CIS Controls11 min read

CIS Controls Compliance Checklist

Use this checklist to track your CIS Controls implementation progress. This guide provides a structured approach to evaluating and documenting your compliance with CIS Controls v8, focusing on Implementation Group 1 (IG1) safeguards that every organization should implement.

This checklist complements our CIS Controls implementation guide with a practical tracking format.

Key Takeaways

Point Summary
Focus IG1 (56 safeguards) forms the essential baseline
Assessment approach Rate each safeguard as Not Implemented, Partial, or Complete
Documentation Record evidence for each implemented safeguard
Ongoing process Reassess quarterly and after significant changes
Progression Move to IG2/IG3 after completing IG1

Quick Answer: This checklist covers all 56 IG1 safeguards from CIS Controls v8. For each safeguard, assess your current implementation status, identify gaps, and document evidence. Use this checklist to create an implementation roadmap and track progress over time. Most organizations should target 100% IG1 completion before expanding to IG2.

How to Use This Checklist

Assessment Ratings

Rate each safeguard using this scale:

Rating Definition Criteria
Not Implemented Safeguard is not in place No controls, no process, no documentation
Partial Some elements exist Controls partially deployed, process incomplete
Complete Fully implemented Controls deployed, process documented, evidence available
N/A Not applicable Safeguard doesn't apply to your environment

Evidence Collection

For each "Complete" safeguard, document:

  • What is implemented
  • Where it's implemented (systems, applications)
  • Evidence (screenshots, logs, policies)
  • Owner responsible for maintenance

Control 1: Inventory and Control of Enterprise Assets

# Safeguard Your Status Evidence/Notes
1.1 Establish and Maintain Detailed Enterprise Asset Inventory ☐ Not Implemented ☐ Partial ☐ Complete
1.2 Address Unauthorized Assets ☐ Not Implemented ☐ Partial ☐ Complete

Implementation Guidance

1.1 Asset Inventory:

  • Maintain list of all hardware assets (servers, workstations, laptops, mobile devices)
  • Include cloud instances and virtual machines
  • Update within 7 days of changes
  • Minimum attributes: asset ID, IP address, hardware type, owner

1.2 Unauthorized Assets:

  • Process to detect new/unknown assets
  • Procedure to investigate and classify
  • Weekly or more frequent detection cycle

Control 2: Inventory and Control of Software Assets

# Safeguard Your Status Evidence/Notes
2.1 Establish and Maintain a Software Inventory ☐ Not Implemented ☐ Partial ☐ Complete
2.2 Ensure Authorized Software is Currently Supported ☐ Not Implemented ☐ Partial ☐ Complete
2.3 Address Unauthorized Software ☐ Not Implemented ☐ Partial ☐ Complete

Implementation Guidance

2.1 Software Inventory:

  • List all installed software applications
  • Include version numbers
  • Track vendor and support status
  • Update within 7 days of changes

2.2 Supported Software:

  • Review software against vendor support timelines
  • Plan for end-of-life transitions
  • Document exceptions with risk acceptance

2.3 Unauthorized Software:

  • Process to detect unauthorized software
  • Procedure for removal or approval
  • Monthly or more frequent review

Control 3: Data Protection

# Safeguard Your Status Evidence/Notes
3.1 Establish and Maintain a Data Management Process ☐ Not Implemented ☐ Partial ☐ Complete
3.2 Establish and Maintain a Data Inventory ☐ Not Implemented ☐ Partial ☐ Complete
3.3 Configure Data Access Control Lists ☐ Not Implemented ☐ Partial ☐ Complete
3.4 Enforce Data Retention ☐ Not Implemented ☐ Partial ☐ Complete
3.5 Securely Dispose of Data ☐ Not Implemented ☐ Partial ☐ Complete
3.6 Encrypt Data on End-User Devices ☐ Not Implemented ☐ Partial ☐ Complete

Implementation Guidance

3.1 Data Management Process:

  • Documented process for data handling
  • Classification scheme (e.g., Public, Internal, Confidential)
  • Handling requirements per classification

3.2 Data Inventory:

  • List of sensitive data types
  • Storage locations
  • Processing systems
  • Update annually at minimum

