security-cheatsheets/infosec/cis_18_controls.md
2025-04-16 01:35:23 -06:00

32 KiB

CIS 18 Controls Cheatsheet

Overview

The CIS Controls are a prioritized set of safeguards to mitigate the most prevalent cyber-attacks against systems and networks. This cheatsheet provides a quick reference to the 18 CIS Controls (v8), implementation guidance, and mappings to major frameworks.

CIS Controls Summary

# Control Category Purpose
1 Inventory and Control of Enterprise Assets Basic Know what's on your network
2 Inventory and Control of Software Assets Basic Know what's running on your network
3 Data Protection Basic Protect sensitive information
4 Secure Configuration of Enterprise Assets and Software Basic Reduce the attack surface
5 Account Management Basic Manage access rights
6 Access Control Management Basic Limit user privileges
7 Continuous Vulnerability Management Foundational Find and fix vulnerabilities
8 Audit Log Management Foundational Collect and review logs
9 Email and Web Browser Protections Foundational Secure common attack vectors
10 Malware Defenses Foundational Block and detect malicious code
11 Data Recovery Foundational Plan for the worst
12 Network Infrastructure Management Foundational Secure network devices
13 Network Monitoring and Defense Foundational Detect and prevent attacks
14 Security Awareness and Skills Training Foundational Human firewall
15 Service Provider Management Foundational Secure your supply chain
16 Application Software Security Foundational Develop secure applications
17 Incident Response Management Organizational Prepare and practice
18 Penetration Testing Organizational Test your defenses

Detailed Controls with Implementation Guidance

CIS Control 1: Inventory and Control of Enterprise Assets

Safeguard Description Implementation
1.1 Establish Asset Inventory Use automated tools (CMDB, network scanning, etc.)
1.2 Address Unauthorized Assets Implement NAC or 802.1x port security
1.3 Utilize DHCP Logging Configure DHCP servers to log lease information
1.4 Use Dynamic Host Configuration Protocol (DHCP) Standardize IP assignment
1.5 Use a Passive Asset Discovery Tool Deploy passive monitoring tools

Key Tools:

  • Network scanners (Nmap, Nessus)
  • Asset management systems (ServiceNow, Lansweeper)
  • NAC solutions (Cisco ISE, FortiNAC)
  • CMDB systems

Framework Mappings:

  • NIST CSF: ID.AM-1, ID.AM-2, ID.AM-5
  • ISO 27001: A.8.1.1, A.8.1.2
  • NIST 800-53: CM-8, PM-5
  • GDPR: Article 30

CIS Control 2: Inventory and Control of Software Assets

Safeguard Description Implementation
2.1 Establish Software Inventory Deploy software inventory tools
2.2 Ensure Authorized Software is Currently Supported Track EOL/EOS dates
2.3 Address Unauthorized Software Implement application whitelisting
2.4 Utilize Automated Software Inventory Tools Use agent-based inventory tools
2.5 Allow Only Authorized Software Implement application control
2.6 Allow Only Authorized Libraries Control libraries and dependencies
2.7 Allow Only Authorized Scripts Implement script control (PowerShell, etc.)

Key Tools:

  • Software inventory tools (Microsoft SCCM, Lansweeper)
  • Application whitelisting (AppLocker, Carbon Black)
  • Package managers with inventory capabilities
  • Script control (PowerShell execution policies)

Framework Mappings:

  • NIST CSF: ID.AM-2, PR.DS-6, PR.IP-1
  • ISO 27001: A.12.6.2, A.8.1.1, A.8.1.2
  • NIST 800-53: CM-7, CM-8, SA-4
  • PCI DSS: 2.4, 6.2

CIS Control 3: Data Protection

Safeguard Description Implementation
3.1 Establish Data Management Process Implement data classification
3.2 Establish Data Inventory Document sensitive data locations
3.3 Configure Data Access Control Lists Implement need-to-know permissions
3.4 Enforce Data Retention Deploy automated policies
3.5 Securely Delete Data Implement secure deletion tools
3.6 Encrypt Data on End-User Devices Deploy full-disk encryption
3.7 Establish Data Classification Define sensitivity levels
3.8 Document Data Flows Map how data moves through systems
3.9 Encrypt Data in Transit Implement TLS for communications
3.10 Encrypt Sensitive Data at Rest Deploy database/storage encryption
3.11 Encrypt Sensitive Data in Use Utilize privacy-preserving technologies
3.12 Segment Data Processing and Storage Separate sensitive data environments
3.13 Deploy a Data Loss Prevention Solution Implement DLP tools
3.14 Log Sensitive Data Access Monitor access to classified data

