CIS Control Mappings Info

Modified on Tue, Jul 29 at 1:50 PM

Check out the CIS Controls Navigator for more insight into CIS Controls and Mappings.

https://www.cisecurity.org/controls/cis-controls-navigator

CIS-Controls-Navigator-E…

We have the Excel version of the ConnectSecure CIS Control mapping file for download here:

CSCIS_Mappings.xlsx

CIS-Controls-V8-1536x1188.png

Control

SubControl

IG

SubControl Description

Coverage

1

1

1

Establish and Maintain Detailed Enterprise Asset Inventory

Facilitates

1

2

1

Address Unauthorized Assets

Facilitates

1

3

2

Utilize an Active Discovery Tool

Partial

1

4

2

Use DHCP Logging to update asset inventory

1

5

3

Use a Passive Asset Discovery Tool

2

1

1

Establish and Maintain a Software Inventory

Facilitates

2

2

1

Ensure Authorized Software is Currently Supported

Facilitates

2

3

1

Address Unauthorized Software

Facilitates

2

4

2

Utilize Automated Software Inventory Tools

Partial

2

5

2

Allowlist Authorized Software

Facilitates

2

6

2

Allowlist Authorized Libraries

2

7

3

Allowlist Authorized Scripts

3

1

1

Establish and Maintain a Data Management Process

3

2

1

Establish and Maintain a Data Inventory

Facilitates

3

3

1

Configure Data Access Control Lists

3

4

1

Enforce Data Retention

3

5

1

Securely Dispose of Data

3

6

1

Encrypt Data on End-User Devices

3

7

2

Establish and Maintain a Data Classification Scheme

3

8

2

Document Data Flows

3

9

2

Encrypt Data on Removable Media

3

10

2

Encrypt Sensitive Data In Transit

3

11

2

Encrypt Sensitive Data at Rest

3

12

2

Segment Data Processing and Storage Based on Sensitivity

3

13

3

Deploy a Data Loss Prevention Solution

Facilitates

3

14

3

Log Sensitive Data Access

4

1

1

Establish and Maintain a Secure Configuration Process

Facilitates

4

2

1

Establish and Maintain a Secure Configuration Process for Network Infrastructure

4

3

1

Configure Automatic Session Locking on Enterprise Assets

Facilitates

4

4

1

Implement and Manage a Firewall on Servers

Facilitates

4

5

1

Implement and Manage a Firewall on End-User Devices

Facilitates

4

6

1

Securely Manage Enterprise Assets and Software

4

7

1

Manage Default Accounts on Enterprise Assets and Software

Facilitates

4

8

2

Uninstall or Disable Unnecessary Services on Enterprise Assets and Software

Facilitates

4

9

2

Configure Trusted DNS Servers on Enterprise Assets

4

10

2

Enforce Automatic Device Lockout on Portable End-User Devices

Facilitates

4

11

2

Enforce Remote Wipe Capability on Portable End-User Devices

4

12

3

Separate Enterprise Workspaces on Mobile End-User Devices

5

1

1

Establish and Maintain an Inventory of Accounts

Facilitates

5

2

1

Use Unique Passwords

Facilitates

5

3

1

Disable Dormant Accounts

Facilitates

5

4

1

Restrict Administrator Privileges to Dedicated Administrator Accounts

5

5

2

Establish and Maintain an Inventory of Service Accounts

Facilitates

5

6

2

Centralize Account Management

6

1

1

Establish an Access Granting Process

6

2

1

Establish an Access Revoking Process

6

3

1

Require MFA for Externally-Exposed Applications

6

4

1

Require MFA for Remote Network Access

6

5

1

Require MFA for Administrative Access

6

6

2

Establish and Maintain an Inventory of Authentication and Authorization Systems

6

7

2

Centralize Access Control

6

8

3

Define and Maintain Role-Based Access Control

7

1

1

Establish and Maintain a Vulnerability Management Process

Facilitates

7

2

1

Establish and Maintain a Remediation Process

Facilitates

7

3

1

Perform Automated Operating System Patch Management

Partial

7

4

1

Perform Automated Application Patch Management

Partial

7

5

2

Perform Automated Vulnerability Scans of Internal Enterprise Assets

Fully

7

6

2

Perform Automated Vulnerability Scans of Externally-Exposed Enterprise Assets

Fully

7

7

2

Remediate Detected Vulnerabilities

Partial

8

1

1

Establish and Maintain an Audit Log Management Process

8

2

1

Collect Audit Logs

8

3

1

Ensure Adequate Audit Log Storage

8

4

2

Standardize Time Synchronization

Facilitates

8

5

2

Collect Detailed Audit Logs

8

6

2

Collect DNS Query Audit Logs

8

7

2

Collect URL Request Audit Logs

8

8

2

Collect Command-Line Audit Logs

8

9

2

Centralize Audit Logs

8

10

2

Retain Audit Logs

8

11

2

Conduct Audit Log Reviews

8

12

3

Collect Service Provider Logs

9

1

1

Ensure Use of Only Fully Supported Browsers and Email Clients

Facilitates

9

2

1

Use DNS Filtering Services

9

3

2

Maintain and Enforce Network-Based URL Filters

9

4

2

Restrict Unnecessary or Unauthorized Browser and Email Client Extensions

9

5

2

Implement DMARC

9

6

2

Block Unnecessary File Types

9

7

3

