logo

Database

CIS

Last updated: 2023/09/18
logo

The Center for Internet Security Controls are a prioritized set of safeguards to mitigate the most prevalent cyberattacks against systems and networks. They are mapped to and referenced by multiple legal, regulatory and policy frameworks. The version used in this section is CIS Controls v8.

Control-Requirement Mapping

DefinitionRequirements
2_1. Establish and maintain a software inventory
2_5. Allowlist authorized software
2_7. Allowlist authorized scripts
3_3. Configure data access control lists
3_6. Encrypt data on end-user devices
3_10. Encrypt sensitive data in transit
3_11. Encrypt sensitive data at rest
3_12. Segment data processing and storage based on sensitivity
4_1. Establish and maintain a secure configuration process
4_2. Establish and maintain a secure configuration process for network infrastructure
4_3. Configure automatic session locking on enterprise assets
4_4. Implement and manage a firewall on servers
4_5. Implement and manage a firewall on end-user devices
4_7. Manage default accounts on enterprise assets and software
4_8. Uninstall or disable unnecessary services on enterprise assets and software
5_1. Establish and maintain an inventory of accounts
5_2. Use unique passwords
5_3. Disable dormant accounts
5_5. Establish and maintain an inventory of service accounts
6_2. Establish an access revoking process
6_4. Require MFA for remote network access
6_5. Require MFA for administrative access
7_3. Perform automated operating system patch management
7_4. Perform automated application patch management
8_2. Collect audit logs
8_4. Standardize time synchronization
8_5. Collect detailed audit logs
9_2. Use DNS filtering services
9_4. Restrict unnecessary or unauthorized browser and email client extensions
9_6. Block unnecessary file types
9_7. Deploy and maintain email server anti-malware protections
10_6. Centrally manage anti-malware software
12_2. Establish and maintain a secure network architecture
12_6. Use of secure network management and communication protocols
13_4. Perform traffic filtering between network segments
13_9. Deploy port-level access control
13_10. Perform application layer filtering
16_1. Establish and maintain a secure application development process
16_4. Establish and manage an inventory of third-Party software components
16_5. Use up-to-date and trusted third-party software components
16_10. Apply secure design principles in application architectures
16_11. Leverage vetted modules or services for application security components