Key Tools:

  • DLP solutions (Symantec, Digital Guardian)
  • Encryption tools (BitLocker, VeraCrypt)
  • Data classification tools (Microsoft AIP, Titus)
  • Access monitoring tools

Framework Mappings:

  • NIST CSF: PR.DS-1, PR.DS-2, PR.DS-5, PR.PT-2
  • ISO 27001: A.8.2.1, A.8.2.2, A.8.2.3, A.10.1.1
  • NIST 800-53: SC-8, SC-28, MP-2, MP-3, MP-4
  • GDPR: Articles 5, 6, 25, 32
  • PCI DSS: 3.1, 3.2, 3.4, 3.5, 3.6

CIS Control 4: Secure Configuration of Enterprise Assets and Software

Safeguard Description Implementation
4.1 Establish Secure Configuration Process Document hardening standards
4.2 Establish Secure Configuration Management Use secure baselines
4.3 Configure Automatic Session Locking Set screen timeout policies
4.4 Implement Strong Authentication Use MFA where possible
4.5 Implement Secure Boot Enable secure boot on systems
4.6 Securely Manage Enterprise Assets Use trusted software/images
4.7 Manage Default Accounts Change defaults, disable when possible
4.8 Uninstall or Disable Unnecessary Services Remove unneeded services
4.9 Configure Trusted DNS Servers Use secure DNS providers
4.10 Enforce Secure Configuration Monitor and enforce compliance
4.11 Apply Host-Based Firewalls Deploy on all endpoints
4.12 Separate Management Network Isolate management traffic

Key Tools:

  • Configuration management (Chef, Puppet, Ansible)
  • Secure configuration scanners (CIS-CAT, Nessus)
  • Group Policy/MDM solutions
  • Baseline management tools

Framework Mappings:

  • NIST CSF: PR.IP-1, PR.PT-3
  • ISO 27001: A.12.1.2, A.14.2.2, A.14.2.3, A.14.2.4
  • NIST 800-53: CM-2, CM-6, CM-7, IA-5
  • PCI DSS: 2.2, 2.3, 2.6

CIS Control 5: Account Management

Safeguard Description Implementation
5.1 Establish Account Management Process Document user lifecycle
5.2 Use Unique Passwords Implement password policies
5.3 Disable Dormant Accounts Auto-disable after inactivity
5.4 Restrict Administrator Privileges Limit admin accounts
5.5 Establish Account Monitoring Alert on suspicious activities
5.6 Centralize Account Management Use directory services
5.7 Implement MFA for Privileged Users Require strong auth for admins
5.8 Implement MFA for Remote Network Access Secure VPN/external connections
5.9 Implement MFA for Internet-Accessible Services Protect external services

Key Tools:

  • Identity Management (Active Directory, Okta)
  • Privileged Access Management (CyberArk, BeyondTrust)
  • MFA solutions (Duo, RSA)
  • Account monitoring tools

Framework Mappings:

  • NIST CSF: PR.AC-1, PR.AC-4, PR.AC-7
  • ISO 27001: A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.5, A.9.2.6
  • NIST 800-53: AC-2, AC-3, AC-6, IA-2, IA-5
  • PCI DSS: 7.1, 7.2, 8.1, 8.2, 8.3

CIS Control 6: Access Control Management

Safeguard Description Implementation
6.1 Establish Access Control Management Process Define access request/approval process
6.2 Establish Access Revoking Process Document termination procedures
6.3 Require MFA for Externally-Exposed Applications Protect public-facing services
6.4 Require MFA for Remote Network Access Secure remote connections
6.5 Require MFA for Administrative Access Use strong auth for all privileged actions
6.6 Establish An Access Governance Process Implement periodic reviews
6.7 Centralize Access Control Use single access platform
6.8 Define Acceptable Use Create policy for proper system use
6.9 Control Credential Disclosure Protect secrets

Key Tools:

  • Role-based access control systems
  • Identity Governance solutions (SailPoint, Saviynt)
  • Access certification tools
  • PAM solutions

Framework Mappings:

  • NIST CSF: PR.AC-1, PR.AC-3, PR.AC-4
  • ISO 27001: A.9.1.1, A.9.1.2, A.9.2.3, A.9.4.1
  • NIST 800-53: AC-1, AC-2, AC-3, AC-5, AC-6, AC-17
  • PCI DSS: 7.1, 7.2, 8.3

CIS Control 7: Continuous Vulnerability Management

Safeguard Description Implementation
7.1 Establish Vulnerability Management Process Define scanning schedule
7.2 Establish a Remediation Process Document patching procedures
7.3 Perform Automated Operating System Patch Management Use patch management tools
7.4 Perform Automated Application Patch Management Automate app updates
7.5 Perform Automated Vulnerability Scans Schedule regular scans
7.6 Remediate Detected Vulnerabilities Track and manage fixes
7.7 Utilize Industry-Recommended Vulnerability Sources Subscribe to advisory feeds

Key Tools:

  • Vulnerability scanners (Nessus, Qualys, OpenVAS)
  • Patch management (WSUS, SCCM, Ivanti)
  • Vulnerability management platforms
  • Threat intelligence feeds

Framework Mappings:

  • NIST CSF: ID.RA-1, ID.RA-2, PR.IP-12
  • ISO 27001: A.12.6.1, A.12.6.2, A.14.2.3
  • NIST 800-53: RA-3, RA-5, SI-2
  • PCI DSS: 6.1, 6.2, 11.2

CIS Control 8: Audit Log Management

Safeguard Description Implementation
8.1 Establish Audit Log Management Define logging strategy
8.2 Collect Audit Logs Configure logging for all assets
8.3 Ensure Adequate Audit Log Storage Size storage appropriately
8.4 Standardize Time Synchronization Implement NTP
8.5 Collect Detailed Audit Logs Capture comprehensive events
8.6 Collect DNS Query Logs Monitor DNS activity
8.7 Collect URL Request Logs Track web browsing
8.8 Collect Command-Line Audit Logs Monitor command execution
8.9 Centralize Audit Logs Aggregate to SIEM
8.10 Retain Audit Logs Define retention period
8.11 Conduct Audit Log Reviews Regular log analysis
8.12 Collect Service Provider Logs Include cloud services

Key Tools:

  • SIEM solutions (Splunk, ELK Stack, QRadar)
  • Log aggregation tools (NXLog, Syslog-ng)
  • NTP servers
  • Log storage solutions

Framework Mappings:

  • NIST CSF: PR.PT-1, DE.CM-1, DE.CM-3, DE.CM-7
  • ISO 27001: A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4
  • NIST 800-53: AU-2, AU-3, AU-6, AU-7, AU-8, AU-9, AU-11, AU-12
  • PCI DSS: 10.1, 10.2, 10.3, 10.4, 10.5, 10.6, 10.7

CIS Control 9: Email and Web Browser Protections

Safeguard Description Implementation
9.1 Ensure Use of Only Fully Supported Browsers and Email Clients Keep updated
9.2 Use DNS Filtering Services Block malicious domains
9.3 Maintain Network-Based URL Filters Implement web filtering
9.4 Restrict Unnecessary or Unauthorized Browser and Email Client Extensions Control plugins
9.5 Implement DMARC Enable email authentication
9.6 Block Unnecessary File Types Filter risky attachments
9.7 Deploy and Maintain Email Server Anti-Malware Protections Scan emails for threats

Key Tools:

  • Secure email gateways (Proofpoint, Mimecast)
  • DNS filtering (Cisco Umbrella, Quad9)
  • Web proxies (Zscaler, Blue Coat)
  • Email authentication (DKIM, SPF, DMARC)

Framework Mappings:

  • NIST CSF: PR.DS-6, PR.DS-7, DE.CM-5
  • ISO 27001: A.13.1.1, A.13.1.2
  • NIST 800-53: SC-7, SC-8
  • PCI DSS: 1.3, 4.1, 5.1, 5.3

