Mapping and Compliance


Collaboration Enhances Cybersecurity Compliance

At CIS, we believe in collaboration – by working together, we find real solutions for real cybersecurity threats. Our cybersecurity best practices grow more integrated every day through discussions taking place in our international communities and in the development of CIS SecureSuite Membership resources.

CIS’s cybersecurity best practices and tools can assist organizations who are working towards compliance.

CIS Critical Security Controls (CIS Controls) – Prescriptive, prioritized, and simplified set of cybersecurity best practices. The are the definition of an effective cybersecurity program.

CIS Benchmarks – Consensus-developed secure configuration guidelines for hardening operating systems, servers, cloud environments, and more. There are more than 100 CIS Benchmarks covering 25+ vendor product families. The CIS Benchmarks provide mapping as applicable to the CIS Controls. As we release new and updated content we will map the CIS Benchmark recommendations to the latest version of the CIS Controls at the time of release.

CIS-CAT Pro – Combines the powerful security guidance of the CIS Controls and CIS Benchmarks into an assessment tool. Leveraging the CIS-CAT Pro Assessor and Dashboard components, users can view conformance to best practices and improve compliance scores over time.

CIS Controls Self Assessment Tool (CSAT) – Helps enterprises assess, track, and prioritize their implementation of the CIS Controls. This powerful tool can help organizations improve their cyber defense program regardless of size or resources. CIS CSAT can help enterprises identify where CIS Controls Safeguards are already well-implemented and where there are weak points that could be improved.

 

 

Industry Frameworks Recognition

We are in a multi-framework era where organizations large and small, public and private, are tasked with complying with multiple cybersecurity policy, regulatory and legal frameworks . From the organizational policies and workflows laid out in the CIS Controls to the most detailed configuration checks in a CIS Benchmark, our resources are developed to work well as stand-alone resources or as companions to additional frameworks. See how the CIS Controls map to popular industry frameworks with the CIS Controls Navigator


PCI DSS

Some of the world’s biggest retailers use resources included in CIS SecureSuite to help meet Payment Card Industry Data Security Standard (PCI DSS) requirements. PCI DSS Requirement 2.2 points directly to the CIS Benchmarks, for example:

2.2 Develop configuration standards for all system components. Assure that these standards address all known security vulnerabilities and are consistent with industry accepted system hardening standards. Sources of industry-accepted system hardening standards may include, but are not limited to: Center for Internet Security (CIS) International Organization for Standardization (ISO) SysAdmin Audit Network Security (SANS) Institute National Institute of Standards Technology (NIST).

The CIS Benchmarks and CIS Controls can help with multiple aspects of PCI DSS compliance, including:

  • 1 Firewall and Router Configurations
  • 6.1 Patch Management
  • 6.4 Change Control
  • 7.1 Access Control

NIST and FISMA

The National Institute of Standards and Technology (NIST) is a leading agency in technical compliance. The CIS Controls have been recognized by users as a robust on-ramp to meeting NIST cybersecurity standards within their organization.

CIS Controls V7.1 Mapping to NIST CSF

NIST OLIR Submission V1

NIST SP 800-53 R4 Low Baseline

NIST SP 800-171 r2

The Federal Information Security Modernization Act (FISMA), which is a component of NIST, also points to CIS resources for cybersecurity compliance.

  • The National Checklist Program Repository recommends the CIS Benchmarks to federal agencies and other organizations trying to meet FISMA.
  • CIS-CAT Pro, our automated configuration assessment tool, has been validated by the NIST Security Content Automation Protocol (SCAP) to audit systems subject to FISMA requirements in the FDCC Scanner and Authenticated Configuration Scanner.

See our SCAP validation

HIPAA

The Health Insurance Portability and Accountability Act (HIPAA) security rule establishes the baseline for protecting the security of patient information within the healthcare industry.The CIS Controls complement the HIPAA security rule and contain many of the same provisions. Since the CIS Controls and Sub-Controls are regularly updated based on real-world attack patterns, the CIS Controls can help healthcare organizations “round out” their cybersecurity program to address risks outside the HIPAA security rule. Additionally, the CIS Benchmarks can be used to securely configure workstations used to manage electronic protected health information. This means that CIS Controls, CIS Benchmarks, and HIPAA can work together to help improve cyber hygiene. The CIS Controls Implementation Group is defined as cyber hygiene.


Take a look at Implementation Group Methodology

GDPR

The European Union (E.U.) Regulation 2016/679 GDPR (General Data Protection Regulation) was put into effect on May 25, 2018. Any organization which holds E.U. citizen data, regardless of its location, is responsible for following these new guidelines.


Learn how CIS can help with GDPR Compliance

ISO/IEC 27001

The International Organization for Standardization (ISO) provides independent, globally-recognized standards for securing technologies. ISO/IEC 27001 helps organizations defend against cyber threats and information security risks. Because the CIS Controls and CIS Benchmarks provide guidance addressing major cybersecurity needs such as asset classification, authentication methods and privileges, event logging, and encryption, they are also frequently used by organizations seeking ISO compliance. View a detailed mapping of the relationship between the CIS Controls and ISO 27001 below.


CIS Controls and Sub-Controls Mapping to ISO 27001

 

State Legislation Leveraging the CIS Controls

American Industries Association, NAS9933

Critical Security Controls for Effective Capability in Cyber Defense, Nov. 29, 2018. Based on the CIS Controls.

