CIS Controls10 min read

CIS Controls Implementation Groups: IG1, IG2, and IG3 Explained

One of the most valuable features of the CIS Controls framework is its Implementation Groups model. Rather than presenting all 153 safeguards as equally important, Implementation Groups help organizations prioritize based on their resources, risk profile, and security maturity.

This guide explains the three Implementation Groups, helps you determine which is right for your organization, and provides practical guidance for implementation.

Key Takeaways

Point Summary
Three tiers IG1 (essential), IG2 (expanded), IG3 (advanced)
IG1 56 safeguards for organizations with limited IT resources
IG2 130 safeguards (IG1 + 74) for organizations with dedicated IT staff
IG3 153 safeguards (IG2 + 23) for high-risk organizations
Start with IG1 All organizations should implement IG1 as the foundation
Progressive model Each group builds on the previous one

Quick Answer: Most startups and SMBs should focus on IG1, which contains 56 essential safeguards providing protection against the most common cyber attacks. IG1 is designed to be achievable for organizations without dedicated security staff. Move to IG2 when you have dedicated IT personnel and face increased risks. IG3 is for organizations handling highly sensitive data or facing sophisticated threats.

Understanding Implementation Groups

Implementation Groups were introduced in CIS Controls v7 and refined in v8. They solve a common challenge: organizations with limited resources often feel overwhelmed by the full scope of security frameworks. Implementation Groups provide a practical path forward.

The Progressive Model

Each Implementation Group builds on the previous one:

Text
IG1 (56 safeguards) → IG2 (+74 = 130 total) → IG3 (+23 = 153 total)

This means:

  • IG2 includes all of IG1, plus 74 additional safeguards
  • IG3 includes all of IG2 (and IG1), plus 23 additional safeguards
  • You don't skip groups; you progress through them

Implementation Group 1 (IG1): Essential Cyber Hygiene

IG1 represents the minimum standard of information security that all organizations should meet. It's designed for organizations that:

  • Have limited IT and cybersecurity expertise
  • May not have dedicated security staff
  • Need to defend against general, non-targeted attacks
  • Have constrained resources for security investments

IG1 Characteristics

Attribute Description
Safeguards 56
Target Small to medium organizations
IT staff Minimal or shared IT responsibilities
Primary threats Opportunistic attacks, commodity malware
Focus Basic cyber hygiene, essential protections

What IG1 Covers

IG1 safeguards address the most critical security fundamentals:

Asset Management (Controls 1-2)

  • Know your hardware and software
  • Remove unauthorized assets
  • Keep software current

Data Protection (Control 3)

  • Classify and inventory data
  • Configure access controls
  • Encrypt end-user devices
  • Secure data disposal

Secure Configuration (Control 4)

  • Establish configuration processes
  • Implement firewalls
  • Manage default accounts

Account and Access Management (Controls 5-6)

  • Inventory accounts
  • Use unique passwords
  • Disable dormant accounts
  • Require MFA for sensitive access

Vulnerability and Patch Management (Control 7)

  • Establish remediation processes
  • Automate patching

Logging (Control 8)

  • Collect and store audit logs

Email and Browser Security (Control 9)

  • Use supported software
  • Implement DNS filtering

Malware Protection (Control 10)

  • Deploy anti-malware
  • Keep signatures updated

Data Recovery (Control 11)

  • Implement automated backups
  • Protect backup data

Network Infrastructure (Control 12)

  • Keep network equipment updated

Security Training (Control 14)

  • Basic security awareness
  • Social engineering recognition
  • Authentication best practices
  • Incident reporting procedures

Service Provider Management (Control 15)

  • Maintain provider inventory

Incident Response (Control 17)

  • Designate incident handlers
  • Establish reporting procedures

Who Should Implement IG1?

IG1 is appropriate for:

Organization Type Why IG1
Startups Limited resources, focused on growth
Small businesses Shared IT responsibilities, no security team
Low-risk organizations Don't handle highly sensitive data
Beginning security programs Building foundational controls

IG1 provides substantial protection. CIS has mapped the Controls to the MITRE ATT&CK framework, demonstrating that IG1 safeguards defend against a significant portion of documented attack techniques. For many organizations, this level of protection is sufficient.

Implementation Group 2 (IG2): Expanded Protection

IG2 is designed for organizations that have more resources, face greater risks, or need more robust security programs.

