logo

CIS


Summary

The Center for Internet Security Controls are a prioritized set of safeguards to mitigate the most prevalent cyberattacks against systems and networks. They are mapped to and referenced by multiple legal, regulatory and policy frameworks. The version used in this section is CIS Controls v8.


Definitions

DefinitionRequirements
CIS-2_1. Establish and maintain a software inventory
CIS-2_5. Allowlist authorized software
CIS-2_7. Allowlist authorized scripts
CIS-3_3. Configure data access control lists
CIS-3_6. Encrypt data on end-user devices
CIS-3_10. Encrypt sensitive data in transit
CIS-3_11. Encrypt sensitive data at rest
CIS-3_12. Segment data processing and storage based on sensitivity
CIS-4_1. Establish and maintain a secure configuration process
CIS-4_2. Establish and maintain a secure configuration process for network infrastructure
CIS-4_3. Configure automatic session locking on enterprise assets
CIS-4_4. Implement and manage a firewall on servers
CIS-4_5. Implement and manage a firewall on end-user devices
CIS-4_7. Manage default accounts on enterprise assets and software
CIS-4_8. Uninstall or disable unnecessary services on enterprise assets and software
CIS-5_1. Establish and maintain an inventory of accounts
CIS-5_2. Use unique passwords
CIS-5_3. Disable dormant accounts
CIS-5_5. Establish and maintain an inventory of service accounts
CIS-6_2. Establish an access revoking process
CIS-6_4. Require MFA for remote network access
CIS-6_5. Require MFA for administrative access
CIS-7_3. Perform automated operating system patch management
CIS-7_4. Perform automated application patch management
CIS-8_2. Collect audit logs
CIS-8_4. Standardize time synchronization
CIS-8_5. Collect detailed audit logs
CIS-9_2. Use DNS filtering services
CIS-9_4. Restrict unnecessary or unauthorized browser and email client extensions
CIS-9_6. Block unnecessary file types
CIS-9_7. Deploy and maintain email server anti-malware protections
CIS-10_6. Centrally manage anti-malware software
CIS-12_2. Establish and maintain a secure network architecture
CIS-12_6. Use of secure network management and communication protocols
CIS-13_4. Perform traffic filtering between network segments
CIS-13_9. Deploy port-level access control
CIS-13_10. Perform application layer filtering
CIS-16_1. Establish and maintain a secure application development process
CIS-16_4. Establish and manage an inventory of third-Party software components
CIS-16_5. Use up-to-date and trusted third-party software components
CIS-16_10. Apply secure design principles in application architectures
CIS-16_11. Leverage vetted modules or services for application security components

Last updated

2023/09/18