CIS Control 10: Malware Defenses

Safeguard Description Implementation
10.1 Deploy and Maintain Anti-Malware Software Install on all endpoints
10.2 Configure Automatic Anti-Malware Signature Updates Enable auto-updates
10.3 Disable Autorun and Autoplay for Removable Media Prevent auto-execution
10.4 Configure Automatic Anti-Malware Scanning Schedule regular scans
10.5 Enable Anti-Exploitation Features Use OS security features
10.6 Centrally Manage Anti-Malware Software Deploy management console
10.7 Use Behavior-Based Anti-Malware Software Implement advanced protection

Key Tools:

  • Endpoint protection platforms (CrowdStrike, Symantec, Microsoft Defender)
  • Application whitelisting
  • Behavioral analysis tools
  • Anti-exploitation (EMET, Windows Defender Exploit Guard)

Framework Mappings:

  • NIST CSF: DE.CM-4, DE.CM-5, PR.DS-5
  • ISO 27001: A.12.2.1
  • NIST 800-53: SI-3, SI-4, SI-8
  • PCI DSS: 5.1, 5.2, 5.3

CIS Control 11: Data Recovery

Safeguard Description Implementation
11.1 Establish Data Recovery Process Document backup procedures
11.2 Perform Automated Backups Schedule regular backups
11.3 Protect Recovery Data Secure backup infrastructure
11.4 Establish Secure Recovery Process Document restoration procedures
11.5 Test Data Recovery Regular restore testing

Key Tools:

  • Backup solutions (Veeam, Veritas, Commvault)
  • Cloud backup (AWS Backup, Azure Backup)
  • Immutable storage
  • Air-gapped backups

Framework Mappings:

  • NIST CSF: PR.IP-4, RC.RP-1
  • ISO 27001: A.12.3.1, A.17.1.2, A.17.1.3
  • NIST 800-53: CP-9, CP-10
  • PCI DSS: 9.5, 9.6, 9.7, 12.10.1

CIS Control 12: Network Infrastructure Management

Safeguard Description Implementation
12.1 Ensure Network Infrastructure is Up-to-Date Patch networking devices
12.2 Establish Network Infrastructure Management Process Document procedures
12.3 Securely Manage Network Infrastructure Use secure protocols
12.4 Establish and Maintain Dedicated, Secure Management Network Separate management plane
12.5 Centralize Network Authentication, Authorization, and Auditing Implement AAA
12.6 Use Standard Secure Signaling and Transport Protocols Secure communications
12.7 Ensure Remote Devices Utilize a VPN Secure remote connections
12.8 Establish and Maintain Dedicated Computing Resources for Critical Networks Segment sensitive functions

Key Tools:

  • Network management platforms (Cisco, Aruba, Juniper)
  • AAA servers (RADIUS, TACACS+)
  • Network configuration management
  • VPN solutions

Framework Mappings:

  • NIST CSF: PR.AC-5, PR.PT-4
  • ISO 27001: A.13.1.1, A.13.1.3
  • NIST 800-53: AC-17, AC-18, IA-3, SC-7, SC-8
  • PCI DSS: 1.1, 1.2, 1.3, 2.2

CIS Control 13: Network Monitoring and Defense

Safeguard Description Implementation
13.1 Centralize Security Event Alerting Implement SIEM
13.2 Deploy a Host-Based IDS or IPS Install endpoint detection
13.3 Deploy a Network-Based IDS, IPS or NDR Monitor network traffic
13.4 Perform Traffic Filtering Deploy firewalls
13.5 Manage Access Control for Remote Assets Control remote connections
13.6 Collect Network Traffic Flow Logs Capture NetFlow
13.7 Deploy a Network-Based DLP Monitor for data exfiltration
13.8 Deploy a Network-Based Sandbox Analyze suspicious files
13.9 Deploy Port-Level Access Control Implement 802.1X
13.10 Perform Application Layer Filtering Use web application firewalls
13.11 Tune Security Event Alerting Thresholds Reduce false positives

Key Tools:

  • Network IDS/IPS (Suricata, Snort, Cisco)
  • SIEM solutions (Splunk, QRadar)
  • NDR solutions (Darktrace, ExtraHop)
  • NetFlow analyzers
  • Next-gen firewalls

Framework Mappings:

  • NIST CSF: DE.AE-1, DE.AE-2, DE.AE-3, DE.CM-1, DE.CM-7
  • ISO 27001: A.12.4.1, A.13.1.1, A.13.1.2
  • NIST 800-53: SI-4, AU-6
  • PCI DSS: 10.6, 11.4, 11.5