IG2 Characteristics

Attribute Description
Safeguards 130 (IG1 + 74 additional)
Target Medium to large organizations
IT staff Dedicated IT personnel
Primary threats Targeted attacks, sophisticated malware
Focus Expanded monitoring, detection, and response

What IG2 Adds

IG2 builds on IG1 with more sophisticated controls:

Enhanced Asset Discovery (Control 1)

  • Active and automated discovery tools
  • DHCP logging for asset tracking

Software Allowlisting (Control 2)

  • Allowlist authorized software and libraries

Data Classification and Encryption (Control 3)

  • Formal classification schemes
  • Data flow documentation
  • Encryption in transit and at rest

Advanced Configuration (Control 4)

  • Disable unnecessary services
  • Configure trusted DNS
  • Remote wipe capabilities

Centralized Account Management (Control 5)

  • Service account inventory
  • Centralized management

Centralized Access Control (Control 6)

  • Inventory of auth systems
  • Centralized access control

Vulnerability Scanning (Control 7)

  • Automated internal and external scanning
  • Formal remediation tracking

Comprehensive Logging (Control 8)

  • Time synchronization
  • Detailed logs (DNS, URL, command-line)
  • Centralized logging
  • Regular log reviews

Email and Browser Hardening (Control 9)

  • URL filtering
  • Extension restrictions
  • DMARC implementation

Advanced Malware Protection (Control 10)

  • Centralized management
  • Behavior-based detection

Backup Testing (Control 11)

  • Regular recovery testing

Network Architecture (Control 12)

  • Documented architecture
  • Centralized AAA
  • VPN requirements

Network Monitoring (Control 13)

  • Security event alerting
  • Intrusion detection
  • Traffic filtering
  • Network flow logs

Advanced Training (Control 14)

  • Insecure network awareness

Service Provider Assessment (Control 15)

  • Provider classification
  • Security requirements in contracts
  • Regular assessments

Application Security (Control 16)

  • Secure development process
  • Third-party component management
  • Security testing

Incident Response Process (Control 17)

  • Formal IR process
  • Defined roles
  • Communication plans
  • Regular exercises
  • Post-incident reviews

Penetration Testing (Control 18)

  • Periodic external testing
  • Remediation tracking

Who Should Implement IG2?

IG2 is appropriate for:

Organization Type Why IG2
Growing companies Increased attack surface, more at stake
Organizations with IT teams Can implement and maintain controls
Regulated industries Need more robust controls
B2B companies Customer security requirements
Companies handling sensitive data Higher risk requires more protection

Implementation Group 3 (IG3): Advanced Protection

IG3 is designed for organizations that face sophisticated adversaries, handle highly sensitive data, or operate critical infrastructure.

IG3 Characteristics

Attribute Description
Safeguards 153 (IG2 + 23 additional)
Target Large enterprises, critical infrastructure
Security staff Dedicated security team
Primary threats Advanced persistent threats, nation-state actors
Focus Defense-in-depth, advanced detection

What IG3 Adds

IG3 includes the most sophisticated safeguards:

Advanced Asset Discovery (Control 1)

  • Passive discovery tools

Script Allowlisting (Control 2)

  • Control authorized scripts

Advanced Data Protection (Control 3)

  • Data loss prevention
  • Sensitive data access logging

Mobile Security (Control 4)

  • Workspace separation on mobile devices

Role-Based Access (Control 6)

  • Formal RBAC implementation

Service Provider Monitoring (Control 15)

  • Ongoing provider monitoring
  • Secure decommissioning

Advanced Application Security (Control 16)

  • Code-level security checks
  • Application penetration testing
  • Threat modeling

Advanced Incident Response (Control 17)

  • Security incident thresholds

Advanced Network Defense (Control 13)

  • Intrusion prevention (not just detection)
  • Port-level access control
  • Application layer filtering
  • Tuned alerting thresholds

Dedicated Administration (Control 12)

  • Separate computing resources for admin work

Comprehensive Penetration Testing (Control 18)

  • Internal penetration testing
  • Security measure validation

Advanced Training (Control 14)

  • Role-specific training

Who Should Implement IG3?

