Kernel of Truth

CIS Controls – The Center for Internet Security

🔒 CIS Controls – The Center for Internet Security

The Center for Internet Security (CIS) provides globally recognised best practices for securing IT systems and data. Their most notable framework is the CIS Controls – a prioritised set of actions that help organisations protect themselves against the most pervasive cyber threats.


✅ What is CIS?

CIS (Center for Internet Security) is a non-profit organisation that provides cybersecurity standards and benchmarks, used worldwide to harden systems and improve cyber hygiene. Their mission is to “make the connected world a safer place.”

Their flagship offering is:

  • CIS Controls – a set of 18 critical security controls
  • CIS Benchmarks – secure configuration baselines for systems, software, and cloud environments

🧰 What are the CIS Controls?

The CIS Critical Security Controls (v8) are grouped into three implementation groups (IG1, IG2, IG3), depending on organisational maturity and risk.

GroupDescription
IG1 (Basic)Foundational cyber hygiene – ideal for small/medium organisations
IG2 (Standard)Adds depth – suited to organisations with moderate resources and risks
IG3 (Advanced)Designed for mature orgs with complex systems and significant risks

🔐 CIS Control Categories (v8)

The 18 controls are:

  1. Inventory and Control of Enterprise Assets
  2. Inventory and Control of Software Assets
  3. Data Protection
  4. Secure Configuration of Enterprise Assets and Software
  5. Account Management
  6. Access Control Management
  7. Continuous Vulnerability Management
  8. Audit Log Management
  9. Email and Web Browser Protections
  10. Malware Defences
  11. Data Recovery
  12. Network Infrastructure Management
  13. Security Awareness and Skills Training
  14. Security Operations Centre (SOC)
  15. Service Provider Management
  16. Application Software Security
  17. Incident Response Management
  18. Penetration Testing

Each control includes safeguards (formerly sub-controls) that detail actionable steps, and each is mapped to risk areas and other frameworks like NIST CSF, ISO 27001, and PCI DSS.


🚀 Why Use CIS Controls?

  • Prioritised: Focuses first on high-impact, achievable defences
  • Actionable: Clear, practical steps for implementation
  • Mappable: Aligns with other security standards (NIST, ISO, etc.)
  • Free: Publicly available and supported by a global community

🛠️ How to Use CIS in Your Organisation

  1. Download the CIS Controls & Benchmarks
    Get them from the official site: https://cisecurity.org
  2. Conduct a Gap Assessment
    Compare your current state against each control and its safeguards.
  3. Prioritise by Implementation Group
    Start with IG1 if you’re a small or new organisation. Mature companies should aim for IG2 or IG3.
  4. Apply CIS Benchmarks
    Harden operating systems, cloud, and software (e.g. Windows 10, Ubuntu, AWS) using step-by-step CIS benchmark guides.
  5. Track Progress
    Use tools like the CIS Controls Assessment Tool (CIS-CAT) to monitor improvements.

🔧 Tools That Support CIS

  • CIS-CAT Pro (assessment and scoring tool)
  • Microsoft Defender, CrowdStrike, Tenable, etc., map detections to CIS Controls
  • Cloud providers like AWS, Azure, GCP support CIS benchmarks as compliance standards

📦 Where to Get It


🛡️ Summary

Implementing CIS Controls is one of the most effective ways to improve your cybersecurity posture quickly and systematically. Whether you’re a small business or an enterprise, CIS gives you a roadmap to reduce risk and meet compliance obligations.

NCSC Latest