List of 18 CIS Critical Security Controls: Updated V8 Complete Checklist

Anwita

Anwita

Sep 11, 2024
cis controls

A research conducted by Ponemon Institute in 2022 found that an organization’s cloud security maturity levels impact the cost of a data breach – higher the maturity, lower the cost. Using CIS controls you can build a strong security posture to bring down the cost of a potential data breach for your business. 

But what are the requirements of the CIS control framework? What are their functions? And what does it protect? Let’s understand each safeguard better.

What is CIS control framework?

The CIS Critical Security Controls (CIS Controls) are a set of prescriptive, prioritized, and simplified security practices that help organizations strengthen their cyber security posture.

The guidelines consist of 18 critical cybersecurity controls (CSC). These controls aim to simplify defense approach against threats, comply with industry regulations, abide by government law, align security efforts with business goals, and achieve basic security hygiene.

List of CIS controls

There are 18 control requirements divided into 153 safeguards. Each safeguard falls into either of three groups – IG1, IG2, and IG3. 

IG1 builds essential cyber hygiene for enterprises with limited cybersecurity expertise. 

IG2 assists enterprises handling multiple departments and risk profiles to manage their increasing operational complexity. 

IG3 empowers enterprises with IT professionals and experts to manage their sensitive or confidential data. It aims to minimize the impact of sophisticated cyber attacks. 

Not all controls may apply to your enterprise, you can choose the controls based on your IG level. 

CIS Control 1: Inventory and Control of Enterprise Assets

Helps you manage enterprise assets like portable or mobile devices, networks, and servers connected to your infrastructure remotely, virtually, or physically. Use this control to protect and monitor assets as well as identify and remove unauthorized or unmanaged assets. 

CIS SafeguardControl Requirement Security Function Asset Type 
1.1Establish and maintain a detailed and updated inventory of enterprise assets that store or process data. The assets can be connected to the infrastructure remotely, physically, or virtually. IdentifyDevices
1.2Implement processes to remove, deny, or quarantine unauthorized assets.RespondDevices
1.3Use an active discovery tool to identify assets connected to the network and configure it to execute as often as needed.DetectDevices
1.4Use Dynamic Host Configuration Protocol (DHCP) logging or Internet Protocol (IP) address management tools to update the inventory.IdentifyDevices
1.5Use a passive asset directory tool to identify assets connected to the network DetectDevices

CIS Control 2: Inventory and Control of Software Assets

Manage software operating systems and applications deployed on the network to prevent unauthorized software from being installed and operated. 

CIS SafeguardControl Requirement Security Function Asset Type 
2.1Establish and maintain a detailed inventory of software installed on assetsIdentifyApplications
2.2Ensure that only supported software is authorized in the inventoryIdentifyApplications
2.3Remove unauthorized software from the system or document its necessityRespondApplications
2.4Automate the process of discovering and documenting installed software using software inventory toolsDetectApplications
2.5Ensure that only authorized software can be accessed or executed using technical controls like application allowlistingProtectApplications
2.6Ensure that only authorized software libraries are loaded into system processes using technical controlsProtectApplications
2.7Ensure that only authorized scripts can be executed using technical controls like digital signatures and version controlProtectApplications

CIS Control 3: Data Protection

Protects critical data deployed on-premise and across the cloud environment using processes and technical controls that helps to identify, classify, manage, retain, and dispose them. 

CIS SafeguardControl Requirement Security Function Asset Type 
3.1Establish and maintain a data management process detailing sensitivity, retention limits, disposal requirements, and ownersIdentifyData
3.2Establish and maintain a data inventory based on the management processIdentifyData
3.3Configure data access controls lists to file systems, databases, and applicationsProtectData
3.4Retain data based on management processes including minimum and maximum timelinesProtectData
3.5Dispose of data securely aligned with the level of sensitivityProtectData
3.6Encrypt data deployed on endpoint devicesProtectDevices
3.7Establish and maintain a data classification plan based on sensitive, public, or confidential categoriesIdentifyData
3.8Document data flows based on data management processesIdentifyData
3.9Encrypt data on removable mediaProtectData
3.10Encrypt data in transit using techniques like Transport Layer Security (TLS) or Open Secure Shell (OpenSSH)ProtectData
3.11Encrypt sensitive data at rest deployed on servers, applications, or databases using techniques like server-side encryption or application-layer encryptionProtectData
3.12Segment data processing and storage based on its sensitivityProtectNetwork
3.13Use automated tools like Data Loss Prevention (DLP) to identify sensitive data stored, processed, or transmitted via enterprise assetsProtectData
3.14Maintain a log of sensitive data access that includes modification and disposalDetectData

