# CIS 18 Controls Cheatsheet ## Overview The CIS Controls are a prioritized set of safeguards to mitigate the most prevalent cyber-attacks against systems and networks. This cheatsheet provides a quick reference to the 18 CIS Controls (v8), implementation guidance, and mappings to major frameworks. ## CIS Controls Summary | # | Control | Category | Purpose | |---|---------|----------|---------| | 1 | Inventory and Control of Enterprise Assets | Basic | Know what's on your network | | 2 | Inventory and Control of Software Assets | Basic | Know what's running on your network | | 3 | Data Protection | Basic | Protect sensitive information | | 4 | Secure Configuration of Enterprise Assets and Software | Basic | Reduce the attack surface | | 5 | Account Management | Basic | Manage access rights | | 6 | Access Control Management | Basic | Limit user privileges | | 7 | Continuous Vulnerability Management | Foundational | Find and fix vulnerabilities | | 8 | Audit Log Management | Foundational | Collect and review logs | | 9 | Email and Web Browser Protections | Foundational | Secure common attack vectors | | 10 | Malware Defenses | Foundational | Block and detect malicious code | | 11 | Data Recovery | Foundational | Plan for the worst | | 12 | Network Infrastructure Management | Foundational | Secure network devices | | 13 | Network Monitoring and Defense | Foundational | Detect and prevent attacks | | 14 | Security Awareness and Skills Training | Foundational | Human firewall | | 15 | Service Provider Management | Foundational | Secure your supply chain | | 16 | Application Software Security | Foundational | Develop secure applications | | 17 | Incident Response Management | Organizational | Prepare and practice | | 18 | Penetration Testing | Organizational | Test your defenses | ## Detailed Controls with Implementation Guidance ### CIS Control 1: Inventory and Control of Enterprise Assets | Safeguard | Description | Implementation | |-----------|-------------|----------------| | 1.1 | Establish Asset Inventory | Use automated tools (CMDB, network scanning, etc.) | | 1.2 | Address Unauthorized Assets | Implement NAC or 802.1x port security | | 1.3 | Utilize DHCP Logging | Configure DHCP servers to log lease information | | 1.4 | Use Dynamic Host Configuration Protocol (DHCP) | Standardize IP assignment | | 1.5 | Use a Passive Asset Discovery Tool | Deploy passive monitoring tools | **Key Tools:** - Network scanners (Nmap, Nessus) - Asset management systems (ServiceNow, Lansweeper) - NAC solutions (Cisco ISE, FortiNAC) - CMDB systems **Framework Mappings:** - NIST CSF: ID.AM-1, ID.AM-2, ID.AM-5 - ISO 27001: A.8.1.1, A.8.1.2 - NIST 800-53: CM-8, PM-5 - GDPR: Article 30 ### CIS Control 2: Inventory and Control of Software Assets | Safeguard | Description | Implementation | |-----------|-------------|----------------| | 2.1 | Establish Software Inventory | Deploy software inventory tools | | 2.2 | Ensure Authorized Software is Currently Supported | Track EOL/EOS dates | | 2.3 | Address Unauthorized Software | Implement application whitelisting | | 2.4 | Utilize Automated Software Inventory Tools | Use agent-based inventory tools | | 2.5 | Allow Only Authorized Software | Implement application control | | 2.6 | Allow Only Authorized Libraries | Control libraries and dependencies | | 2.7 | Allow Only Authorized Scripts | Implement script control (PowerShell, etc.) | **Key Tools:** - Software inventory tools (Microsoft SCCM, Lansweeper) - Application whitelisting (AppLocker, Carbon Black) - Package managers with inventory capabilities - Script control (PowerShell execution policies) **Framework Mappings:** - NIST CSF: ID.AM-2, PR.DS-6, PR.IP-1 - ISO 27001: A.12.6.2, A.8.1.1, A.8.1.2 - NIST 800-53: CM-7, CM-8, SA-4 - PCI DSS: 2.4, 6.2 ### CIS Control 3: Data Protection | Safeguard | Description | Implementation | |-----------|-------------|----------------| | 3.1 | Establish Data Management Process | Implement data classification | | 3.2 | Establish Data Inventory | Document sensitive data locations | | 3.3 | Configure Data Access