3.3 Access Control Lists:

  • Access based on job function
  • Documented access approvals
  • Regular access reviews

3.4 Data Retention:

  • Retention schedule by data type
  • Automated deletion where possible
  • Documentation of retention compliance

3.5 Secure Disposal:

  • Secure deletion methods documented
  • Destruction verification
  • Media sanitization procedures

3.6 Endpoint Encryption:

  • Full disk encryption on all laptops/desktops
  • Mobile device encryption
  • Encryption verification capability

Control 4: Secure Configuration of Enterprise Assets and Software

# Safeguard Your Status Evidence/Notes
4.1 Establish and Maintain a Secure Configuration Process ☐ Not Implemented ☐ Partial ☐ Complete
4.2 Establish and Maintain a Secure Configuration Process for Network Infrastructure ☐ Not Implemented ☐ Partial ☐ Complete
4.3 Configure Automatic Session Locking on Enterprise Assets ☐ Not Implemented ☐ Partial ☐ Complete
4.4 Implement and Manage a Firewall on Servers ☐ Not Implemented ☐ Partial ☐ Complete
4.5 Implement and Manage a Firewall on End-User Devices ☐ Not Implemented ☐ Partial ☐ Complete
4.6 Securely Manage Enterprise Assets and Software ☐ Not Implemented ☐ Partial ☐ Complete
4.7 Manage Default Accounts on Enterprise Assets and Software ☐ Not Implemented ☐ Partial ☐ Complete

Implementation Guidance

4.1 & 4.2 Configuration Process:

  • Documented configuration standards
  • Use CIS Benchmarks as baseline
  • Configuration management process

4.3 Session Locking:

  • Automatic lock after 15 minutes or less of inactivity
  • Applied to all workstations and laptops
  • GPO or MDM enforcement

4.4 & 4.5 Firewalls:

  • Host-based firewall on all servers
  • Host-based firewall on all endpoints
  • Default-deny configuration

4.6 Secure Management:

  • Encrypted management connections (SSH, HTTPS)
  • Secure protocols for all management traffic
  • Jump hosts or bastion hosts for access

4.7 Default Accounts:

  • Default passwords changed
  • Unused default accounts disabled
  • Default admin accounts renamed

Control 5: Account Management

# Safeguard Your Status Evidence/Notes
5.1 Establish and Maintain an Inventory of Accounts ☐ Not Implemented ☐ Partial ☐ Complete
5.2 Use Unique Passwords ☐ Not Implemented ☐ Partial ☐ Complete
5.3 Disable Dormant Accounts ☐ Not Implemented ☐ Partial ☐ Complete
5.4 Restrict Administrator Privileges to Dedicated Administrator Accounts ☐ Not Implemented ☐ Partial ☐ Complete

Implementation Guidance

5.1 Account Inventory:

  • List of all user accounts
  • List of all service accounts
  • Account ownership documented
  • Review quarterly

5.2 Unique Passwords:

  • Password manager deployed
  • Unique passwords required per system
  • Password complexity enforced

5.3 Dormant Accounts:

  • Define dormancy threshold (e.g., 45 days)
  • Automated detection of dormant accounts
  • Process for disabling dormant accounts

5.4 Dedicated Admin Accounts:

  • Separate accounts for admin activities
  • Standard accounts for daily work
  • Admin accounts follow naming convention

Control 6: Access Control Management

# Safeguard Your Status Evidence/Notes
6.1 Establish an Access Granting Process ☐ Not Implemented ☐ Partial ☐ Complete
6.2 Establish an Access Revoking Process ☐ Not Implemented ☐ Partial ☐ Complete
6.3 Require MFA for Externally-Exposed Applications ☐ Not Implemented ☐ Partial ☐ Complete
6.4 Require MFA for Remote Network Access ☐ Not Implemented ☐ Partial ☐ Complete
6.5 Require MFA for Administrative Access ☐ Not Implemented ☐ Partial ☐ Complete

Implementation Guidance

6.1 Access Granting:

  • Documented access request process
  • Approval workflow
  • Access provisioning procedure