California

The California Data Breach Report published by the California Attorney General in 2016 concluded that the CIS Critical Security Controls “identify a minimum level of information security that all organizations that collect or maintain personal information should meet.” The report warns that failing to implement all relevant Controls "constitutes a lack of reasonable security.” (California Data Breach Report at Recommendation 1.)

Colorado

Colorado’s cybersecurity team also follows the 20 CIS Controls & Resources as a framework for the state’s security program, as well as NIST SP 800-53, a National Institute of Standards and Technology document which serves as the basis for the agency’s policies. The 20 CIS Controls & Resources “are a good way to operationalize the NIST cybersecurity framework, which is how many states, including Colorado, are explaining their programs and Wyatt, of Deloitte, agrees. “When talking to legislators and asking for budget, you need a cybersecurity roadmap, and it’s helpful to have a straightforward way to explain what you’re going to do, like CIS 20,” he says. “Colorado has done this successfully. Ongoing communication with key stakeholders makes it twice as likely an agency will get security funding. You’re not just talking to the legislature when something bad happens.”

Conference of State Bank Supervisors

"Cybersecurity 101, A Resource Guide for Bank Executives,” 2017. Recommends use of the Critical Security Controls at 8, 12, 24.

Connecticut HB6607

"Cybersecurity 101, A Resource Guide for Bank Executives,” 2017. Recommends use of the Critical Security Controls at 8, 12, 24.

Idaho Executive Order No. 2017-02

In 2017, Governor Butch Otter issued an executive order requiring all executive branch agencies to implement the first five Center for Internet Security Critical Security Controls for evaluation of existing state systems.

Iowa

House File 553, “An Act Relating to Affirmative Defenses for Entities Using Cybersecurity Programs,” provides that any “covered entity that satisfies all requirements...is entitled to an affirmative defense to any” tort lawsuit brought against the organization for a cyber breach. The new law states that a cybersecurity program must conform to an industry-recognized cybersecurity framework such as the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171, NIST SP 800-53 and 800-53a, FedRAMP, ISO 27000, and the CIS Controls.

Illinois

In 2017, Illinois passed a privacy law, the Student Online Personal Protection Act (SOPPA). The Illinois K12 technology staff are looking to Implementation Group 1 as a framework to comply with the “reasonable security” required by the law.

Michigan

The State of Michigan issued a request for proposals to “deliver comprehensive security awareness and training to various local government entities using the industry recognized Center for Internet Security (CIS) Top 20 Security Controls.” Target audience will include counties in the Detroit Southeastern UASI Region (6 Counties) as well as select counties throughout Michigan.”

  • Request for Proposal No. 200000002352 (September 25, 2020).

National Governor's Association

Ohio Department of Administrative Services (DAS) Director Matt Damschroder said full implementation of six controls outlined by the Center for Internet Security will stop 85 percent of threats.

Nevada

An existing Nevada statute relating to personal information collected by governmental agencies requires the state data collectors to implement and maintain "reasonable security measures" to protect such records. (NRS 603A.210.) A new Nevada statute, which became effective on January 1, 2021, requires that the state data collectors comply with the CIS Critical Security Controls or the NIST Cybersecurity Framework, thus defining what constitutes reasonable security for the state as a PII collector.

Ohio Data Protection Act

In 2018, the Ohio Data Protection Act became the nation’s first law that incentivizes organizations to develop a strong data protection and cybersecurity program. The statute establishes legal protections for organizations that voluntarily adopt certain recognized cybersecurity best practices (e.g., NIST CSF & the CIS Critical Security Controls) and implement a written information security program.

Oregon

The Oregon Secretary of State, Audit Division, performed a cybersecurity controls audit of the Oregon State Police in May, 2020, using the CIS Controls as its audit standard. “The Audits Division conducts cybersecurity audits to evaluate IT security risks and provide a high-level view of an agency’s current state. We chose to use the Center for Internet Security’s CIS Controls, version 7.1. The CIS Controls are a prioritized list of 20 high-priority defensive actions that provide a starting point for enterprises to improve cyber defense. The controls are divided into three categories: basic, foundational, and organizational. This review includes the first six, the basic controls, which the Center for Internet Security, along with other security practitioners, defined as key controls that every organization should implement for essential cyber defense readiness.”

U.S. Department of Transportation

Federal Highway Administration, Transportation Management Center Information Technology Security, Final Report, Sep. 2019. Critical Security Controls cited throughout as insight into basic practices that serve as a starting point or baseline for organizations with limited resources and cybersecurity expertise, as well as guidelines for Traffic Management Centers looking to increase their system maturity.

Utah

The Utah Cybersecurity Affirmative Defense Act similarly incentivizes the voluntary adoption of cyber best practices by creating affirmative defenses to certain lawsuits stemming from a security breach. Specifically, the Act provides that a person or organization that “creates, maintains, and reasonably complies with a written cybersecurity program meeting certain requirements, and which is in place at the time of a breach of system security, has an affirmative defense to a claim brought under the laws of Utah alleging that the person failed to implement reasonable information security controls that resulted in the breach of system security.”

Cybersecurity Resources Referencing CIS’s Best Practices

CIS resources are also referenced in various cybersecurity guides and programs. Below are a few independent cyber defense and resource guides which mention CIS resources:

Additional Resources

Use our CIS Controls Navigator to explore how they map to other security standards.


View Interactive Mapping

The CIS Critical Security Controls (CIS Controls) are a prioritized set of Safeguards to mitigate the most prevalent cyber-attacks against systems and networks.


View Companion Guides and Mappings

CIS_DBIR-2020-Contributor_Badge