IG3 is appropriate for:

Organization Type Why IG3
Financial institutions High-value targets, regulatory requirements
Healthcare organizations Sensitive patient data
Critical infrastructure National security implications
Government contractors Classified or sensitive information
Large enterprises Resources and threat profile require it

Choosing Your Implementation Group

Assessment Criteria

Consider these factors when selecting your Implementation Group:

Factor IG1 IG2 IG3
IT staff Shared/minimal Dedicated IT Security team
Data sensitivity Standard business Customer/regulated Highly sensitive
Regulatory requirements Minimal Moderate Stringent
Threat profile Opportunistic Targeted Advanced/APT
Resources Limited Moderate Substantial
Security maturity Beginning Developing Mature

Decision Flow

Start with IG1 if you:

  • Are a startup or small business
  • Don't have dedicated IT security staff
  • Handle primarily standard business data
  • Face general, non-targeted threats
  • Are building your first formal security program

Consider IG2 if you:

  • Have dedicated IT personnel
  • Handle customer data or regulated information
  • Face targeted attack risks
  • Need to demonstrate security to enterprise customers
  • Are pursuing compliance frameworks like SOC 2 or ISO 27001

Consider IG3 if you:

  • Have a dedicated security team
  • Handle highly sensitive data (healthcare, financial, government)
  • Face advanced persistent threats
  • Operate critical infrastructure
  • Have stringent regulatory requirements

Implementation Strategy

Progressive Implementation

Don't try to implement your target IG all at once. Use a progressive approach:

Phase 1: IG1 Foundation

  1. Complete asset inventory (Controls 1-2)
  2. Implement access controls and MFA (Controls 5-6)
  3. Enable backups and recovery (Control 11)
  4. Deploy basic security tools (Controls 9-10)
  5. Establish incident response basics (Control 17)

Phase 2: IG1 Completion
6. Implement remaining IG1 safeguards
7. Validate and document implementation
8. Establish ongoing maintenance processes

Phase 3: IG2 Expansion (if applicable)
9. Prioritize IG2 safeguards based on risk
10. Implement monitoring and detection (Controls 8, 13)
11. Build out vulnerability management (Control 7)
12. Develop application security program (Control 16)

Phase 4: IG3 Advanced (if applicable)
13. Implement advanced detection and prevention
14. Build out penetration testing program
15. Develop sophisticated response capabilities

Timeframes

Typical implementation timeframes:

Group Typical Duration Notes
IG1 3-6 months Depends on starting point
IG1 → IG2 6-12 months After IG1 completion
IG2 → IG3 6-12 months After IG2 completion

These are estimates; actual timelines depend on organizational size, complexity, and resources.

Common Questions

Can I skip IG1 and go directly to IG2?

No. Implementation Groups are progressive. IG2 assumes IG1 is in place. Skipping IG1 safeguards would leave gaps in your foundational security.

What if I need some IG2 safeguards but not all?

You can prioritize specific IG2 safeguards based on your risk profile. However, you should complete IG1 first and implement IG2 safeguards systematically rather than cherry-picking.

How do I know when I've "completed" an Implementation Group?

Each safeguard should be:

  • Implemented (controls are in place)
  • Operational (controls are functioning)
  • Measured (you can demonstrate effectiveness)
  • Maintained (ongoing processes exist)

Use CIS's Self Assessment Tool (CSAT) to evaluate your implementation status.

Do Implementation Groups map to compliance frameworks?

Not directly, but there are correlations:

Compliance Need Typical IG
SOC 2 Type 2 IG1-IG2
ISO 27001 IG1-IG2
HIPAA IG2 minimum
PCI DSS IG2-IG3
CMMC IG2-IG3

IG1: The Essential Foundation

For most readers of this guide, IG1 is the starting point and possibly the appropriate long-term target. Here's why IG1 matters:

Effectiveness: IG1 safeguards address the attack techniques used in the majority of breaches. Implementing IG1 significantly reduces your attack surface.

Achievability: IG1 is designed to be implementable without dedicated security staff. The safeguards are practical and within reach.

Foundation: IG1 creates the foundation for more advanced controls. Even if you plan to progress to IG2 or IG3, you need IG1 first.

Business value: IG1 enables you to confidently answer customer security questionnaires and provides a baseline for compliance frameworks.

For practical guidance on implementing IG1 in startup environments, see our CIS Controls for Startups guide.


Need help determining which Implementation Group is right for your organization? Talk to our team


Sources