CIS Control 4: Secure Configuration of Enterprise Assets and Software

Establishes and maintains security configurations of enterprise assets and software like endpoint devices, servers, IoT systems, network devices, operating systems, and applications. 

CIS SafeguardControl Requirement Security Function Asset Type 
4.1Establish and maintain a secure configuration process for enterprise assets and softwareProtectApplications
4.2Establish and maintain a secure configuration process for network devicesProtectNetwork
4.3Configure automated session lockout after a defined period of inactivity. The recommended period is 15 minutes for general operating systems and 2 minutes for mobile endpoint devices.ProtectUsers
4.4Implement and manage firewalls on supported serversProtectDevices
4.5Implement and manage a host based firewall or port filtering tool on endpoint devices. Configure the settings to allow only whitelisted trafficProtectDevices
4.6Securely manage enterprise assets and software using version-controlled infrastructure-as-code and accessing administrative interfaces over secure network protocols like SSH and HTTPSProtectNetwork
4.7Manage default accounts on assets like root, administrator, or pre-configured vendor accounts by disabling or making them inaccessibleProtectUsers
4.8Implement and manage a host-based firewall or port filtering tool on endpoint devices. Configure the settings to allow only whitelisted trafficProtectDevices
4.9Configure trusted DNS servers. Use only enterprise controlled or trusted externally accessible DNS servers ProtectDevices
4.10Configure automated device lockout following a predetermined number of failed authentication attempts. The suggested number is 20 for laptops and 10 for tablets or smartphonesRespondDevices
4.11Remotely delete data deployed in enterprise owned portable devices if the drive is lost or the assigned owner has exited the orgProtectDevices
4.12Use separate workspaces on mobile and endpoint devices for enterprise and personal application dataProtectDevices

CIS Control 5: Account Management

Manage authorization for account login credentials for user, administrator, and service accounts to secure enterprise and software assets. 

CIS SafeguardControl Requirement Security Function Asset Type 
5.1Use unique passwords for each asset. Passwords should have at least eight characters if MFA is enabled and 14 characters if not enabledIdentifyUsers
5.2Use unique passwords for each asset. Passwords should have at least 8 characters if MFA is enabled and 14 characters if not enabledProtectUsers
5.3Delete or disable dormant accounts after 45 days of inactivityRespondUsers
5.4Restrict administrator privileges to administer accounts and conduct general activities from user/non-privileged accounts ProtectUsers
5.5Establish and maintain an inventory of service accounts detailing department owner, review date, and purposeIdentifyUsers
5.6Centralize all account management activities using a directory or identity serviceProtectUsers

CIS Control 6: Access Control Management

Implement tools and processes to manage, assign, create, and revoke credentials or privileges for administrators, and service accounts of enterprise assets and software. 

CIS SafeguardControl Requirement Security Function Asset Type 
6.1Establish a process to manage access privileges for new hires or role changesProtectUsers
6.2Establish a process to manage access removal for role change or terminationProtectUsers
6.3Maintain role-based access control based on role-wise access rights to ensure each function can carry out their assigned tasksProtectUsers
6.4Enforce MFA for remote network access requests ProtectUsers
6.5Enforce MFA on all externally managed or third-party accessible applicationsProtectUsers
6.6Establish and maintain an inventory of authentication and authorization systems IdentifyUsers
6.7Centralize access control activities using a directory or SSO providerProtectUsers
6.8Maintain a role-based access control based on role-wise access rights to ensure each function can carry out their assigned tasksProtectData

Sprinto helps you set up role-based access control for enterprise assets based on individual roles and responsibilities. By defining who can access what, when, and how, you can meet CIS access control safeguards. 