CIS Control 14: Security Awareness and Skills Training

Safeguard Description Implementation
14.1 Establish Security Awareness Program Document training strategy
14.2 Train Workforce Members Implement regular training
14.3 Train Workforce on Authentication Best Practices Password/MFA education
14.4 Train Workforce on Data Handling Best Practices Sensitive data procedures
14.5 Train Workforce on Causes of Unintentional Data Exposure Prevent mistakes
14.6 Train Workforce on Recognizing and Reporting Security Incidents Incident reporting process
14.7 Train Workforce on How to Identify and Report Phishing Attacks Phishing recognition
14.8 Train Workforce on Secure Use of Social Media Social media risks
14.9 Train Workforce on Secure Use of Mobile Devices Mobile security

Key Tools:

  • Security awareness platforms (KnowBe4, Proofpoint)
  • Phishing simulation tools
  • Learning management systems
  • Training content providers

Framework Mappings:

  • NIST CSF: PR.AT-1, PR.AT-2, PR.AT-5
  • ISO 27001: A.7.2.2, A.7.2.3
  • NIST 800-53: AT-1, AT-2, AT-3
  • PCI DSS: 12.6, 12.6.1, 12.6.2

CIS Control 15: Service Provider Management

Safeguard Description Implementation
15.1 Establish Service Provider Management Process Document vendor management
15.2 Establish Service Provider Requirements Define security expectations
15.3 Monitor Service Provider Compliance Regular reviews
15.4 Ensure Service Provider Contracts Include Security Requirements Contract requirements
15.5 Assess Service Providers Due diligence process
15.6 Monitor Service Provider Security Ongoing validation
15.7 Securely Decommission Service Providers Offboarding process

Key Tools:

  • Vendor risk management platforms
  • Contract management systems
  • Security questionnaires
  • Continuous monitoring tools

Framework Mappings:

  • NIST CSF: ID.SC-1, ID.SC-2, ID.SC-3, ID.SC-4, ID.SC-5
  • ISO 27001: A.15.1.1, A.15.1.2, A.15.1.3, A.15.2.1, A.15.2.2
  • NIST 800-53: SA-9, SA-12
  • PCI DSS: 12.8, 12.8.1-5, 12.9

CIS Control 16: Application Software Security

Safeguard Description Implementation
16.1 Establish Application Security Program Document SDLC security
16.2 Perform Application Classification Assess application criticality
16.3 Implement Secure Software Development Practices Secure coding standards
16.4 Establish a Secure Software Development Lifecycle Include security in SDLC
16.5 Use Up-to-Date and Trusted Third-Party Components Manage dependencies
16.6 Establish Secure Coding Practices Developer guidelines
16.7 Use Standard Hardening Configuration Templates Application hardening
16.8 Separate Production and Non-Production Systems Environment segregation
16.9 Train Developers in Application Security Concepts and Secure Coding Developer education
16.10 Apply Secure Design Principles in Application Architectures Security architecture
16.11 Leverage Vetted Modules or Services Use proven components
16.12 Implement Code-Level Security Checks SAST/DAST
16.13 Conduct Application Penetration Testing Security testing
16.14 Conduct Threat Modeling Identify attack vectors

Key Tools:

  • SAST tools (SonarQube, Checkmarx)
  • DAST tools (OWASP ZAP, Burp Suite)
  • Dependency scanners (OWASP Dependency-Check)
  • SCA tools (Snyk, Black Duck)

Framework Mappings:

  • NIST CSF: PR.DS-7, PR.IP-2
  • ISO 27001: A.14.1.1, A.14.2.1, A.14.2.2, A.14.2.5, A.14.2.6, A.14.2.8
  • NIST 800-53: SA-3, SA-4, SA-8, SA-11, SA-15, SA-16
  • PCI DSS: 6.3, 6.4, 6.5, 6.6

CIS Control 17: Incident Response Management

Safeguard Description Implementation
17.1 Establish Incident Response Process Document IR plan
17.2 Establish and Maintain Contact Information for Reporting Security Incidents Define escalation paths
17.3 Establish and Maintain an Enterprise Process for Reporting Incidents Report procedures
17.4 Establish and Maintain An Incident Response Process IR workflows
17.5 Assign Key Roles and Responsibilities Define IR team
17.6 Define Mechanisms for Communicating During Incident Response Communication plans
17.7 Conduct Routine Incident Response Exercises Tabletop exercises
17.8 Conduct Post-Incident Reviews Lessons learned process
17.9 Establish and Maintain Security Incident Thresholds Event classification