Control Lists | Implement need-to-know permissions | | 3.4 | Enforce Data Retention | Deploy automated policies | | 3.5 | Securely Delete Data | Implement secure deletion tools | | 3.6 | Encrypt Data on End-User Devices | Deploy full-disk encryption | | 3.7 | Establish Data Classification | Define sensitivity levels | | 3.8 | Document Data Flows | Map how data moves through systems | | 3.9 | Encrypt Data in Transit | Implement TLS for communications | | 3.10 | Encrypt Sensitive Data at Rest | Deploy database/storage encryption | | 3.11 | Encrypt Sensitive Data in Use | Utilize privacy-preserving technologies | | 3.12 | Segment Data Processing and Storage | Separate sensitive data environments | | 3.13 | Deploy a Data Loss Prevention Solution | Implement DLP tools | | 3.14 | Log Sensitive Data Access | Monitor access to classified data | **Key Tools:** - DLP solutions (Symantec, Digital Guardian) - Encryption tools (BitLocker, VeraCrypt) - Data classification tools (Microsoft AIP, Titus) - Access monitoring tools **Framework Mappings:** - NIST CSF: PR.DS-1, PR.DS-2, PR.DS-5, PR.PT-2 - ISO 27001: A.8.2.1, A.8.2.2, A.8.2.3, A.10.1.1 - NIST 800-53: SC-8, SC-28, MP-2, MP-3, MP-4 - GDPR: Articles 5, 6, 25, 32 - PCI DSS: 3.1, 3.2, 3.4, 3.5, 3.6 ### CIS Control 4: Secure Configuration of Enterprise Assets and Software | Safeguard | Description | Implementation | |-----------|-------------|----------------| | 4.1 | Establish Secure Configuration Process | Document hardening standards | | 4.2 | Establish Secure Configuration Management | Use secure baselines | | 4.3 | Configure Automatic Session Locking | Set screen timeout policies | | 4.4 | Implement Strong Authentication | Use MFA where possible | | 4.5 | Implement Secure Boot | Enable secure boot on systems | | 4.6 | Securely Manage Enterprise Assets | Use trusted software/images | | 4.7 | Manage Default Accounts | Change defaults, disable when possible | | 4.8 | Uninstall or Disable Unnecessary Services | Remove unneeded services | | 4.9 | Configure Trusted DNS Servers | Use secure DNS providers | | 4.10 | Enforce Secure Configuration | Monitor and enforce compliance | | 4.11 | Apply Host-Based Firewalls | Deploy on all endpoints | | 4.12 | Separate Management Network | Isolate management traffic | **Key Tools:** - Configuration management (Chef, Puppet, Ansible) - Secure configuration scanners (CIS-CAT, Nessus) - Group Policy/MDM solutions - Baseline management tools **Framework Mappings:** - NIST CSF: PR.IP-1, PR.PT-3 - ISO 27001: A.12.1.2, A.14.2.2, A.14.2.3, A.14.2.4 - NIST 800-53: CM-2, CM-6, CM-7, IA-5 - PCI DSS: 2.2, 2.3, 2.6 ### CIS Control 5: Account Management | Safeguard | Description | Implementation | |-----------|-------------|----------------| | 5.1 | Establish Account Management Process | Document user lifecycle | | 5.2 | Use Unique Passwords | Implement password policies | | 5.3 | Disable Dormant Accounts | Auto-disable after inactivity | | 5.4 | Restrict Administrator Privileges | Limit admin accounts | | 5.5 | Establish Account Monitoring | Alert on suspicious activities | | 5.6 | Centralize Account Management | Use directory services | | 5.7 | Implement MFA for Privileged Users | Require strong auth for admins | | 5.8 | Implement MFA for Remote Network Access | Secure VPN/external connections | | 5.9 | Implement MFA for Internet-Accessible Services | Protect external services | **Key Tools:** - Identity Management (Active Directory, Okta) - Privileged Access Management (CyberArk, BeyondTrust) - MFA solutions (Duo, RSA) - Account monitoring tools **Framework Mappings:** - NIST CSF: PR.AC-1, PR.AC-4, PR.AC-7 - ISO 27001: A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.5, A.9.2.6 - NIST 800-53: AC-2, AC-3, AC-6, IA-2, IA-5 - PCI DSS: 7.1, 7.2, 8.1, 8.2, 8.3 ### CIS Control 6: Access Control Management | Safeguard | Description | Implementation | |-----------|-------------|----------------| | 6.1 | Establish Access Control Management Process | Define access request/approval process | | 6.2 | Establish Access Revoking Process | Document termination procedures | | 6.3 | Require MFA for Externally-Exposed Applications | Protect public-facing services | | 6.4 | Require MFA for Remote Network Access | Secure remote connections | | 6.5 | Require MFA for Administrative Access | Use strong auth for all privileged actions | | 6.6 | Establish An Access Governance Process | Implement periodic reviews | | 6.7 | Centralize Access Control | Use single access platform | | 6.8 | Define Acceptable Use | Create policy for proper system use | | 6.9 | Control Credential Disclosure | Protect secrets | **Key Tools:** - Role-based access control systems - Identity Governance solutions (SailPoint, Saviynt) - Access certification tools - PAM solutions **Framework Mappings:** - NIST CSF: PR.AC-1, PR.AC-3, PR.AC-4 - ISO 27001: A.9.1.1, A.9.1.2, A.9.2.3, A.9.4.1 - NIST 800-53: AC-1, AC-2, AC-3, AC-5, AC-6, AC-17 - PCI DSS: 7.1, 7.2, 8.3 ### CIS Control 7: Continuous Vulnerability Management | Safeguard | Description | Implementation | |-----------|-------------|----------------| | 7.1 | Establish Vulnerability Management Process | Define scanning schedule | | 7.2 | Establish a Remediation Process | Document patching procedures | | 7.3 | Perform Automated Operating System Patch Management | Use patch management tools | | 7.4 | Perform Automated Application Patch Management | Automate app updates | | 7.5 | Perform Automated Vulnerability Scans | Schedule regular scans | | 7.6 | Remediate Detected Vulnerabilities | Track and manage fixes | | 7.7 | Utilize Industry-Recommended Vulnerability Sources | Subscribe to advisory feeds | **Key Tools:** - Vulnerability scanners (Nessus, Qualys, OpenVAS) - Patch management (WSUS, SCCM, Ivanti) - Vulnerability management platforms - Threat intelligence feeds **Framework Mappings:** - NIST CSF: ID.RA-1, ID.RA-2, PR.IP-12 - ISO 27001: A.12.6.1, A.12.6.2, A.14.2.3 - NIST 800-53: RA-3, RA-5, SI-2 - PCI DSS: 6.1, 6.2, 11.2 ### CIS Control 8: Audit Log Management | Safeguard | Description | Implementation | |-----------|-------------|----------------| | 8.1 | Establish Audit Log Management | Define logging strategy | | 8.2 | Collect Audit Logs | Configure logging for all assets | | 8.3 | Ensure Adequate Audit Log Storage | Size storage appropriately | | 8.4 | Standardize Time Synchronization | Implement NTP | | 8.5 | Collect Detailed Audit Logs | Capture comprehensive events | | 8.6 | Collect DNS Query Logs | Monitor DNS activity | | 8.7 | Collect URL Request Logs | Track web browsing | | 8.8 | Collect Command-Line Audit Logs | Monitor command execution | | 8.9 | Centralize Audit Logs | Aggregate to SIEM | | 8.10 | Retain Audit Logs | Define retention period | | 8.11 | Conduct Audit Log Reviews | Regular log analysis | | 8.12 | Collect Service Provider Logs | Include cloud services | **Key Tools:** - SIEM solutions (Splunk, ELK Stack, QRadar) - Log aggregation tools (NXLog, Syslog-ng) - NTP servers - Log storage solutions **Framework Mappings:** - NIST CSF: PR.PT-1, DE.CM-1, DE.CM-3, DE.CM-7 - ISO 27001: A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4 - NIST 800-53: AU-2, AU-3, AU-6, AU-7, AU-8, AU-9, AU-11, AU-12 - PCI DSS: 10.1, 10.2, 10.3, 10.4, 10.5, 10.6, 10.7 ### CIS Control 9: Email and Web Browser Protections | Safeguard | Description | Implementation | |-----------|-------------|----------------| | 9.1 | Ensure Use of Only Fully Supported Browsers and Email Clients | Keep updated | | 9.2 | Use DNS Filtering Services | Block malicious domains | | 9.3 | Maintain Network-Based URL Filters | Implement web filtering | | 9.4 | Restrict Unnecessary or Unauthorized Browser and Email Client Extensions | Control plugins | | 9.5 | Implement DMARC | Enable email authentication | | 9.6 | Block Unnecessary File Types | Filter risky attachments | | 9.7 | Deploy and Maintain Email Server Anti-Malware Protections | Scan emails for threats | **Key Tools:** - Secure email gateways (Proofpoint, Mimecast) - DNS filtering (Cisco Umbrella, Quad9) - Web proxies (Zscaler, Blue Coat) - Email authentication (DKIM, SPF, DMARC) **Framework Mappings:** - NIST CSF: PR.DS-6, PR.DS-7, DE.CM-5 - ISO 27001: A.13.1.1, A.13.1.2 - NIST 800-53: SC-7, SC-8 - PCI DSS: 1.3, 4.1, 5.1, 5.3 ### CIS Control 10: Malware Defenses | Safeguard | Description | Implementation | |-----------|-------------|----------------| | 10.1 | Deploy and Maintain Anti-Malware Software | Install on all endpoints | | 10.2 | Configure Automatic Anti-Malware Signature Updates | Enable auto-updates | | 10.3 | Disable Autorun and Autoplay for Removable Media | Prevent auto-execution | | 10.4 | Configure Automatic Anti-Malware Scanning | Schedule regular scans | | 10.5 | Enable Anti-Exploitation Features | Use OS security features | | 10.6 | Centrally Manage Anti-Malware Software | Deploy management console | | 10.7 | Use Behavior-Based Anti-Malware Software | Implement advanced protection | **Key Tools:** - Endpoint protection platforms (CrowdStrike, Symantec, Microsoft Defender) - Application whitelisting - Behavioral analysis tools - Anti-exploitation (EMET, Windows Defender Exploit Guard) **Framework Mappings:** - NIST CSF: DE.CM-4, DE.CM-5, PR.DS-5 - ISO 27001: A.12.2.1 - NIST 800-53: SI-3, SI-4, SI-8 - PCI DSS: 5.1, 5.2, 5.3 ### CIS Control 11: Data Recovery | Safeguard | Description | Implementation | |-----------|-------------|----------------| | 11.1 | Establish Data Recovery Process | Document backup procedures | | 11.2 | Perform Automated Backups | Schedule regular backups | | 11.3 | Protect Recovery Data | Secure backup infrastructure | | 11.4 | Establish Secure Recovery Process | Document restoration procedures | | 11.5 | Test Data Recovery | Regular restore testing | **Key Tools:** - Backup solutions (Veeam, Veritas, Commvault) - Cloud backup (AWS Backup, Azure Backup) - Immutable storage - Air-gapped backups **Framework Mappings:** - NIST CSF: PR.IP-4, RC.RP-1 - ISO 27001: A.12.3.1, A.17.1.2, A.17.1.3 - NIST 800-53: CP-9, CP-10 - PCI DSS: 9.5, 9.6, 9.7, 12.10.1 ### CIS Control 12: Network Infrastructure Management | Safeguard | Description | Implementation | |-----------|-------------|----------------| | 12.1 | Ensure Network Infrastructure is Up-to-Date | Patch networking devices | | 12.2 | Establish Network Infrastructure Management Process | Document procedures | | 12.3 | Securely Manage Network Infrastructure | Use secure protocols | | 12.4 | Establish and Maintain Dedicated, Secure Management Network | Separate management plane | | 12.5 | Centralize Network Authentication, Authorization, and Auditing | Implement AAA | | 12.6 | Use Standard Secure Signaling and Transport Protocols | Secure communications | | 12.7 | Ensure Remote Devices Utilize a VPN | Secure remote connections | | 12.8 | Establish and Maintain Dedicated Computing Resources for Critical Networks | Segment sensitive functions | **Key Tools:** - Network management platforms (Cisco, Aruba, Juniper) - AAA servers (RADIUS, TACACS+) - Network configuration management - VPN solutions **Framework Mappings:** - NIST CSF: PR.AC-5, PR.PT-4 - ISO 27001: A.13.1.1, A.13.1.3 - NIST 800-53: AC-17, AC-18, IA-3, SC-7, SC-8 - PCI DSS: 1.1, 1.2, 1.3, 2.2 ### CIS Control 13: Network Monitoring and Defense | Safeguard | Description | Implementation | |-----------|-------------|----------------| | 13.1 | Centralize Security Event Alerting | Implement SIEM | | 13.2 | Deploy a Host-Based IDS or IPS | Install endpoint detection | | 13.3 | Deploy a Network-Based IDS, IPS or NDR | Monitor network traffic | | 13.4 | Perform Traffic Filtering | Deploy firewalls | | 13.5 | Manage Access Control for Remote Assets | Control remote connections | | 13.6 | Collect Network Traffic Flow Logs | Capture NetFlow | | 13.7 | Deploy a Network-Based DLP | Monitor for data exfiltration | | 13.8 | Deploy a Network-Based Sandbox | Analyze suspicious files | | 13.9 | Deploy Port-Level Access Control | Implement 802.1X | | 13.10 | Perform Application Layer Filtering | Use web application firewalls | | 13.11 | Tune Security Event Alerting Thresholds | Reduce false positives | **Key Tools:** - Network IDS/IPS (Suricata, Snort, Cisco) - SIEM solutions (Splunk, QRadar) - NDR solutions (Darktrace, ExtraHop) - NetFlow