6.2 Access Revoking:

  • Offboarding checklist
  • Access revocation within 24 hours of termination
  • Access review for role changes

6.3-6.5 MFA:

  • MFA on all external applications
  • MFA on VPN and remote access
  • MFA on all admin consoles
  • Avoid SMS-only MFA if possible

Control 7: Continuous Vulnerability Management

# Safeguard Your Status Evidence/Notes
7.1 Establish and Maintain a Vulnerability Management Process ☐ Not Implemented ☐ Partial ☐ Complete
7.2 Establish and Maintain a Remediation Process ☐ Not Implemented ☐ Partial ☐ Complete
7.3 Perform Automated Operating System Patch Management ☐ Not Implemented ☐ Partial ☐ Complete
7.4 Perform Automated Application Patch Management ☐ Not Implemented ☐ Partial ☐ Complete

Implementation Guidance

7.1 Vulnerability Management:

  • Process to identify vulnerabilities
  • Severity classification
  • Risk assessment procedure

7.2 Remediation Process:

  • Remediation SLAs by severity
  • Tracking and reporting
  • Exception process

7.3 & 7.4 Automated Patching:

  • Automatic updates enabled where possible
  • Patch testing process
  • Patch compliance reporting

Control 8: Audit Log Management

# Safeguard Your Status Evidence/Notes
8.1 Establish and Maintain an Audit Log Management Process ☐ Not Implemented ☐ Partial ☐ Complete
8.2 Collect Audit Logs ☐ Not Implemented ☐ Partial ☐ Complete
8.3 Ensure Adequate Audit Log Storage ☐ Not Implemented ☐ Partial ☐ Complete

Implementation Guidance

8.1 Log Management Process:

  • Documented logging requirements
  • Log retention policy
  • Log review procedures

8.2 Log Collection:

  • Authentication events logged
  • Authorization events logged
  • Administrative actions logged

8.3 Log Storage:

  • Minimum 90 days retention
  • Sufficient storage capacity
  • Protected from tampering

Control 9: Email and Web Browser Protections

# Safeguard Your Status Evidence/Notes
9.1 Ensure Use of Only Fully Supported Browsers and Email Clients ☐ Not Implemented ☐ Partial ☐ Complete
9.2 Use DNS Filtering Services ☐ Not Implemented ☐ Partial ☐ Complete

Implementation Guidance

9.1 Supported Software:

  • Current versions of browsers
  • Current versions of email clients
  • Automatic updates enabled

9.2 DNS Filtering:

  • DNS filtering service implemented
  • Block known malicious domains
  • Category blocking as appropriate

Control 10: Malware Defenses

# Safeguard Your Status Evidence/Notes
10.1 Deploy and Maintain Anti-Malware Software ☐ Not Implemented ☐ Partial ☐ Complete
10.2 Configure Automatic Anti-Malware Signature Updates ☐ Not Implemented ☐ Partial ☐ Complete
10.3 Disable Autorun and Autoplay for Removable Media ☐ Not Implemented ☐ Partial ☐ Complete

Implementation Guidance

10.1 Anti-Malware:

  • Anti-malware on all endpoints
  • Anti-malware on servers
  • Real-time protection enabled

10.2 Signature Updates:

  • Automatic updates enabled
  • Update frequency: daily minimum
  • Verification of update status

10.3 Autorun/Autoplay:

  • Disabled via GPO or MDM
  • Applied to all endpoints
  • Verified configuration

Control 11: Data Recovery

# Safeguard Your Status Evidence/Notes
11.1 Establish and Maintain a Data Recovery Process ☐ Not Implemented ☐ Partial ☐ Complete
11.2 Perform Automated Backups ☐ Not Implemented ☐ Partial ☐ Complete
11.3 Protect Recovery Data ☐ Not Implemented ☐ Partial ☐ Complete
11.4 Establish and Maintain an Isolated Instance of Recovery Data ☐ Not Implemented ☐ Partial ☐ Complete

Implementation Guidance

11.1 Recovery Process:

  • Documented recovery procedures
  • RPO and RTO defined
  • Recovery responsibilities assigned

11.2 Automated Backups:

  • Scheduled backups for all critical data
  • Backup success monitoring
  • Backup verification