  • Describe how to protect login system using Sprinto’s login mechanism strengthening tools
  • Set up ticket-based access control to manage request exceptions
  • Gain a granular view of org-wide accounts, access, and status history

CIS Control 7: Continuous Vulnerability Management

Create a plan to assess and track vulnerabilities in assets within the infrastructure in order to minimize and remediate the attack surface for malicious actors. You can scan industry sources to stay updated with information-related threats or vulnerabilities. 

CIS SafeguardControl Requirement Security Function Asset Type 
7.1Establish and maintain a documented process to manage vulnerabilitiesProtectApplications
7.2Establish and maintain a documented risk remediation planRespondApplications
7.3Conduct automated vulnerability scans (authenticated and unauthenticated) on internal assets using a SCAP-compliant scanning toolProtectApplications
7.4Update applications using automated patch management toolsProtectApplications
7.5Conduct automated vulnerability scans (authenticated and unauthenticated) on internal assets using a SCAP compliant scanning toolIdentifyApplications
7.6Conduct automated vulnerability scans (authenticated and unauthenticated) on external assets using a SCAP-compliant scanning toolIdentifyApplications
7.7Remediate software vulnerabilities using tools and processesRespondApplications

Sprinto monitors and resolves infrastructure vulnerabilities for cloud-hosted applications using workflow checks. 

  • Track and remediate vulnerabilities in real time
  • Integrates with vulnerability scanners which scan your code for risks you may get from existing libraries
  • Assigns a score for each vulnerability based on the level of severity

CIS Control 8: Audit Log Management

Maintain a comprehensive audit log detailing the events that help you detect, collect, or understand, and recover from attacks. 

CIS SafeguardControl Requirement Security Function Asset Type 
8.1Establish and maintain a process to collect, review, and retain audit logsProtectNetwork
8.2Centralize audit log collection and retention processesDetectNetwork
8.3Ensure adequate storage capabilities in audit log destinationsProtectNetwork
8.4Collect audit logs across assets aligned with the enterprise’s log management processProtectNetwork
8.5Collect detailed audit logs for sensitive data that includes event source, date, username, timestamp, address and destination sources, and more to support forensic investigationDetectNetwork
8.6Collect DNS query audit logsDetectNetwork
8.7Collect URL request audit logsDetectNetwork
8.8Collect command line audit logsDetectDevices
8.9Centralize audit log collect and retention processesDetectNetwork
8.10Retain audit logs for at least 90 daysProtectNetwork
8.11Collect audit log reviews to detect anomalous behavior or abnormal events that could be a security threatDetectNetwork
8.12Collect service provider logsDetectData

Sprinto helps you eliminate cumbersome audit activities and collects evidence automatically, effectively, and comprehensively for all CIS critical controls. 

  • Collects system snapshots, generates documents, and monitoring logs in a centralized repository
  • Collects evidence of corrective actions against system failures
  • Accommodates special cases and syncs to new tasks as your enterprise grows

CIS Control 9: Email and Web Browser Protections

Protect emails and web vectors from threats like phishing attacks using detective techniques and prevent exploitation of human behavior. 

CIS SafeguardControl Requirement Security Function Asset Type 
9.1Run only supported and authorized browsers or email clients. Use only the latest vendor provided versionProtectApplications
9.2Use anti-malware systems like attachment scanning or sandboxing to secure email serversProtectNetwork
9.3Use anti-malware systems like attachment scanning or sandboxing to secure email serversProtectNetwork
9.4Use anti-malware systems like attachment scanning or sandboxing to secure email serversProtectApplications
9.5Use DMARC (Domain-based Message Authentication) policy and verification to minimize email spoofing and email modificationProtectNetwork
9.6Block unnecessary files entering the email gatewayProtectNetwork
9.7Us anti-malware systems like attachment scanning or sandboxing to secure email serversProtectNetwork

CIS Control 10: Malware Defenses

Prevent malicious applications, scripts, or codes from being installed, executed, and spread on enterprise assets. 