analyzers - Next-gen firewalls **Framework Mappings:** - NIST CSF: DE.AE-1, DE.AE-2, DE.AE-3, DE.CM-1, DE.CM-7 - ISO 27001: A.12.4.1, A.13.1.1, A.13.1.2 - NIST 800-53: SI-4, AU-6 - PCI DSS: 10.6, 11.4, 11.5 ### CIS Control 14: Security Awareness and Skills Training | Safeguard | Description | Implementation | |-----------|-------------|----------------| | 14.1 | Establish Security Awareness Program | Document training strategy | | 14.2 | Train Workforce Members | Implement regular training | | 14.3 | Train Workforce on Authentication Best Practices | Password/MFA education | | 14.4 | Train Workforce on Data Handling Best Practices | Sensitive data procedures | | 14.5 | Train Workforce on Causes of Unintentional Data Exposure | Prevent mistakes | | 14.6 | Train Workforce on Recognizing and Reporting Security Incidents | Incident reporting process | | 14.7 | Train Workforce on How to Identify and Report Phishing Attacks | Phishing recognition | | 14.8 | Train Workforce on Secure Use of Social Media | Social media risks | | 14.9 | Train Workforce on Secure Use of Mobile Devices | Mobile security | **Key Tools:** - Security awareness platforms (KnowBe4, Proofpoint) - Phishing simulation tools - Learning management systems - Training content providers **Framework Mappings:** - NIST CSF: PR.AT-1, PR.AT-2, PR.AT-5 - ISO 27001: A.7.2.2, A.7.2.3 - NIST 800-53: AT-1, AT-2, AT-3 - PCI DSS: 12.6, 12.6.1, 12.6.2 ### CIS Control 15: Service Provider Management | Safeguard | Description | Implementation | |-----------|-------------|----------------| | 15.1 | Establish Service Provider Management Process | Document vendor management | | 15.2 | Establish Service Provider Requirements | Define security expectations | | 15.3 | Monitor Service Provider Compliance | Regular reviews | | 15.4 | Ensure Service Provider Contracts Include Security Requirements | Contract requirements | | 15.5 | Assess Service Providers | Due diligence process | | 15.6 | Monitor Service Provider Security | Ongoing validation | | 15.7 | Securely Decommission Service Providers | Offboarding process | **Key Tools:** - Vendor risk management platforms - Contract management systems - Security questionnaires - Continuous monitoring tools **Framework Mappings:** - NIST CSF: ID.SC-1, ID.SC-2, ID.SC-3, ID.SC-4, ID.SC-5 - ISO 27001: A.15.1.1, A.15.1.2, A.15.1.3, A.15.2.1, A.15.2.2 - NIST 800-53: SA-9, SA-12 - PCI DSS: 12.8, 12.8.1-5, 12.9 ### CIS Control 16: Application Software Security | Safeguard | Description | Implementation | |-----------|-------------|----------------| | 16.1 | Establish Application Security Program | Document SDLC security | | 16.2 | Perform Application Classification | Assess application criticality | | 16.3 | Implement Secure Software Development Practices | Secure coding standards | | 16.4 | Establish a Secure Software Development Lifecycle | Include security in SDLC | | 16.5 | Use Up-to-Date and Trusted Third-Party Components | Manage dependencies | | 16.6 | Establish Secure Coding Practices | Developer guidelines | | 16.7 | Use Standard Hardening Configuration Templates | Application hardening | | 16.8 | Separate Production and Non-Production Systems | Environment segregation | | 16.9 | Train Developers in Application Security Concepts and Secure Coding | Developer education | | 16.10 | Apply Secure Design Principles in Application Architectures | Security architecture | | 16.11 | Leverage Vetted Modules or Services | Use proven components | | 16.12 | Implement Code-Level Security Checks | SAST/DAST | | 16.13 | Conduct Application Penetration Testing | Security testing | | 16.14 | Conduct Threat Modeling | Identify attack vectors | **Key Tools:** - SAST tools (SonarQube, Checkmarx) - DAST tools (OWASP ZAP, Burp Suite) - Dependency scanners (OWASP Dependency-Check) - SCA tools (Snyk, Black Duck) **Framework Mappings:** - NIST CSF: PR.DS-7, PR.IP-2 - ISO 27001: A.14.1.1, A.14.2.1, A.14.2.2, A.14.2.5, A.14.2.6, A.14.2.8 - NIST 800-53: SA-3, SA-4, SA-8, SA-11, SA-15, SA-16 - PCI DSS: 6.3, 6.4, 6.5, 6.6 ### CIS Control 17: Incident Response