Key Tools:

  • Incident response platforms (TheHive, RTIR)
  • Digital forensics tools
  • Threat intelligence platforms
  • Communication platforms

Framework Mappings:

  • NIST CSF: RS.RP-1, RS.CO-1, RS.AN-1, RS.MI-1, RS.MI-2, RC.RP-1
  • ISO 27001: A.16.1.1, A.16.1.2, A.16.1.3, A.16.1.4, A.16.1.5, A.16.1.6, A.16.1.7
  • NIST 800-53: IR-1, IR-2, IR-3, IR-4, IR-5, IR-6, IR-7, IR-8
  • PCI DSS: 12.10, 12.10.1, 12.10.2, 12.10.3, 12.10.4, 12.10.5, 12.10.6

CIS Control 18: Penetration Testing

Safeguard Description Implementation
18.1 Establish Penetration Testing Program Document testing strategy
18.2 Perform Regular External Penetration Tests Test external perimeter
18.3 Perform Regular Internal Penetration Tests Test internal network
18.4 Validate Security Measures Verify control effectiveness
18.5 Document Penetration Testing Results Report all findings
18.6 Test Critical Systems and Services Focus on key assets
18.7 Remediate Penetration Test Findings Fix identified issues
18.8 Use Qualified Penetration Testers Engage skilled professionals
18.9 Conduct Application Penetration Testing Test web applications
18.10 Conduct Physical Penetration Testing Test physical security

Key Tools:

  • Penetration testing tools (Metasploit, Nmap, Burp Suite)
  • Vulnerability scanners (Nessus, OpenVAS)
  • Social engineering tools (SET, Gophish)
  • Physical penetration testing equipment

Framework Mappings:

  • NIST CSF: ID.RA-1, DE.CM-8
  • ISO 27001: A.14.2.8, A.18.2.1, A.18.2.3
  • NIST 800-53: CA-8, RA-5, SA-11
  • PCI DSS: 11.3, 11.3.1, 11.3.2, 11.3.3, 11.3.4