CIS SafeguardControl Requirement Security Function Asset Type 
10.1Deploy and maintain anti-malware softwareProtectDevices
10.2Configure auto update for anti-malware signature filesProtectDevices
10.3Disable the autorun and autoplay functionality for removable media files ProtectDevices
10.4Enable anti-exploitation functions on assets and software DetectDevices
10.5Centralize anti-malware software managementProtectDevices
10.6Use behavior-based anti-malware softwareProtectDevices
10.7Use a behavior based anti malware softwareDetectDevices

CIS Control 11: Data Recovery

Maintain the confidentiality, availability, and integrity of data using effective recovery practices that help you restore compromised data to the pre-incident stage. 

CIS SafeguardControl Requirement Security Function Asset Type 
11.1Establish and maintain a data recovery process that includes the scope of activities, prioritization details, and security of backed up dataRecoverData
11.2Backup in scope assets automatically. The frequency should be based on the sensitivity of the dataRecoverData
11.3Protect recovery data using the same controls as the original dataProtectData
11.4Establish and maintain an isolated container of recovery dataRecoverData
11.5Test the backup recovery system at frequent intervalsRecoverData

CIS Control 12: Network Infrastructure Management

Prevent malicious actors from exploiting vulnerabilities in network services and access points. Establish, complement, track, report, and correct network devices. 

CIS SafeguardControl Requirement Security Function Asset Type 
12.1Keep network infrastructure updated by running the latest software version and using the currently supported NaaS (network-as-a-service)ProtectNetwork
12.2Establish and maintain a secure network architecture to ensure segmentation, implement least privilege, and availabilityProtectNetwork
12.3Ensure network infrastructure security using version-controlled-infrastructure-as-code and secure network protocolsProtectNetwork
12.4Establish and maintain an architecture diagram and other necessary network system documentsIdentifyNetwork
12.5Centralize network AAA (Authentication, Authorization, and Auditing)ProtectNetwork
12.6Use secure network management and communication protocolsProtectNetwork
12.7Ensure that users authenticate via enterprise managed VPN to access enterprise resources on endpoint devices ProtectDevices
12.8Establish and maintain computing resources segmented from the primary enterprise network and internet connection to manage tasks that require administrative accessProtectDevices

CIS Control 13: Network Monitoring and Defense

Protect the enterprise’s network infrastructure and user base from security threats using tools and processes to monitor the network comprehensively. 

CIS SafeguardControl Requirement Security Function Asset Type 
13.1Implement a host-based anti-intrusion solution like EDR (Endpoint Detection and Response) systems or host-based IPS agents on supported or applicable assetsDetectNetwork
13.2Implement a host-based anti-intrusion solution like EDR (Endpoint Detection and Response) systems or host-based IPS agents on supported or applicable assetsDetectDevices
13.3Deploy network intrusion detection systems as applicable like NIDS (Network Intrusion Detection System) or CSP (cloud service provider) serviceDetectNetwork
13.4Filter traffic between network segments as where applicableProtectNetwork
13.5Implement a host-based anti intrusion solution like EDR (Endpoint Detection and Response) systems or host-based IPS agents on supported or applicable assetsProtectDevices
13.6Collect network traffic logs for reviewing and altering purposesDetectNetwork
13.7Implement anti-network intrusion systems like NIPS (Network Intrusion Prevention System) on supported or applicable assetsProtectDevices
13.8Implement port-level access control (802.1x or equivalent access control protocols). User and device authentication is recommended ProtectNetwork
13.9Manage access control for remotely connected assets. Determine access requirements based on the updated anti-malware solution, configuration compliance with the enterprise’s configuration, and updating operating systems and applicationsProtectDevices
13.1Filter application layers like proxy filtering, application layer firewall, or gatewayProtectNetwork
13.11Tune security event alerting thresholds on a monthly basis or a higher frequencyDetectNetwork

Sprinto connects with your assets to automatically map and continuously monitor security controls against CIS benchmarks to test compliance and trigger remediation workflows.

