What are the CIS Critical Security Controls

The CIS Critical Security Controls (CIS Controls) are a set of internationally recognised guidelines designed to help organisations improve their cybersecurity posture. The CIS Controls cover 20 critical areas of focus, including inventory and control of hardware and software assets, continuous vulnerability management, and secure configuration of network devices.

Woman using reliable and efficient managed internet services

Using CIS cybersecurity controls within your organisation

Embracing CIS cybersecurity controls within your organisation offers a multitude of invaluable benefits that bolster your overall cybersecurity resilience. These controls, meticulously curated by cybersecurity experts, provide a comprehensive and adaptable framework designed to address the ever-evolving threat landscape.

Protecting over 350 businesses for 20 years

Empire Technologies is trusted by some the world’s leading organisations, for example, AWS.Empire Technologies is trusted by some the world’s leading organisations, for example, Veeam.Empire Technologies is trusted by some the world’s leading organisations, for example, vmwear.Empire Technologies is trusted by some the world’s leading organisations, for example, Mircrosoft.Empire Technologies is trusted by some the world’s leading organisations, for example, SOPHOS cyber security.Empire Technologies is trusted by some the world’s leading organisations, for example, Vocus.Empire Technologies is trusted by some the world’s leading organisations, for example, Fortinet.Empire Technologies is trusted by some the world’s leading organisations, for example, Pure Storage.Empire Technologies is trusted by some the world’s leading organisations, for example, Sentinal One.

Connect with a cyber security consultant to discuss how we can help secure your business

Enhanced Protection

CIS controls provide a robust framework to safeguard systems against cyber threats.

Improved Compliance

Aligning with CIS controls helps meet industry regulations and standards.

Risk Reduction

Implementing CIS controls minimises vulnerabilities, reducing the risk of cyber incidents.

Examples of some key CIS security controls include

The CIS Controls are divided into three main categories: Basic, Foundational, and Organisational. Each control within these categories plays a crucial role in enhancing your organisation’s cybersecurity posture by addressing specific aspects of risk management, threat detection, incident response, and overall resilience. These controls offer a structured and adaptable approach, allowing you to prioritise and implement measures that align with your organisation’s unique operational environment and risk profile.

CIS controls - Control 1: Inventory and Control of Hardware Assets.

Control 1: Inventory and Control of Hardware Assets

Ensuring that all hardware is authorised and tracked to prevent unauthorised devices from being added to the network.

CIS controls - Control 6: Maintenance, Monitoring, and Analysis of Audit Logs.

Control 6: Maintenance, Monitoring, and Analysis of Audit Logs

Ensuring that all logs are collected and monitored regularly to detect any suspicious activity.

IT support Sydney managed internet services.

Control 11: Secure Configuration for Network Devices

Such as Firewalls, Routers, and Switches – ensuring that all network devices are securely configured to prevent unauthorised access.

CIS controls - Control 17: Implement a Security Awareness and Training Program.

Control 17: Implement a Security Awareness and Training Program

Ensuring that all employees receive regular security training to reduce the risk of human error and prevent social engineering attacks.

Hear from our clients

Author
starstarstarstarstar
Author
starstarstarstarstar
Author
starstarstarstarstar
Author
starstarstarstarstar
Author
starstarstarstarstar

Cyber Security Solutions

Safeguard your business against cyber threats with the expertise of our dedicated team of cyber security specialists. Future-proof your brand with comprehensive cyber security solutions tailored to protect your assets and ensure secure operations.

Frequently asked questions

  • How many CIS Controls are there

  • How to implement CIS Controls

  • What are the latest CIS Controls v8

  • What was changed in CIS controls version 8 release

  • CIS controls explained

Contact our team
This field is for validation purposes and should be left unchanged.