At CIS, we believe in collaboration – by working together, we find real solutions for real cybersecurity threats. Our cybersecurity best practices grow more integrated every day through discussions taking place in our international communities and in the development of CIS SecureSuite Membership resources.
CIS’s cybersecurity best practices and tools can assist organizations who are working towards compliance.
CIS Critical Security Controls (CIS Controls) – Prescriptive, prioritized, and simplified set of cybersecurity best practices. The are the definition of an effective cybersecurity program.
CIS Benchmarks – Consensus-developed secure configuration guidelines for hardening operating systems, servers, cloud environments, and more. There are more than 100 CIS Benchmarks covering 25+ vendor product families. The CIS Benchmarks provide mapping as applicable to the CIS Controls. As we release new and updated content we will map the CIS Benchmark recommendations to the latest version of the CIS Controls at the time of release.
CIS-CAT Pro – Combines the powerful security guidance of the CIS Controls and CIS Benchmarks into an assessment tool. Leveraging the CIS-CAT Pro Assessor and Dashboard components, users can view conformance to best practices and improve compliance scores over time.
CIS Controls Self Assessment Tool (CSAT) – Helps enterprises assess, track, and prioritize their implementation of the CIS Controls. This powerful tool can help organizations improve their cyber defense program regardless of size or resources. CIS CSAT can help enterprises identify where CIS Controls Safeguards are already well-implemented and where there are weak points that could be improved.
We are in a multi-framework era where organizations large and small, public and private, are tasked with complying with multiple cybersecurity policy, regulatory and legal frameworks . From the organizational policies and workflows laid out in the CIS Controls to the most detailed configuration checks in a CIS Benchmark, our resources are developed to work well as stand-alone resources or as companions to additional frameworks. See how the CIS Controls map to popular industry frameworks with the CIS Controls Navigator
Some of the world’s biggest retailers use resources included in CIS SecureSuite to help meet Payment Card Industry Data Security Standard (PCI DSS) requirements. PCI DSS Requirement 2.2 points directly to the CIS Benchmarks, for example:
2.2 Develop configuration standards for all system components. Assure that these standards address all known security vulnerabilities and are consistent with industry accepted system hardening standards. Sources of industry-accepted system hardening standards may include, but are not limited to: Center for Internet Security (CIS) International Organization for Standardization (ISO) SysAdmin Audit Network Security (SANS) Institute National Institute of Standards Technology (NIST).
The CIS Benchmarks and CIS Controls can help with multiple aspects of PCI DSS compliance, including:
The National Institute of Standards and Technology (NIST) is a leading agency in technical compliance. The CIS Controls have been recognized by users as a robust on-ramp to meeting NIST cybersecurity standards within their organization.
CIS Controls V7.1 Mapping to NIST CSF
NIST SP 800-53 R4 Low Baseline
The Federal Information Security Modernization Act (FISMA), which is a component of NIST, also points to CIS resources for cybersecurity compliance.
The Health Insurance Portability and Accountability Act (HIPAA) security rule establishes the baseline for protecting the security of patient information within the healthcare industry.The CIS Controls complement the HIPAA security rule and contain many of the same provisions. Since the CIS Controls and Sub-Controls are regularly updated based on real-world attack patterns, the CIS Controls can help healthcare organizations “round out” their cybersecurity program to address risks outside the HIPAA security rule. Additionally, the CIS Benchmarks can be used to securely configure workstations used to manage electronic protected health information. This means that CIS Controls, CIS Benchmarks, and HIPAA can work together to help improve cyber hygiene. The CIS Controls Implementation Group is defined as cyber hygiene.
The European Union (E.U.) Regulation 2016/679 GDPR (General Data Protection Regulation) was put into effect on May 25, 2018. Any organization which holds E.U. citizen data, regardless of its location, is responsible for following these new guidelines.
The International Organization for Standardization (ISO) provides independent, globally-recognized standards for securing technologies. ISO/IEC 27001 helps organizations defend against cyber threats and information security risks. Because the CIS Controls and CIS Benchmarks provide guidance addressing major cybersecurity needs such as asset classification, authentication methods and privileges, event logging, and encryption, they are also frequently used by organizations seeking ISO compliance. View a detailed mapping of the relationship between the CIS Controls and ISO 27001 below.
Critical Security Controls for Effective Capability in Cyber Defense, Nov. 29, 2018. Based on the CIS Controls.
The California Data Breach Report published by the California Attorney General in 2016 concluded that the CIS Critical Security Controls “identify a minimum level of information security that all organizations that collect or maintain personal information should meet.” The report warns that failing to implement all relevant Controls "constitutes a lack of reasonable security.” (California Data Breach Report at Recommendation 1.)