  • Configure automated altering rules and activate high-fidelity alerts
  • Tracks progress in real-time using a centralized dashboard
  • Integrates with everything – cloud apps, infrastructure, code repos, devices, and people

CIS Control 14: Security Awareness and Skills Training

Conduct security training and awareness programs for employees to minimize incidents. Instill security best practices and necessary skills that protect your enterprise from cyber attacks

CIS SafeguardControl Requirement Security Function Asset Type 
14.1Train employees to recognize and report threat incidentsProtectN/A
14.2Train employees to identify social engineering attacks like phishing, pretexting, and tailgatingProtectN/A
14.3Train employees on authentication practices like MFA, credential management, and password compositionProtectN/A
14.4Train employees to identify, store, transfer, and archive sensitive data including clear screen and desk best practicesProtectN/A
14.5Train employees on accidental data exposure causesProtectN/A
14.6Conduct role-based security training and awareness programsProtectN/A
14.7Conduct role-based security training and awareness programsProtectN/A
14.8Train employees to understand the security consequences of connecting to and transmitting data over insecure networks. Remote workers should securely configure their home network infrastructureProtectN/A
14.9Conduct role based security training and awareness programsProtectN/A

Sprinto’s custom training module helps you train employees, conduct tests once completed, and collect evidence of completion to meet CIS control 14.  

CIS Control 15: Service Provider Management

Conduct vendor due diligence processes to evaluate the security practices of vendors with access to sensitive data and offer managed services for IT platforms or critical processes. 

CIS SafeguardControl Requirement Security Function Asset Type 
15.1Establish and maintain an inventory of service providers listing all vendors, their classification, and a designated contactIdentifyN/A
15.2Establish and maintain a service provider management policy that addresses classification, inventory, assessment, monitoring, and decommissioning on each vendorIdentifyN/A
15.3Classify service providers based on data sensitivity, data volume, data availability, regulations, inherent risk, and mitigated riskIdentifyN/A
15.4Ensure service providers contract include security clauses like breach notification, data encryption, data disposal and others based on the security policyProtectN/A
15.5Assess service providers based on your management policy to address compliance reports like SOC 2, AoC (Attestation of Compliance) of PCI DSS, custom questionnaires, and othersIdentifyN/A
15.6Monitor service providers based on your management policy to address vendor compliance, vendor release notes, and dark web monitoring. DetectData
15.7Decommission service providers to address user and service account deactivation, data flow termination, data disposal within providers systemsProtectData

CIS Control 16: Application Software Security

Secure the software developed, hosted, or acquired in house throughout its life cycle. Prevent, detect, and remediate vulnerabilities that can disrupt business operations. 

CIS SafeguardControl Requirement Security Function Asset Type 
16.1Analyze the root cause of vulnerabilities to evaluate underlying code issuesProtectApplications
16.2Establish and maintain a process to accept and address software vulnerability reports that details the policies, responsible parties, assignment, intake process, remediation, and remediation testing. Additionally, use a vulnerability tracking systemProtectApplications
16.3Analyze root cause of vulnerabilities to evaluate underlying code issuesProtectApplications
16.4Use industry-grade hardening configuration templates for application infrastructure components like databases, web servers, as well as cloud containers, and PaaS or SaaS componentsProtectApplications
16.5Separate production environments for production and non-production systems ProtectApplications
16.6Create a severity rating system to address vulnerabilities in the order of its discoveryProtectApplications
16.7Use industry grade hardening configuration templates for application infrastructure components like databases, web servers, as well as cloud containers, and PaaS or SaaS componentsProtectApplications
16.8Separate the environments for production and non-production systemsProtectApplications
16.9Train software developers to write secure code, general security principles and application security practicesProtectApplications
16.10Use secure principles to design application architectures like least privilege, validate user operation input, check inputs for errors, and minimize the infrastructure attack surface ProtectApplications
16.11Use vetted modules or services for application security components like identity management, encryption, logging, and auditingProtectApplications
16.12Use static and dynamic tools to analyze the application life cycle and ensure secure coding practicesProtectApplications
16.13Conduct application pen testings. Authenticated pen tests are recommended for critical applications to identify business logic vulnerabilities over code scanning and automated testingProtectApplications
16.14Conduct threat modeling to identify and address application design security flawsProtectApplications

CIS Control 17: Incident Response Management

Build resilience against incidents by creating an incident response program detailing the policies, plans, procedures, roles, stakeholders, training, and communications. Use the plan to effectively mitigate breaches by preparing, detecting, and responding to attacks. 

