CIS Controls9 min read

What are CIS Controls?

If you're building a security program for your organization, you've likely encountered references to CIS Controls. This guide explains what they are, why they matter, and how they can help you establish a practical, prioritized approach to cybersecurity.

CIS Controls are a set of prioritized cybersecurity best practices developed by the Center for Internet Security. Originally known as the SANS Top 20, they've evolved into the most widely adopted framework for technical security controls. Unlike compliance frameworks such as SOC 2 or ISO 27001, CIS Controls focus specifically on what to do technically to defend against real-world cyber attacks.

Key Takeaways

Point Summary
What they are 18 prioritized security controls with 153 safeguards, developed by the Center for Internet Security
Primary purpose Provide actionable, prioritized guidance for defending against common cyber attacks
Implementation Groups Three tiers (IG1, IG2, IG3) that help organizations start with fundamentals and scale up
Cost Framework is free to access; implementation costs vary based on scope
Relationship to compliance Often used alongside SOC 2, ISO 27001, or NIST CSF to implement technical controls

Quick Answer: CIS Controls are 18 prioritized security best practices that tell you exactly what to implement to protect your organization from cyber attacks. They're free, practical, and designed to be implemented incrementally starting with the most essential safeguards (IG1). Most startups should begin with IG1's 56 safeguards, which address the most common attack vectors.

Why CIS Controls Matter

Practical and Actionable

Unlike high-level frameworks that describe security outcomes, CIS Controls specify concrete actions. For example, rather than stating "implement access controls," CIS Control 6 specifies exactly how to manage access, including specific safeguards like establishing an access granting process and requiring MFA for administrative access.

Prioritized by Risk

The controls are ordered by priority based on real-world attack data. This means organizations can start with Control 1 (Inventory and Control of Enterprise Assets) and work their way through, knowing they're addressing the most impactful areas first.

Defense-Focused

CIS Controls were developed by analyzing actual cyber attacks and identifying which defensive measures would have prevented them. Each control directly maps to defending against common attack techniques documented in frameworks like MITRE ATT&CK.

Community-Developed

The controls are maintained by a global community of security practitioners, not by a single vendor or consultancy. This ensures they remain vendor-neutral, practical, and grounded in real-world experience.

The 18 CIS Controls

CIS Controls v8, released in 2021, organizes security practices into 18 controls:

Control Name Focus
1 Inventory and Control of Enterprise Assets Know what devices you have
2 Inventory and Control of Software Assets Know what software you run
3 Data Protection Classify and protect sensitive data
4 Secure Configuration of Enterprise Assets and Software Harden your systems
5 Account Management Manage user accounts properly
6 Access Control Management Control who can access what
7 Continuous Vulnerability Management Find and fix vulnerabilities
8 Audit Log Management Collect and review logs
9 Email and Web Browser Protections Secure common attack vectors
10 Malware Defenses Prevent and detect malware
11 Data Recovery Ensure you can recover from incidents
12 Network Infrastructure Management Secure your network
13 Network Monitoring and Defense Detect threats on your network
14 Security Awareness and Skills Training Train your people
15 Service Provider Management Manage third-party risk
16 Application Software Security Secure your applications
17 Incident Response Management Prepare for and handle incidents
18 Penetration Testing Test your defenses

For a detailed breakdown of each control and its safeguards, see our complete CIS Controls v8 list.

Implementation Groups: Starting Where You Are

One of the most practical aspects of CIS Controls is the Implementation Group model. Rather than overwhelming organizations with all 153 safeguards at once, Implementation Groups provide a roadmap:

Group Target Organizations Safeguards Focus
IG1 Small organizations, limited IT resources 56 Essential cyber hygiene
IG2 Organizations with IT staff, increased risk 74 additional (130 total) Expanded protection
IG3 Enterprises, high-risk environments 23 additional (153 total) Advanced protection

IG1: Essential Cyber Hygiene

IG1 is designed for small to medium organizations that may not have dedicated security staff. These 56 safeguards address the most common and impactful threats while remaining achievable for resource-constrained teams.

IG1 covers fundamentals like:

  • Hardware and software inventory
  • Secure configuration baselines
  • Access control basics
  • Data backup and recovery
  • Security awareness training

For most startups and SMBs, implementing IG1 provides substantial protection against the majority of cyber threats. Learn more in our Implementation Groups guide.

