It’s been over a month since I last posted on my blog. I was busy finishing up my Master’s Degree, and time just flew by! My goal is to write a blog post at least once a month, and so far, I have kept that streak. Hopefully, now that I am done with school, I can commit to one post per week.

That said, this post is about CIS Controls, formerly known as Critical Security Controls (CSCs).

What are CIS Controls?

CIS Controls are the Center for Internet Security (CIS) Controls, and are a prioritized set of cybersecurity best practices developed by a global community of cybersecurity experts. They are designed to help organizations mitigate the most common or frequent cyber threats and help improve their cybersecurity posture.

The CIS Controls are organized into three IGs, and no, those are not Instagram posts, they are implementation groups (IGs). These implementation groups allow organizations to adopt them based on their resources and risk profile. For example:

  • IG1 – Basic Cyber Hygiene (for small/less complex organizations)
  • IG2 – Foundational Cybersecurity (for medium-sized businesses)
  • IG3 – Advanced Security Measures (for large or high-risk enterprises)

You can look at the breakdown of the 18 CIS Controls (currently version 8.1, as of this post) below:

Control NamePurpose
Inventory and Control of Enterprise AssetsMaintain visibility into hardware devices connected to the organization.
Inventory and Control of Software AssetsTrack and control the installation of authorized software to reduce vulnerabilities.
Data ProtectionSafeguard sensitive data through encryption, access controls, and secure disposal.
Secure Configuration of Enterprise Assets and SoftwareHarden systems by removing default settings and reducing attack surfaces.
Account ManagementEnforce least privilege and remove inactive or orphaned accounts.
Access Controls ManagementDefine and enforce who can access what resources and when.
Continuous Vulnerability ManagementRegularly scan and remediate vulnerabilities.
Audit Log ManagementCollect, review, and retain logs for detection and investigation.
Email and Web Browser ProtectionsSecure these commonly exploited interfaces.
Malware DefensesDeploy anti-malware tools and regularly update them.
Data RecoveryEnsure reliable and secure backups exist and are tested regularly.
Network Infrastructure ManagementSecure routers, switches, and other network devices.
Securing Awareness and Skills TrainingTrain users to recognize and avoid common threats.
Securing Operations Center (SOC) ProceduresImplement and document response processes and alert handling.
Service Provider ManagementAssess and manage risks from third-party providers.
Application Software SecurityIntegrate security into the software development lifecycle (SDLC).
Incident Response ManagementPlan for and practice incident detection, reporting, and recovery.
Penetration TestingValidate security controls through regular testing and red teaming.

Some tips for implementing these controls:

  • Start with IG1: Focus on the most critical controls like asset inventory, account management, and secure configuration.
  • Use the CIS Controls Self-Assessment Tool (CSAT): Available for free to help organizations evaluate and track their implementation maturity.
  • Involve Leadership and IT: Successful adoption requires buy-in from both technical and executive leadership.
  • Document Everything: Good records support compliance, audits, and continuous improvement.

Organizations can benefit from implementing the CIS Controls because they focus on real-world threats and recommend actions based on attack patterns. Also, with its tiered implementation groups (IG1-IG3), the framework scales from small businesses to large enterprises.

The CIS Controls also align with many frameworks like NIST CSF, ISO 27001, HIPAA, and PCI DSS, which help in regulatory compliance and security audits. In addition, the CIS Controls are developed and maintained by a global community of practitioners, ensuring they stay current with evolving threats.


Some of these controls are simple to use and follow, yet I have seen organizations that do not follow simple steps as removing default settings from systems or testing backups to make sure they work. By following these controls, you can avoid those simple mistakes.


You can download the CIS Controls here.


I hope you found this post helpful and informative. Thanks for stopping by!

Leave a comment