Management | Safeguard | Description | Implementation | |-----------|-------------|----------------| | 17.1 | Establish Incident Response Process | Document IR plan | | 17.2 | Establish and Maintain Contact Information for Reporting Security Incidents | Define escalation paths | | 17.3 | Establish and Maintain an Enterprise Process for Reporting Incidents | Report procedures | | 17.4 | Establish and Maintain An Incident Response Process | IR workflows | | 17.5 | Assign Key Roles and Responsibilities | Define IR team | | 17.6 | Define Mechanisms for Communicating During Incident Response | Communication plans | | 17.7 | Conduct Routine Incident Response Exercises | Tabletop exercises | | 17.8 | Conduct Post-Incident Reviews | Lessons learned process | | 17.9 | Establish and Maintain Security Incident Thresholds | Event classification | **Key Tools:** - Incident response platforms (TheHive, RTIR) - Digital forensics tools - Threat intelligence platforms - Communication platforms **Framework Mappings:** - NIST CSF: RS.RP-1, RS.CO-1, RS.AN-1, RS.MI-1, RS.MI-2, RC.RP-1 - ISO 27001: A.16.1.1, A.16.1.2, A.16.1.3, A.16.1.4, A.16.1.5, A.16.1.6, A.16.1.7 - NIST 800-53: IR-1, IR-2, IR-3, IR-4, IR-5, IR-6, IR-7, IR-8 - PCI DSS: 12.10, 12.10.1, 12.10.2, 12.10.3, 12.10.4, 12.10.5, 12.10.6 ### CIS Control 18: Penetration Testing | Safeguard | Description | Implementation | |-----------|-------------|----------------| | 18.1 | Establish Penetration Testing Program | Document testing strategy | | 18.2 | Perform Regular External Penetration Tests | Test external perimeter | | 18.3 | Perform Regular Internal Penetration Tests | Test internal network | | 18.4 | Validate Security Measures | Verify control effectiveness | | 18.5 | Document Penetration Testing Results | Report all findings | | 18.6 | Test Critical Systems and Services | Focus on key assets | | 18.7 | Remediate Penetration Test Findings | Fix identified issues | | 18.8 | Use Qualified Penetration Testers | Engage skilled professionals | | 18.9 | Conduct Application Penetration Testing | Test web applications | | 18.10 | Conduct Physical Penetration Testing | Test physical security | **Key Tools:** - Penetration testing tools (Metasploit, Nmap, Burp Suite) - Vulnerability scanners (Nessus, OpenVAS) - Social engineering tools (SET, Gophish) - Physical penetration testing equipment **Framework Mappings:** - NIST CSF: ID.RA-1, DE.CM-8 - ISO 27001: A.14.2.8, A.18.2.1, A.18.2.3 - NIST 800-53: CA-8, RA-5, SA-11 - PCI DSS: 11.3, 11.3.1, 11.3.2, 11.3.3, 11.3.4 ## Framework Mapping Matrix | CIS Control | NIST CSF | ISO 27001 | NIST 800-53 | PCI DSS | HIPAA | GDPR | |-------------|----------|-----------|-------------|---------|-------|------| | 1. Inventory and Control of Enterprise Assets | ID.AM-1, ID.AM-2 | A.8.1.1, A.8.1.2 | CM-8, PM-5 | 2.4, 9.9, 11.1 | §164.310(d) | Art 30, 32 | | 2. Inventory and Control of Software Assets | ID.AM-2, PR.DS-6 | A.12.6.2, A.8.1.1 | CM-7, CM-8 | 2.4, 6.2 | §164.310(d) | Art 30 | | 3. Data Protection | PR.DS-1, PR.DS-2, PR.DS-5 | A.8.2.1-3, A.10.1.1 | SC-8, SC-28, MP-2-4 | 3.1-6, 4.1-2 | §164.312(a)(2)(iv) | Art 5, 6, 25, 32 | | 4. Secure Configuration of Enterprise Assets and Software | PR.IP-1, PR.PT-3 | A.12.1.2, A.14.2.2-4 | CM-2, CM-6, CM-7 | 2.2, 2.3, 2.6 | §164.310(c) | Art 25, 32 | | 5. Account Management | PR.AC-1, PR.AC-4, PR.AC-7 | A.9.2.1-6 | AC-2, AC-3, AC-6, IA-2, IA-5 | 7.1, 7.2, 8.1-3 | §164.308(a)(3), §164.308(a)(4) | Art 25, 32 | | 6. Access Control Management | PR.AC-1, PR.AC-3, PR.AC-4 | A.9.1.1-2, A.9.2.3, A.9.4.1 | AC-1-6, AC-17 | 7.1, 7.2, 8.3 | §164.308(a)(4) | Art 25, 32 | | 7. Continuous Vulnerability Management | ID.RA-1, ID.RA-2, PR.IP-12 | A.12.6.1-2, A.14.2.3 | RA-3, RA-5, SI-2 | 6.1, 6.2, 11.2 | §164.308(a)(1)(ii)(A) | Art 32 | | 8. Audit Log Management | PR.PT-1, DE.CM-1, DE.CM-3 | A.12.4.1-4 | AU-2-3, AU-6-12 | 10.1-7 | §164.308(a)(1)(ii)(D), §164.312(b) | Art 30, 32 | | 9. Email and Web Browser Protections | PR.DS-6, PR.DS-7, DE.CM-5 | A.13.1.1-2 | SC-7, SC-8 | 1.3, 4.1, 5.1, 5.3 | §164.308(a)(5)(ii)(B) | Art 32 | | 