IG2: Building on the Foundation

IG2 is appropriate for organizations with dedicated IT staff managing enterprise-level complexity. It adds safeguards for:

  • More detailed logging and monitoring
  • Vulnerability management processes
  • Additional access control requirements
  • Network security enhancements

IG3: Advanced Protection

IG3 targets organizations handling highly sensitive data or facing sophisticated threats. It includes:

  • Penetration testing requirements
  • Advanced network defense
  • Comprehensive security testing
  • Advanced incident response capabilities

CIS Controls vs Other Frameworks

CIS Controls vs SOC 2

Aspect CIS Controls SOC 2
Purpose Implementation guidance Compliance attestation
Output Security improvements Audit report
Focus What to implement What to prove
Cost Free framework €10,000-50,000 for audit
Audience Security teams Customers, prospects

CIS Controls and SOC 2 are complementary. CIS Controls tell you what to implement; SOC 2 lets you prove you've implemented it. Many organizations use CIS Controls to build their security program and SOC 2 to demonstrate it externally. See our detailed CIS Controls vs SOC 2 mapping.

CIS Controls vs ISO 27001

Aspect CIS Controls ISO 27001
Type Control framework Management system
Certification No Yes
Approach Prescriptive (what to do) Outcome-based (what to achieve)
Scope Technical controls Governance + controls

CIS Controls are more prescriptive and technical, while ISO 27001 provides a broader management system approach. Organizations often use CIS Controls to implement the technical controls required by ISO 27001's Annex A. Learn more in our CIS Controls vs ISO 27001 comparison.

CIS Controls vs NIST CSF

Aspect CIS Controls NIST CSF
Focus Specific controls Risk management process
Granularity Detailed safeguards High-level outcomes
Primary use Implementation Strategy and assessment

NIST CSF provides a risk management framework (Identify, Protect, Detect, Respond, Recover), while CIS Controls provide specific implementation guidance. They're often used together: NIST CSF for overall program strategy and CIS Controls for specific implementations. See our CIS Controls vs NIST CSF comparison.

CIS Controls vs CIS Benchmarks

It's important to distinguish between CIS Controls and CIS Benchmarks:

CIS Controls CIS Benchmarks
What they are Security framework (18 controls) Configuration guides (hundreds available)
Scope Entire security program Specific technologies
Example "Establish and maintain secure configuration process" "Set Windows password policy to 14 characters minimum"

CIS Benchmarks are detailed hardening guides for specific technologies (Windows, Linux, AWS, Docker, etc.). CIS Control 4 (Secure Configuration) recommends using CIS Benchmarks to implement its safeguards. Learn more in our CIS Benchmarks guide.

Getting Started with CIS Controls

Step 1: Understand Your Organization

Before implementing controls, assess your current state:

  • What assets do you have?
  • What data do you handle?
  • What threats are most relevant?
  • What resources are available?

Step 2: Start with IG1

Unless you have specific requirements driving IG2 or IG3, start with IG1. These 56 safeguards provide the foundation and address the most common threats.

IG1 priority areas:

  1. Know your assets (Controls 1-2)
  2. Secure your configurations (Control 4)
  3. Manage access (Controls 5-6)
  4. Protect your data (Control 11 for backups)
  5. Train your people (Control 14)

Step 3: Map to Your Compliance Requirements

If you're pursuing SOC 2, ISO 27001, or another compliance framework, map CIS Controls to those requirements. This ensures your technical implementation satisfies multiple objectives.

Step 4: Build Incrementally

CIS Controls are designed to be implemented progressively. You don't need to achieve perfect implementation of all controls before moving forward. Start with foundational safeguards and expand coverage over time.

Common Questions

Do I need to implement all CIS Controls?

No. Start with IG1 (56 safeguards) and expand based on your risk profile and resources. Many organizations find IG1 sufficient for their needs.

Is there a CIS Controls certification?

CIS doesn't offer certification for Controls compliance. However, you can demonstrate alignment through audits like SOC 2 or internal assessments. Some organizations use CIS's Self Assessment Tool (CSAT) to evaluate and document their implementation.

How do CIS Controls relate to regulations?

CIS Controls map to many regulatory requirements (HIPAA, PCI DSS, GDPR technical requirements). Implementing CIS Controls often satisfies technical control requirements in these regulations.

How often are CIS Controls updated?

Major versions are released every few years (v7 in 2018, v8 in 2021). Updates reflect changes in the threat landscape and technology environment.

Are CIS Controls free?

Yes. The CIS Controls framework is freely available for download from the Center for Internet Security website. CIS Benchmarks are also free for non-commercial use.

Why Startups Should Care About CIS Controls

For startups and SMBs, CIS Controls offer several advantages:

Practical guidance: Instead of figuring out what to implement, you get specific recommendations backed by real-world effectiveness data.

Prioritized approach: Limited resources can focus on IG1 safeguards that address the most common threats.

Scalability: As your organization grows, you can progress to IG2 and IG3 without starting over.

Compliance foundation: Implementing CIS Controls creates a strong foundation for compliance frameworks like SOC 2 or ISO 27001.

Learn more about applying CIS Controls in resource-constrained environments in our CIS Controls for Startups guide.

Next Steps

Ready to implement CIS Controls? Explore our detailed guides:


Need help implementing CIS Controls or mapping them to your compliance requirements? Talk to our team


Sources