Framework Mapping Matrix

CIS Control NIST CSF ISO 27001 NIST 800-53 PCI DSS HIPAA GDPR
1. Inventory and Control of Enterprise Assets ID.AM-1, ID.AM-2 A.8.1.1, A.8.1.2 CM-8, PM-5 2.4, 9.9, 11.1 §164.310(d) Art 30, 32
2. Inventory and Control of Software Assets ID.AM-2, PR.DS-6 A.12.6.2, A.8.1.1 CM-7, CM-8 2.4, 6.2 §164.310(d) Art 30
3. Data Protection PR.DS-1, PR.DS-2, PR.DS-5 A.8.2.1-3, A.10.1.1 SC-8, SC-28, MP-2-4 3.1-6, 4.1-2 §164.312(a)(2)(iv) Art 5, 6, 25, 32
4. Secure Configuration of Enterprise Assets and Software PR.IP-1, PR.PT-3 A.12.1.2, A.14.2.2-4 CM-2, CM-6, CM-7 2.2, 2.3, 2.6 §164.310(c) Art 25, 32
5. Account Management PR.AC-1, PR.AC-4, PR.AC-7 A.9.2.1-6 AC-2, AC-3, AC-6, IA-2, IA-5 7.1, 7.2, 8.1-3 §164.308(a)(3), §164.308(a)(4) Art 25, 32
6. Access Control Management PR.AC-1, PR.AC-3, PR.AC-4 A.9.1.1-2, A.9.2.3, A.9.4.1 AC-1-6, AC-17 7.1, 7.2, 8.3 §164.308(a)(4) Art 25, 32
7. Continuous Vulnerability Management ID.RA-1, ID.RA-2, PR.IP-12 A.12.6.1-2, A.14.2.3 RA-3, RA-5, SI-2 6.1, 6.2, 11.2 §164.308(a)(1)(ii)(A) Art 32
8. Audit Log Management PR.PT-1, DE.CM-1, DE.CM-3 A.12.4.1-4 AU-2-3, AU-6-12 10.1-7 §164.308(a)(1)(ii)(D), §164.312(b) Art 30, 32
9. Email and Web Browser Protections PR.DS-6, PR.DS-7, DE.CM-5 A.13.1.1-2 SC-7, SC-8 1.3, 4.1, 5.1, 5.3 §164.308(a)(5)(ii)(B) Art 32
10. Malware Defenses DE.CM-4, DE.CM-5, PR.DS-5 A.12.2.1 SI-3, SI-4, SI-8 5.1-3 §164.308(a)(5)(ii)(B) Art 32
11. Data Recovery PR.IP-4, RC.RP-1 A.12.3.1, A.17.1.2-3 CP-9, CP-10 9.5-7, 12.10.1 §164.308(a)(7) Art 32
12. Network Infrastructure Management PR.AC-5, PR.PT-4 A.13.1.1, A.13.1.3 AC-17-18, IA-3, SC-7-8 1.1-3, 2.2 §164.312(a)(1) Art 32
13. Network Monitoring and Defense DE.AE-1-3, DE.CM-1, DE.CM-7 A.12.4.1, A.13.1.1-2 SI-4, AU-6 10.6, 11.4, 11.5 §164.308(a)(1)(ii)(D), §164.312(b) Art 32
14. Security Awareness and Skills Training PR.AT-1, PR.AT-2, PR.AT-5 A.7.2.2-3 AT-1, AT-2, AT-3 12.6, 12.6.1-2 §164.308(a)(5) Art 32, 39
15. Service Provider Management ID.SC-1-5 A.15.1.1-3, A.15.2.1-2 SA-9, SA-12 12.8, 12.8.1-5, 12.9 §164.308(b) Art 28, 32
16. Application Software Security PR.DS-7, PR.IP-2 A.14.1.1, A.14.2.1-2, A.14.2.5-6, A.14.2.8 SA-3-4, SA-8, SA-11, SA-15-16 6.3-6 §164.312(a)(1) Art 25, 32
17. Incident Response Management RS.RP-1, RS.CO-1, RS.AN-1, RS.MI-1-2, RC.RP-1 A.16.1.1-7 IR-1-8 12.10, 12.10.1-6 §164.308(a)(6) Art 33, 34
18. Penetration Testing ID.RA-1, DE.CM-8 A.14.2.8, A.18.2.1, A.18.2.3 CA-8, RA-5, SA-11 11.3, 11.3.1-4 §164.308(a)(8) Art 32

Implementation Priorities by Organization Size

Small Organizations (Limited Resources)

Essential Controls to Implement First:

  1. CIS Control 1: Inventory and Control of Enterprise Assets
  2. CIS Control 2: Inventory and Control of Software Assets
  3. CIS Control 3: Data Protection (focus on encryption)
  4. CIS Control 4: Secure Configuration (basic hardening)
  5. CIS Control 5: Account Management (focus on privileged accounts)
  6. CIS Control 7: Continuous Vulnerability Management (basic patching)
  7. CIS Control 10: Malware Defenses (endpoint protection)
  8. CIS Control 11: Data Recovery (basic backup strategy)
  9. CIS Control 14: Security Awareness Training (basic program)

Implementation Tips:

  • Use free/open source tools where possible
  • Focus on cloud-based security solutions with minimal infrastructure
  • Implement managed security services for areas requiring expertise
  • Prioritize protecting the most critical systems and data
  • Consider outsourcing complex controls

Medium Organizations (Moderate Resources)

Implementation Order:

  1. Implement all Basic controls (1-6) thoroughly
  2. Implement Foundational controls (7-16) with focus on:
    • CIS Control 7: Continuous Vulnerability Management
    • CIS Control 8: Audit Log Management
    • CIS Control 10: Malware Defenses
    • CIS Control 11: Data Recovery
    • CIS Control 12: Network Infrastructure Management
    • CIS Control 13: Network Monitoring and Defense
  3. Begin implementing Organizational controls (17-18)

Implementation Tips:

  • Establish formal security program with dedicated resources
  • Implement automation where possible
  • Consider hybrid of in-house and outsourced security services
  • Establish metrics to measure control effectiveness

Large Organizations (Significant Resources)