CIS SafeguardControl Requirement Security Function Asset Type 
17.1Assign one key role and a backup role to manage incidents. If it is handled by a third party service, an internal person should oversee their workRespondN/A
17.2Create and maintain a contact list of parties who should be informed in case a security incident occursRespondN/A
17.3Establish and maintain a process for all employees to report security incidents that includes a reporting timeframe, reporting personnel, processes, and information to reportRespondN/A
17.4Establish and maintain an incident response policy detailing the roles, accountabilities, compliance requirements and accountability planRespondN/A
17.5Assign key roles and responsibilities to respond to incidents from departments like legal, IT, information security, facilities, public relations human resources, analysts, and others as applicableRespondN/A
17.6Determine the primary and secondary measures to communicate and report security incidentsRespondN/A
17.7Conduct incident response exercises based on real scenarios to prepare key roles to process and respond to incidentsRecoverN/A
17.8Conduct post incident reviews to avoid repeat occurrencesRecoverN/A
17.9Establish and maintain incident thresholds to differentiate between incidents and events.  RecoverN/A

Sprinto’s built-in security solution users proactively mitigate vulnerabilities across enterprise assets, eliminate security blind spots, and remediate security issues.

  • Leverages AI to recommend corrective actions against security gaps. 
  • Scans the cloud for malicious behavior and non-compliant activities

CIS Control 18: Penetration Testing

Identifies weaknesses and vulnerabilities in controls, processes, and technology to test the effectiveness and resilience of enterprise assets by stimulating attacks.

CIS SafeguardControl Requirement Security Function Asset Type 
18.1Establish and maintain a pen testing program based on the enterprise’s sixe, complexity, and maturity. Address scope, limitations, retrospective requirements, and remediationIdentifyN/A
18.2Conduct external pen tests – clear box or opaque box at least once annually. Include enterprise and environmental reconnaissance in the pen testIdentifyNetwork
18.3Remediate the vulnerabilities identified in the pen test based on enterprise scope and prioritizationProtectNetwork
18.4Validate secure measures after a pen test and make the necessary modifications and in configurations and detection capabilitiesProtectNetwork
18.5Conduct internal pen tests – clear box or opaque box at least once annually, based on requirementsIdentifyN/A

How Sprinto helps you implement CIS controls

Sprinto automates CIS control requirements by continuously monitoring your controls, culling out vulnerabilities, assigning impact scores against risks, training your employees, scanning for non-compliant activities, and much more. With Sprinto, you get:

  • Single dashboard, 360 degree granular view of risks and controls
  • Cross-map and reuse controls from existing frameworks
  • Real-time compliance status through automated checks and workflows
  • Continuous, comprehensive, and accurate monitoring of cloud assets

Want to know how we helped organizations like yours get CIS compliant? Talk to our experts today!

FAQs

What is the difference between the CIS and NIST CSF framework?

The key differences between CIS and NIST controls lie in focus (CIS is action-focused and offers a list of prioritized actions against common attacks, whereas NIST helps security teams manage security risks across the org based on risk profile). Another difference is use cases (CIS helps to improve tactics of an org’s cyber defenses compared to NIST, which helps to build a strategic security program).

What does CIS Controls stand for?

CIS stands for The Center for Internet Security. It offers 18 security standards or basic controls to build an effective defense against security vulnerabilities.    

Is CIS part of NIST?

CIS is not a part of NIST. While these frameworks have similar or overlapping security requirements, NIST is set by government agencies and compulsory for some companies while CIS is formed by companies, government agencies, institutions, and expert individuals. 

Anwita
Anwita
Anwita is a cybersecurity enthusiast and veteran blogger all rolled into one. Her love for everything cybersecurity started her journey into the world compliance. With multiple certifications on cybersecurity under her belt, she aims to simplify complex security related topics for all audiences. She loves to read nonfiction, listen to progressive rock, and watches sitcoms on the weekends.

How useful was this post?

3.5/5 - (2 votes)

Found this interesting?
Share it with your friends
Get a wingman for
your next audit.
Schedule a personalized demo and scale business
Here’s what to read next….
Here’s what to read next….
Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.

Blog
Cybersecurity
CIS Controls