10. Malware Defenses | DE.CM-4, DE.CM-5, PR.DS-5 | A.12.2.1 | SI-3, SI-4, SI-8 | 5.1-3 | §164.308(a)(5)(ii)(B) | Art 32 | | 11. Data Recovery | PR.IP-4, RC.RP-1 | A.12.3.1, A.17.1.2-3 | CP-9, CP-10 | 9.5-7, 12.10.1 | §164.308(a)(7) | Art 32 | | 12. Network Infrastructure Management | PR.AC-5, PR.PT-4 | A.13.1.1, A.13.1.3 | AC-17-18, IA-3, SC-7-8 | 1.1-3, 2.2 | §164.312(a)(1) | Art 32 | | 13. Network Monitoring and Defense | DE.AE-1-3, DE.CM-1, DE.CM-7 | A.12.4.1, A.13.1.1-2 | SI-4, AU-6 | 10.6, 11.4, 11.5 | §164.308(a)(1)(ii)(D), §164.312(b) | Art 32 | | 14. Security Awareness and Skills Training | PR.AT-1, PR.AT-2, PR.AT-5 | A.7.2.2-3 | AT-1, AT-2, AT-3 | 12.6, 12.6.1-2 | §164.308(a)(5) | Art 32, 39 | | 15. Service Provider Management | ID.SC-1-5 | A.15.1.1-3, A.15.2.1-2 | SA-9, SA-12 | 12.8, 12.8.1-5, 12.9 | §164.308(b) | Art 28, 32 | | 16. Application Software Security | PR.DS-7, PR.IP-2 | A.14.1.1, A.14.2.1-2, A.14.2.5-6, A.14.2.8 | SA-3-4, SA-8, SA-11, SA-15-16 | 6.3-6 | §164.312(a)(1) | Art 25, 32 | | 17. Incident Response Management | RS.RP-1, RS.CO-1, RS.AN-1, RS.MI-1-2, RC.RP-1 | A.16.1.1-7 | IR-1-8 | 12.10, 12.10.1-6 | §164.308(a)(6) | Art 33, 34 | | 18. Penetration Testing | ID.RA-1, DE.CM-8 | A.14.2.8, A.18.2.1, A.18.2.3 | CA-8, RA-5, SA-11 | 11.3, 11.3.1-4 | §164.308(a)(8) | Art 32 | ## Implementation Priorities by Organization Size ### Small Organizations (Limited Resources) **Essential Controls to Implement First:** 1. CIS Control 1: Inventory and Control of Enterprise Assets 2. CIS Control 2: Inventory and Control of Software Assets 3. CIS Control 3: Data Protection (focus on encryption) 4. CIS Control 4: Secure Configuration (basic hardening) 5. CIS Control 5: Account Management (focus on privileged accounts) 6. CIS Control 7: Continuous Vulnerability Management (basic patching) 7. CIS Control 10: Malware Defenses (endpoint protection) 8. CIS Control 11: Data Recovery (basic backup strategy) 9. CIS Control 14: Security Awareness Training (basic program) **Implementation Tips:** - Use free/open source tools where possible - Focus on cloud-based security solutions with minimal infrastructure - Implement managed security services for areas requiring expertise - Prioritize protecting the most critical systems and data - Consider outsourcing complex controls ### Medium Organizations (Moderate Resources) **Implementation Order:** 1. Implement all Basic controls (1-6) thoroughly 2. Implement Foundational controls (7-16) with focus on: - CIS Control 7: Continuous Vulnerability Management - CIS Control 8: Audit Log Management - CIS Control 10: Malware Defenses - CIS Control 11: Data Recovery - CIS Control 12: Network Infrastructure Management - CIS Control 13: Network Monitoring and Defense 3. Begin implementing Organizational controls (17-18) **Implementation Tips:** - Establish formal security program with dedicated resources - Implement automation where possible - Consider hybrid of in-house and outsourced security services - Establish metrics to measure control effectiveness ### Large Organizations (Significant Resources) **Implementation Approach:** 1. Implement all 18 CIS Controls comprehensively 2. Focus on automation and integration 3. Establish continuous monitoring and improvement 4. Customize controls for industry-specific requirements 5. Implement advanced capabilities within each control **Implementation Tips:** - Develop custom security architecture aligned with controls - Implement defense-in-depth strategy - Establish centralized security operations capability - Integrate controls with risk management program - Establish control validation and testing program ## Implementation Challenges and Solutions | Challenge | Description | Potential Solutions | |-----------|-------------|---------------------| | **Resource Constraints** | Limited budget, staff, or time | Start with critical controls, use free tools, consider managed services | | **Technical Complexity** | Some controls require specialized expertise | Outsource complex controls, invest in training, use simplified solutions | | **Legacy Systems** | Older