The CIS Controls (Center for Internet Security Controls) are a prioritized set of 18 cybersecurity best practices that provide specific, actionable guidance for defending against the most common cyber threats. Unlike framework-level standards like NIST CSF, CIS Controls tell you exactly what to do — making them the ideal starting point for organizations building their security program.
📥 Free Cloud Security Framework Cheat Sheet
All 18 CIS Controls with Implementation Groups, framework cross-reference, and prioritization guidance.
Download Free PDF →Table of Contents
- CIS Controls Overview
- Implementation Groups (IG1, IG2, IG3)
- All 18 Controls Explained
- IG1: Essential Cyber Hygiene
- CIS Controls for Cloud
- CIS Benchmarks
- Mapping to NIST & ISO 27001
- Implementation Guide
- Tools & Automation
CIS Controls Overview
CIS Controls v8.1 (current version) organizes 18 controls with 153 safeguards into three Implementation Groups based on organizational maturity. The controls are ordered by priority, with the first six providing the highest-impact security improvements.
Key advantages of CIS Controls:
- Prescriptive — Specific actions, not abstract requirements
- Prioritized — Implementation Groups guide what to do first
- Free — Controls and benchmarks are freely available
- Community-driven — Updated based on real-world attack data
- Measurable — Each safeguard can be measured and verified
Implementation Groups
| Group | Profile | Safeguards | Typical Organization |
|---|---|---|---|
| IG1 | Essential Cyber Hygiene | 56 safeguards | Small business, limited IT staff, basic data sensitivity |
| IG2 | Growing organization | 74 additional | Growing IT team, moderate risk, some compliance needs |
| IG3 | Mature organization | 23 additional | Dedicated security team, high-value data, regulatory needs |
All 18 CIS Controls
| # | Control Name | IG | Key Actions |
|---|---|---|---|
| 1 | Enterprise Asset Inventory | IG1 | Maintain accurate inventory of all hardware assets |
| 2 | Software Asset Inventory | IG1 | Track all installed software, maintain whitelist |
| 3 | Data Protection | IG1 | Data classification, encryption, DLP, secure disposal |
| 4 | Secure Configuration | IG1 | Harden OS, applications, and network devices |
| 5 | Account Management | IG1 | Manage accounts, disable defaults, MFA, lifecycle |
| 6 | Access Control Management | IG1 | Least privilege, RBAC, access reviews |
| 7 | Vulnerability Management | IG2 | Scan, prioritize, and remediate vulnerabilities |
| 8 | Audit Log Management | IG2 | Centralize logs, retain, detect anomalies |
| 9 | Email & Browser Protections | IG2 | Email filtering, URL blocking, browser hardening |
| 10 | Malware Defenses | IG2 | Endpoint protection, EDR, anti-malware |
| 11 | Data Recovery | IG1 | Automated backups, test restores, offsite copies |
| 12 | Network Infrastructure Mgmt | IG2 | Network device hardening, segmentation |
| 13 | Network Monitoring & Defense | IG2 | IDS/IPS, traffic analysis, flow monitoring |
| 14 | Security Awareness Training | IG1 | Regular training, phishing simulations |
| 15 | Service Provider Management | IG2 | Third-party risk assessment, contractual security |
| 16 | Application Software Security | IG2 | Secure SDLC, code review, SAST/DAST |
| 17 | Incident Response Management | IG2 | IR plan, tabletop exercises, post-mortem |
| 18 | Penetration Testing | IG3 | Internal/external pen tests, red team exercises |
IG1: Essential Cyber Hygiene (Start Here)
If you can only implement one thing, implement IG1. These 56 safeguards across 8 controls address the most common attack vectors and are achievable by any organization:
- CIS 1 + 2: Know your assets — You can't protect what you don't know exists
- CIS 3: Protect your data — Classify, encrypt, and control access to sensitive data
- CIS 4: Harden configurations — Remove defaults, unnecessary services, and weak settings
- CIS 5 + 6: Control access — MFA, least privilege, disable inactive accounts
- CIS 11: Backup everything — Automated backups with tested restore procedures
- CIS 14: Train your people — Security awareness and phishing simulations
CIS Controls for Cloud
CIS Controls v8 was designed with cloud environments in mind. Key considerations:
- CIS 1-2 (Asset Inventory) — Use cloud-native tools: AWS Config, Azure Resource Graph, GCP Asset Inventory
- CIS 3 (Data Protection) — Cloud KMS, storage encryption, bucket policies
- CIS 4 (Secure Configuration) — Use CIS Benchmarks for AWS, Azure, GCP, Kubernetes
- CIS 5-6 (Access Control) — IAM policies, service accounts, conditional access
- CIS 8 (Audit Logs) — CloudTrail, Azure Activity Log, GCP Audit Logs
CIS Benchmarks
CIS Benchmarks are detailed configuration guides for hardening specific platforms. Key benchmarks:
- Cloud: AWS Foundations, Azure Foundations, GCP Foundations, Kubernetes
- OS: Windows Server, Ubuntu, RHEL, CentOS, macOS
- Database: PostgreSQL, MySQL, MongoDB, SQL Server, Oracle
- Network: Cisco IOS, Palo Alto, Fortinet
- Desktop: Windows 11, Chrome, Firefox, Office 365
Mapping to NIST & ISO 27001
| CIS Control | NIST CSF | ISO 27001:2022 |
|---|---|---|
| CIS 1-2 (Asset Inventory) | ID.AM | A.5.9, A.5.10 |
| CIS 3 (Data Protection) | PR.DS | A.5.12-14, A.8.24 |
| CIS 4 (Secure Config) | PR.PS | A.8.9 |
| CIS 5-6 (Access) | PR.AA | A.5.15-18, A.8.2-5 |
| CIS 8 (Audit Logs) | DE.CM | A.8.15 |
| CIS 17 (Incident Response) | RS.MA | A.5.24-28 |
Implementation Guide
- Week 1-2: Asset inventory (CIS 1-2) — Know what you have
- Week 3-4: Access management (CIS 5-6) — Deploy MFA, review permissions
- Month 2: Secure configuration (CIS 4) — Apply CIS Benchmarks
- Month 3: Data protection (CIS 3) and backups (CIS 11)
- Month 4: Security awareness (CIS 14) — Train staff, run phishing sims
- Month 5-6: Vulnerability management (CIS 7) and logging (CIS 8)
- Month 7+: Network monitoring (CIS 13), incident response (CIS 17)
Tools & Automation
- CIS-CAT Pro — Automated compliance assessment against CIS Benchmarks
- OpenSCAP — Open-source compliance scanning for Linux systems
- AWS Security Hub — Automated CIS Benchmark checks for AWS
- Azure Policy — CIS Benchmark compliance for Azure resources
- Prowler — Open-source AWS/Azure/GCP security assessment tool
- Ansible/Chef/Puppet — Automated configuration hardening
📥 Download the Cloud Security Cheat Sheet
All 18 CIS Controls with Implementation Groups and framework cross-reference.
Download Free PDF →