Implementation Approach:

  1. Implement all 18 CIS Controls comprehensively
  2. Focus on automation and integration
  3. Establish continuous monitoring and improvement
  4. Customize controls for industry-specific requirements
  5. Implement advanced capabilities within each control

Implementation Tips:

  • Develop custom security architecture aligned with controls
  • Implement defense-in-depth strategy
  • Establish centralized security operations capability
  • Integrate controls with risk management program
  • Establish control validation and testing program

Implementation Challenges and Solutions

Challenge Description Potential Solutions
Resource Constraints Limited budget, staff, or time Start with critical controls, use free tools, consider managed services
Technical Complexity Some controls require specialized expertise Outsource complex controls, invest in training, use simplified solutions
Legacy Systems Older systems may not support modern security Implement compensating controls, isolate legacy systems, prioritize replacement
Organizational Resistance User pushback to security measures Focus on user experience, demonstrate business value, executive sponsorship
Lack of Visibility Incomplete view of environment Implement asset discovery tools, start with known assets, incremental improvement
Monitoring Fatigue Too many alerts, not enough analysts Tune detections, prioritize alerts, automate responses where possible
Integration Challenges Making tools work together Select integration-friendly solutions, use APIs, standardize data formats
Measuring Effectiveness Difficulty proving control value Establish baseline metrics, track improvements, use maturity models

CIS Controls Implementation Roadmap

Phase 1: Foundation (Months 1-3)

  • Complete initial asset inventory (CIS 1, 2)
  • Implement basic account controls (CIS 5)
  • Deploy endpoint protection (CIS 10)
  • Establish backup solution (CIS 11)
  • Begin security awareness program (CIS 14)

Phase 2: Basic Security Posture (Months 4-6)

  • Implement secure configurations (CIS 4)
  • Establish vulnerability management (CIS 7)
  • Deploy basic log management (CIS 8)
  • Secure email and web browsing (CIS 9)
  • Document incident response procedures (CIS 17)

Phase 3: Enhanced Protection (Months 7-12)

  • Implement data protection controls (CIS 3)
  • Enhance access control (CIS 6)
  • Secure network infrastructure (CIS 12)
  • Deploy network monitoring (CIS 13)
  • Review vendor security (CIS 15)

Phase 4: Advanced Capabilities (Months 13-18)

  • Implement application security (CIS 16)
  • Conduct penetration testing (CIS 18)
  • Enhance and refine all controls
  • Establish metrics and reporting
  • Integrate with risk management

Key Performance Indicators by Control

Control Key Metrics Target Values
1. Inventory % of assets inventoried, Unauthorized device detection time >95% inventoried, <24h detection
2. Software Inventory % of software inventoried, % of unauthorized software >95% inventoried, <2% unauthorized
3. Data Protection % of sensitive data encrypted, data loss incidents >99% encrypted, 0 incidents
4. Secure Configuration % of systems with secure baseline, configuration drift rate >95% compliant, <5% drift
5. Account Management % of accounts reviewed, dormant account count 100% reviewed annually, <5% dormant
6. Access Control Excessive privilege rate, access review completion <5% with excessive rights, 100% reviewed
7. Vulnerability Management Mean time to patch critical vulnerabilities, scan coverage <7 days MTTR, >98% coverage
8. Audit Logging Logging coverage, log retention compliance >98% coverage, 100% retention compliance
9. Email/Web Protection Phishing simulation success rate, malware blocked <5% click rate, >99% block rate
10. Malware Defense Endpoint protection coverage, detection time >99% coverage, <1 hour detection
11. Data Recovery Backup success rate, recovery time objective achievement >99% success, 100% RTO met
12. Network Management Network device compliance, unauthorized change rate >98% compliance, <1% unauthorized
13. Network Monitoring Alert triage time, true positive rate <30 min triage, >80% true positive
14. Security Training Training completion rate, knowledge assessment scores >95% completion, >85% score
15. Service Providers % of providers assessed, contract compliance 100% assessed, 100% compliant
16. Application Security % of apps security tested, critical vulnerability remediation 100% critical apps tested, <7 days remediation
17. Incident Response Mean time to respond, exercise completion <4 hours MTTR, ≥2 exercises annually
18. Penetration Testing Test coverage, findings remediation rate 100% critical systems, >95% remediation