systems may not support modern security | Implement compensating controls, isolate legacy systems, prioritize replacement | | **Organizational Resistance** | User pushback to security measures | Focus on user experience, demonstrate business value, executive sponsorship | | **Lack of Visibility** | Incomplete view of environment | Implement asset discovery tools, start with known assets, incremental improvement | | **Monitoring Fatigue** | Too many alerts, not enough analysts | Tune detections, prioritize alerts, automate responses where possible | | **Integration Challenges** | Making tools work together | Select integration-friendly solutions, use APIs, standardize data formats | | **Measuring Effectiveness** | Difficulty proving control value | Establish baseline metrics, track improvements, use maturity models | ## CIS Controls Implementation Roadmap ### Phase 1: Foundation (Months 1-3) - Complete initial asset inventory (CIS 1, 2) - Implement basic account controls (CIS 5) - Deploy endpoint protection (CIS 10) - Establish backup solution (CIS 11) - Begin security awareness program (CIS 14) ### Phase 2: Basic Security Posture (Months 4-6) - Implement secure configurations (CIS 4) - Establish vulnerability management (CIS 7) - Deploy basic log management (CIS 8) - Secure email and web browsing (CIS 9) - Document incident response procedures (CIS 17) ### Phase 3: Enhanced Protection (Months 7-12) - Implement data protection controls (CIS 3) - Enhance access control (CIS 6) - Secure network infrastructure (CIS 12) - Deploy network monitoring (CIS 13) - Review vendor security (CIS 15) ### Phase 4: Advanced Capabilities (Months 13-18) - Implement application security (CIS 16) - Conduct penetration testing (CIS 18) - Enhance and refine all controls - Establish metrics and reporting - Integrate with risk management ## Key Performance Indicators by Control | Control | Key Metrics | Target Values | |---------|-------------|---------------| | **1. Inventory** | % of assets inventoried, Unauthorized device detection time | >95% inventoried, <24h detection | | **2. Software Inventory** | % of software inventoried, % of unauthorized software | >95% inventoried, <2% unauthorized | | **3. Data Protection** | % of sensitive data encrypted, data loss incidents | >99% encrypted, 0 incidents | | **4. Secure Configuration** | % of systems with secure baseline, configuration drift rate | >95% compliant, <5% drift | | **5. Account Management** | % of accounts reviewed, dormant account count | 100% reviewed annually, <5% dormant | | **6. Access Control** | Excessive privilege rate, access review completion | <5% with excessive rights, 100% reviewed | | **7. Vulnerability Management** | Mean time to patch critical vulnerabilities, scan coverage | <7 days MTTR, >98% coverage | | **8. Audit Logging** | Logging coverage, log retention compliance | >98% coverage, 100% retention compliance | | **9. Email/Web Protection** | Phishing simulation success rate, malware blocked | <5% click rate, >99% block rate | | **10. Malware Defense** | Endpoint protection coverage, detection time | >99% coverage, <1 hour detection | | **11. Data Recovery** | Backup success rate, recovery time objective achievement | >99% success, 100% RTO met | | **12. Network Management** | Network device compliance, unauthorized change rate | >98% compliance, <1% unauthorized | | **13. Network Monitoring** | Alert triage time, true positive rate | <30 min triage, >80% true positive | | **14. Security Training** | Training completion rate, knowledge assessment scores | >95% completion, >85% score | | **15. Service Providers** | % of providers assessed, contract compliance | 100% assessed, 100% compliant | | **16. Application Security** | % of apps security tested, critical vulnerability remediation | 100% critical apps tested, <7 days remediation | | **17. Incident Response** | Mean time to respond, exercise completion | <4 hours MTTR, ≥2 exercises annually | | **18. Penetration Testing** | Test coverage, findings remediation rate | 100% critical systems, >95% remediation |