🎁 New User? Get 20% off your first purchase with code NEWUSER20 Register Now →
Menu

Categories

CIS Controls v8.1 Complete Guide: All 18 Controls Explained (2026)

CIS Controls v8.1 Complete Guide: All 18 Controls Explained (2026)

The CIS Controls (Center for Internet Security Controls) are a prioritized set of 18 cybersecurity best practices that provide specific, actionable guidance for defending against the most common cyber threats. Unlike framework-level standards like NIST CSF, CIS Controls tell you exactly what to do — making them the ideal starting point for organizations building their security program.

CIS Controls cybersecurity benchmarks

📥 Free Cloud Security Framework Cheat Sheet

All 18 CIS Controls with Implementation Groups, framework cross-reference, and prioritization guidance.

Download Free PDF →

Table of Contents

CIS Controls Overview

CIS Controls v8.1 (current version) organizes 18 controls with 153 safeguards into three Implementation Groups based on organizational maturity. The controls are ordered by priority, with the first six providing the highest-impact security improvements.

Key advantages of CIS Controls:

  • Prescriptive — Specific actions, not abstract requirements
  • Prioritized — Implementation Groups guide what to do first
  • Free — Controls and benchmarks are freely available
  • Community-driven — Updated based on real-world attack data
  • Measurable — Each safeguard can be measured and verified

Implementation Groups

GroupProfileSafeguardsTypical Organization
IG1Essential Cyber Hygiene56 safeguardsSmall business, limited IT staff, basic data sensitivity
IG2Growing organization74 additionalGrowing IT team, moderate risk, some compliance needs
IG3Mature organization23 additionalDedicated security team, high-value data, regulatory needs

All 18 CIS Controls

#Control NameIGKey Actions
1Enterprise Asset InventoryIG1Maintain accurate inventory of all hardware assets
2Software Asset InventoryIG1Track all installed software, maintain whitelist
3Data ProtectionIG1Data classification, encryption, DLP, secure disposal
4Secure ConfigurationIG1Harden OS, applications, and network devices
5Account ManagementIG1Manage accounts, disable defaults, MFA, lifecycle
6Access Control ManagementIG1Least privilege, RBAC, access reviews
7Vulnerability ManagementIG2Scan, prioritize, and remediate vulnerabilities
8Audit Log ManagementIG2Centralize logs, retain, detect anomalies
9Email & Browser ProtectionsIG2Email filtering, URL blocking, browser hardening
10Malware DefensesIG2Endpoint protection, EDR, anti-malware
11Data RecoveryIG1Automated backups, test restores, offsite copies
12Network Infrastructure MgmtIG2Network device hardening, segmentation
13Network Monitoring & DefenseIG2IDS/IPS, traffic analysis, flow monitoring
14Security Awareness TrainingIG1Regular training, phishing simulations
15Service Provider ManagementIG2Third-party risk assessment, contractual security
16Application Software SecurityIG2Secure SDLC, code review, SAST/DAST
17Incident Response ManagementIG2IR plan, tabletop exercises, post-mortem
18Penetration TestingIG3Internal/external pen tests, red team exercises

IG1: Essential Cyber Hygiene (Start Here)

If you can only implement one thing, implement IG1. These 56 safeguards across 8 controls address the most common attack vectors and are achievable by any organization:

  1. CIS 1 + 2: Know your assets — You can't protect what you don't know exists
  2. CIS 3: Protect your data — Classify, encrypt, and control access to sensitive data
  3. CIS 4: Harden configurations — Remove defaults, unnecessary services, and weak settings
  4. CIS 5 + 6: Control access — MFA, least privilege, disable inactive accounts
  5. CIS 11: Backup everything — Automated backups with tested restore procedures
  6. CIS 14: Train your people — Security awareness and phishing simulations
⚠️ Reality Check: 80% of breaches could be prevented by implementing IG1 controls. Most attacks exploit basic gaps: unpatched systems, weak passwords, lack of MFA, and untrained employees.

CIS Controls for Cloud

CIS Controls v8 was designed with cloud environments in mind. Key considerations:

  • CIS 1-2 (Asset Inventory) — Use cloud-native tools: AWS Config, Azure Resource Graph, GCP Asset Inventory
  • CIS 3 (Data Protection) — Cloud KMS, storage encryption, bucket policies
  • CIS 4 (Secure Configuration) — Use CIS Benchmarks for AWS, Azure, GCP, Kubernetes
  • CIS 5-6 (Access Control) — IAM policies, service accounts, conditional access
  • CIS 8 (Audit Logs) — CloudTrail, Azure Activity Log, GCP Audit Logs

CIS Benchmarks

CIS Benchmarks are detailed configuration guides for hardening specific platforms. Key benchmarks:

  • Cloud: AWS Foundations, Azure Foundations, GCP Foundations, Kubernetes
  • OS: Windows Server, Ubuntu, RHEL, CentOS, macOS
  • Database: PostgreSQL, MySQL, MongoDB, SQL Server, Oracle
  • Network: Cisco IOS, Palo Alto, Fortinet
  • Desktop: Windows 11, Chrome, Firefox, Office 365

Mapping to NIST & ISO 27001

CIS ControlNIST CSFISO 27001:2022
CIS 1-2 (Asset Inventory)ID.AMA.5.9, A.5.10
CIS 3 (Data Protection)PR.DSA.5.12-14, A.8.24
CIS 4 (Secure Config)PR.PSA.8.9
CIS 5-6 (Access)PR.AAA.5.15-18, A.8.2-5
CIS 8 (Audit Logs)DE.CMA.8.15
CIS 17 (Incident Response)RS.MAA.5.24-28

Implementation Guide

  1. Week 1-2: Asset inventory (CIS 1-2) — Know what you have
  2. Week 3-4: Access management (CIS 5-6) — Deploy MFA, review permissions
  3. Month 2: Secure configuration (CIS 4) — Apply CIS Benchmarks
  4. Month 3: Data protection (CIS 3) and backups (CIS 11)
  5. Month 4: Security awareness (CIS 14) — Train staff, run phishing sims
  6. Month 5-6: Vulnerability management (CIS 7) and logging (CIS 8)
  7. Month 7+: Network monitoring (CIS 13), incident response (CIS 17)

Tools & Automation

  • CIS-CAT Pro — Automated compliance assessment against CIS Benchmarks
  • OpenSCAP — Open-source compliance scanning for Linux systems
  • AWS Security Hub — Automated CIS Benchmark checks for AWS
  • Azure Policy — CIS Benchmark compliance for Azure resources
  • Prowler — Open-source AWS/Azure/GCP security assessment tool
  • Ansible/Chef/Puppet — Automated configuration hardening

📥 Download the Cloud Security Cheat Sheet

All 18 CIS Controls with Implementation Groups and framework cross-reference.

Download Free PDF →

Related Articles

Share this article:
Dargslan Editorial Team (Dargslan)
About the Author

Dargslan Editorial Team (Dargslan)

Collective of Software Developers, System Administrators, DevOps Engineers, and IT Authors

Dargslan is an independent technology publishing collective formed by experienced software developers, system administrators, and IT specialists.

The Dargslan editorial team works collaboratively to create practical, hands-on technology books focused on real-world use cases. Each publication is developed, reviewed, and...

Programming Languages Linux Administration Web Development Cybersecurity Networking

Stay Updated

Subscribe to our newsletter for the latest tutorials, tips, and exclusive offers.