
CIS 17.1 Designate Personnel to Manage Incident Handling
CIS 17.2 Establish and Maintain Contact Information for Reporting Security Incidents
CIS 17.3 Establish and Maintain an Enterprise Process for Reporting Incidents
CIS 17.4 Establish and Maintain an Incident Response Process
CIS 17.5 Assign Key Roles and Responsibilities
CIS 17.6 Define Mechanisms for Communicating During Incident Response
CIS 17.7 Conduct Routine Incident Response Exercises
CIS 17.8 Conduct Post-Incident Reviews
CIS 17.9 Establish and Maintain Security Incident Thresholds
CIS 18 Penetration Testing
CIS 18.1 Establish and Maintain a Penetration Testing Program
CIS 18.2 Perform Periodic External Penetration Tests
CIS 18.3 Remediate Penetration Test Findings
CIS 18.4 Validate Security Measures
CIS 18.5 Perform Periodic Internal Penetration Tests