Deploy and Maintain Email Server Anti-Malware Protections

10

1

1

Deploy and Maintain Anti-Malware Software

10

2

1

Configure Automatic Anti-Malware Signature Updates

10

3

1

Disable Autorun and Autoplay for Removable Media

10

4

2

Configure Automatic Anti-Malware Scanning of Removable Media

10

5

2

Enable Anti-Exploitation Features

10

6

2

Centrally Manage Anti-Malware Software

10

7

3

Use Behavior-Based Anti-Malware Software

11

1

1

Establish and Maintain a Data Recovery Process

11

2

1

Perform Automated Backups

11

3

1

Protect Recovery Data

11

4

1

Establish and Maintain an Isolated Instance of Recovery Data

11

5

2

Test Data Recovery

12

1

1

Ensure Network Infrastructure is Up-to-Date

Facilitates

12

2

2

Establish and Maintain a Secure Network Architecture

12

3

2

Securely Manage Network Infrastructure

12

4

2

Establish and Maintain Architecture Diagram(s)

12

5

2

Centralize Network Authentication, Authorization, and Auditing (AAA)

12

6

2

Use of Secure Network Management and Communication Protocols

12

7

2

Ensure Remote Devices Utilize a VPN and are Connecting to an Enterprise’s AAA Infrastructure

12

8

3

Establish and Maintain Dedicated Computing Resources for All Administrative Work

13

1

2

Centralize Security Event Alerting

13

2

2

Deploy a Host-Based Intrusion Detection Solution

13

3

2

Deploy a Network Intrusion Detection Solution

13

4

2

Perform Traffic Filtering Between Network Segments

13

5

2

Manage Access Control for Remote Assets

13

6

2

Collect Network Traffic Flow Logs

13

7

3

Deploy a Host-Based Intrusion Prevention Solution

13

8

3

Deploy a Network Intrusion Prevention Solution

13

9

3

Deploy Port-Level Access Control

13

10

3

Perform Application Layer Filtering

13

11

3

Tune Security Event Alerting Thresholds

14

1

1

Establish and Maintain a Security Awareness Program

14

2

1

Train Workforce Members to Recognize Social Engineering Attacks

14

3

1

Train Workforce Members on Authentication Best Practices

14

4

1

Train Workforce on Data Handling Best Practices

14

5

1

Train Workforce Members on Causes of Unintentional Data Exposure

14

6

1

Train Workforce Members on Recognizing and Reporting Security Incidents

14

7

1

Train Workforce on How to Identify and Report if Their Enterprise Assets are Missing Security Updates

14

8

1

Train Workforce on the Dangers of Connecting to and Transmitting Enterprise Data Over Insecure Networks

14

9

2

Conduct Role-Specific Security Awareness and Skills Training

15

1

1

Establish and Maintain an Inventory of Service Providers

15

2

2

Establish and Maintain a Service Provider Management Policy

15

3

2

Classify Service Providers

15

4

2

Ensure Service Provider Contracts Include Security Requirements

15

5

3

Assess Service Providers

15

6

3

Monitor Service Providers

15

7

3

Securely Decommission Service Providers

16

1

2

Establish and Maintain a Secure Application Development Process

16

2

2

Establish and Maintain a Process to Accept and Address Software Vulnerabilities

16

3

2

Perform Root Cause Analysis on Security Vulnerabilities

16

4

2

Establish and Manage an Inventory of Third-Party Software Components

16

5

2

Use Up-to-Date and Trusted Third-Party Software Components

16

6

2

Establish and Maintain a Severity Rating System and Process for Application Vulnerabilities

16

7

2

Use Standard Hardening Configuration Templates for Application Infrastructure

16

8

2

Separate Production and Non-Production Systems

16

9

2

Train Developers in Application Security Concepts and Secure Coding

16

10

2

Apply Secure Design Principles in Application Architectures

16

11

2

Leverage Vetted Modules or Services for Application Security Components

16

12

3

Implement Code-Level Security Checks

16

13

3

Conduct Application Penetration Testing

16

14

3

Conduct Threat Modeling

17

1

1

Designate Personnel to Manage Incident Handling

17

2

1

Establish and Maintain Contact Information for Reporting Security Incidents

17

3

1

Establish and Maintain an Enterprise Process for Reporting Incidents

17

4

2

Establish and Maintain an Incident Response Process

17

5

2

Assign Key Roles and Responsibilities

17

6

2

Define Mechanisms for Communicating During Incident Response

17

7

2

Conduct Routine Incident Response Exercises

17

8

2

Conduct Post-Incident Reviews

17

9

3

Establish and Maintain Security Incident Thresholds

18

1

2

Establish and Maintain a Penetration Testing Program

18

2

2

Perform Periodic External Penetration Tests

18

3

2

Remediate Penetration Test Findings

18

4

3

Validate Security Measures

18

5

3

Perform Periodic Internal Penetration Tests

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article