



At the same time, productivity is improved and the human and time resources spent on cybersecurity are reduced. This facilitates continuous maintenance of the systems and continuous monitoring of the controls. Hence, repeatability is a feature that facilitates automation. When it comes to CIS controls, automation brings with it multiple advantages, both in terms of productivity and cybersecurity.Ĭritical security controls provide any entity with an excellent foundation on which to proceed to protect its systems. It’s clear to no one, in the midst of 2022, that process automation is a key issue for any company. Group 3 consists of all the controls designed and developed.

Group 2, on the other hand, is made up of controls designed for organizations with more complex security needs and risks. Group 1 is made up of the most basic controls, which the CIS considers to be «basic cyber hygiene» and fundamental for the defense of any system. In this way, the CIS guides become useful tools not only for large organizations but also for small companies that need to safeguard their business against cyber attacks. Group 3: additional controls for the storage of very sensitive information.Group 2: additional CIS controls for the storage of sensitive information.Group 1: controls applicable to all companies, whether large or small.
#Cis benchmark controls software#
The complete list of the 18 CIS controls includes various activities ranging from inventory and control of company assets and software to malware defenses, through continuous management of vulnerabilities, development of penetration tests, or data protection.Ī set of actions covering the main areas of cybersecurity, enabling organizations to prepare their systems for potential attacks.Īs of version 7.1, the controls have been divided into three groups to facilitate their implementation by all types of organizations. Particularly sensitive issues in the pandemic era. Version 8 of these CIS controls are currently in force, published in May 2021, and focused on Cloud solutions, mobile and remote work. They form a set of defensive actions and countermeasures that help systems to be optimized in terms of security. The CIS critical security controls are 18 (formerly 20) key actions that organizations must execute to strengthen their cyber defense and protect themselves from potential attacks. CIS Controls: key activities to prevent attacks The following is a brief description of what they consist of and how they work. In the European Union, the European Telecommunications Standards Institute ( ETSI) has adopted them, consolidating them as cybersecurity standards, as has the OWASP methodology. Thus configuring the security of the systems according to the recommendations of the best experts.įor all these reasons, the CIS guides are used by system managers all over the world and are recognized by the main institutions. This results in an optimization of human and technical resources.įurthermore, controls and benchmarks facilitate the implementation of actions that have already proven to be successful in other cases. They form a node of information and technological knowledge that allows organizations to control the resilience of their systems and prioritize some areas over others. To achieve this goal, the organization connects the best experts in the field globally, strengthening the exchange of experiences and fostering the creation of synergies between professionals and researchers and between companies, institutions, and universities.Īll the work and wisdom of the collective mind, born out of these exchanges, is poured into the two major tools that make up the CIS guides: the controls and the benchmarks. Let’s start at the beginning: What does CIS stand for? It stands for the Center for Internet Security, a non-profit organization whose mission is to help make the cyber world safer for everyone by reducing cyber risks. Consensus standards for dealing with cyber risks CIS controls and benchmarks offer a set of cybersecurity best practices to help systems managers protect organizations. That is why security on the Internet, the great agora of our time, is just as important as on the street. In such a way that a problem in one of them has repercussions in the other. Our lives take place simultaneously in both dimensions. The merging of the physical world with the digital world is a process that has no way back. Benchmarks, software, and hardware configuration guidesĬIS controls and benchmarks provide IT staff and security analysts around the world with a set of tips and methodologies to ensure good cybersecurity practices and reduce risks on the Internet.CIS Controls: key activities to prevent attacks.Consensus standards for dealing with cyber risks.