Colorado’s cybersecurity team also follows the 20 CIS Controls & Resources as a framework for the state’s security program, as well as NIST SP 800-53, a National Institute of Standards and Technology document which serves as the basis for the agency’s policies. The 20 CIS Controls & Resources “are a good way to operationalize the NIST cybersecurity framework, which is how many states, including Colorado, are explaining their programs and Wyatt, of Deloitte, agrees. “When talking to legislators and asking for budget, you need a cybersecurity roadmap, and it’s helpful to have a straightforward way to explain what you’re going to do, like CIS 20,” he says. “Colorado has done this successfully. Ongoing communication with key stakeholders makes it twice as likely an agency will get security funding. You’re not just talking to the legislature when something bad happens.”
"Cybersecurity 101, A Resource Guide for Bank Executives,” 2017. Recommends use of the Critical Security Controls at 8, 12, 24.
"Cybersecurity 101, A Resource Guide for Bank Executives,” 2017. Recommends use of the Critical Security Controls at 8, 12, 24.
In 2017, Governor Butch Otter issued an executive order requiring all executive branch agencies to implement the first five Center for Internet Security Critical Security Controls for evaluation of existing state systems.
House File 553, “An Act Relating to Affirmative Defenses for Entities Using Cybersecurity Programs,” provides that any “covered entity that satisfies all requirements...is entitled to an affirmative defense to any” tort lawsuit brought against the organization for a cyber breach. The new law states that a cybersecurity program must conform to an industry-recognized cybersecurity framework such as the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171, NIST SP 800-53 and 800-53a, FedRAMP, ISO 27000, and the CIS Controls.
In 2017, Illinois passed a privacy law, the Student Online Personal Protection Act (SOPPA). The Illinois K12 technology staff are looking to Implementation Group 1 as a framework to comply with the “reasonable security” required by the law.
The State of Michigan issued a request for proposals to “deliver comprehensive security awareness and training to various local government entities using the industry recognized Center for Internet Security (CIS) Top 20 Security Controls.” Target audience will include counties in the Detroit Southeastern UASI Region (6 Counties) as well as select counties throughout Michigan.”
Ohio Department of Administrative Services (DAS) Director Matt Damschroder said full implementation of six controls outlined by the Center for Internet Security will stop 85 percent of threats.
An existing Nevada statute relating to personal information collected by governmental agencies requires the state data collectors to implement and maintain "reasonable security measures" to protect such records. (NRS 603A.210.) A new Nevada statute, which became effective on January 1, 2021, requires that the state data collectors comply with the CIS Critical Security Controls or the NIST Cybersecurity Framework, thus defining what constitutes reasonable security for the state as a PII collector.
In 2018, the Ohio Data Protection Act became the nation’s first law that incentivizes organizations to develop a strong data protection and cybersecurity program. The statute establishes legal protections for organizations that voluntarily adopt certain recognized cybersecurity best practices (e.g., NIST CSF & the CIS Critical Security Controls) and implement a written information security program.
The Oregon Secretary of State, Audit Division, performed a cybersecurity controls audit of the Oregon State Police in May, 2020, using the CIS Controls as its audit standard. “The Audits Division conducts cybersecurity audits to evaluate IT security risks and provide a high-level view of an agency’s current state. We chose to use the Center for Internet Security’s CIS Controls, version 7.1. The CIS Controls are a prioritized list of 20 high-priority defensive actions that provide a starting point for enterprises to improve cyber defense. The controls are divided into three categories: basic, foundational, and organizational. This review includes the first six, the basic controls, which the Center for Internet Security, along with other security practitioners, defined as key controls that every organization should implement for essential cyber defense readiness.”
Federal Highway Administration, Transportation Management Center Information Technology Security, Final Report, Sep. 2019. Critical Security Controls cited throughout as insight into basic practices that serve as a starting point or baseline for organizations with limited resources and cybersecurity expertise, as well as guidelines for Traffic Management Centers looking to increase their system maturity.
The Utah Cybersecurity Affirmative Defense Act similarly incentivizes the voluntary adoption of cyber best practices by creating affirmative defenses to certain lawsuits stemming from a security breach. Specifically, the Act provides that a person or organization that “creates, maintains, and reasonably complies with a written cybersecurity program meeting certain requirements, and which is in place at the time of a breach of system security, has an affirmative defense to a claim brought under the laws of Utah alleging that the person failed to implement reasonable information security controls that resulted in the breach of system security.”
CIS resources are also referenced in various cybersecurity guides and programs. Below are a few independent cyber defense and resource guides which mention CIS resources:
Use our CIS Controls Navigator to explore how they map to other security standards.
The CIS Critical Security Controls (CIS Controls) are a prioritized set of Safeguards to mitigate the most prevalent cyber-attacks against systems and networks.