11.3 Protected Recovery Data:

  • Backup encryption
  • Access controls on backups
  • Secure backup storage

11.4 Isolated Recovery Data:

  • Offline or immutable backup copy
  • Separate from production environment
  • Protected from ransomware

Control 12: Network Infrastructure Management

# Safeguard Your Status Evidence/Notes
12.1 Ensure Network Infrastructure is Up-to-Date ☐ Not Implemented ☐ Partial ☐ Complete

Implementation Guidance

12.1 Up-to-Date Infrastructure:

  • Current firmware on network devices
  • Supported software versions
  • Patch management for network infrastructure

Control 14: Security Awareness and Skills Training

# Safeguard Your Status Evidence/Notes
14.1 Establish and Maintain a Security Awareness Program ☐ Not Implemented ☐ Partial ☐ Complete
14.2 Train Workforce Members to Recognize Social Engineering Attacks ☐ Not Implemented ☐ Partial ☐ Complete
14.3 Train Workforce Members on Authentication Best Practices ☐ Not Implemented ☐ Partial ☐ Complete
14.4 Train Workforce Members on Data Handling Best Practices ☐ Not Implemented ☐ Partial ☐ Complete
14.5 Train Workforce Members on Causes of Unintentional Data Exposure ☐ Not Implemented ☐ Partial ☐ Complete
14.6 Train Workforce Members on Recognizing and Reporting Security Incidents ☐ Not Implemented ☐ Partial ☐ Complete

Implementation Guidance

14.1-14.6 Training Program:

  • Annual security awareness training for all employees
  • New hire training within 30 days
  • Training completion tracking
  • Phishing simulation exercises

Control 15: Service Provider Management

# Safeguard Your Status Evidence/Notes
15.1 Establish and Maintain an Inventory of Service Providers ☐ Not Implemented ☐ Partial ☐ Complete

Implementation Guidance

15.1 Service Provider Inventory:

  • List of all service providers
  • Data/access provided to each
  • Security requirements documented
  • Annual review

Control 17: Incident Response Management

# Safeguard Your Status Evidence/Notes
17.1 Designate Personnel to Manage Incident Handling ☐ Not Implemented ☐ Partial ☐ Complete
17.2 Establish and Maintain Contact Information for Reporting Security Incidents ☐ Not Implemented ☐ Partial ☐ Complete
17.3 Establish and Maintain an Enterprise Process for Reporting Incidents ☐ Not Implemented ☐ Partial ☐ Complete

Implementation Guidance

17.1 Incident Personnel:

  • Primary incident handler designated
  • Backup personnel identified
  • Contact information available

17.2 Contact Information:

  • Internal contacts documented
  • External contacts (legal, PR, law enforcement)
  • Updated quarterly

17.3 Reporting Process:

  • Documented incident reporting procedure
  • Multiple reporting channels available
  • Clear escalation path

Summary Scorecard

IG1 Implementation Status

Control Total Safeguards Not Implemented Partial Complete
1. Enterprise Assets 2
2. Software Assets 3
3. Data Protection 6
4. Secure Configuration 7
5. Account Management 4
6. Access Control 5
7. Vulnerability Management 4
8. Audit Log Management 3
9. Email and Web Browser 2
10. Malware Defenses 3
11. Data Recovery 4
12. Network Infrastructure 1
14. Security Training 6
15. Service Provider 1
17. Incident Response 3
Total IG1 56

Compliance Percentage

Status Count Percentage
Complete
Partial
Not Implemented
N/A

Target: 100% Complete or N/A for IG1 safeguards

Next Steps

Addressing Gaps

  1. Prioritize "Not Implemented" safeguards by risk
  2. Create implementation timeline
  3. Assign owners for each gap
  4. Track progress monthly

Moving to IG2

Once IG1 is complete, evaluate readiness for IG2:

  • Do you have dedicated IT staff?
  • Are customer requirements driving additional controls?
  • Is your risk profile increasing?

See our Implementation Groups guide for IG2 safeguards.

Connecting to Compliance

Map your CIS Controls implementation to compliance frameworks:


Need help completing your CIS Controls implementation? Talk to our team


Sources