CIS Controls

Prioritised baseline security controls for protecting IT assets and reducing risk.

CIS Controls is a prioritised set of technical security controls used as a baseline by IT teams. It sits at the operational control layer and focuses on actions such as asset inventory, access management, patching and monitoring.

Putting the Controls into practice brings practical choices: which controls to implement first, how to map them across mixed on‑prem and cloud estates, and how to measure effectiveness. Resource limits and existing tooling often require tailoring the controls to local operations.

CIS Controls: Access and Privileged Security

Defines controls for access restrictions, privileged account management, authentication and authorisation enforcement.

Audit evidence for CIS Controls

Gather logs, configuration snapshots and reports to demonstrate alignment with CIS Controls and support audit inquiries.

CIS Controls: data protection and handling

Measures in CIS Controls covering data classification, secure transfer, retention and controlled handling to reduce exposure from weak processes.

CIS Controls for governance and compliance

Use CIS Controls to define oversight, assign accountability and map technical controls to policy and compliance requirements.

Where CIS Controls fits

The Controls connect directly to identity, endpoint, network and logging systems. They inform configuration standards, vulnerability management and the telemetry teams should collect.

They must be considered across IT because they affect responsibilities for controls, change testing and how incidents are investigated internally. Using the Controls helps technical teams target the highest operational risks within current processes.

Discuss your CIS Controls implementation