Cybersecurity Glossary

What is CIS Controls?

CIS Controls are a prioritized set of cybersecurity best practices published by the Center for Internet Security, designed to provide organizations with specific, actionable steps to defend against the most common and dangerous cyberattacks.

CIS Controls explained

The CIS Controls (currently in version 8) consist of 18 control groups organized by implementation priority. Unlike broader frameworks that describe security objectives, CIS Controls prescribe specific technical and procedural actions. This prescriptive nature makes them particularly valuable for organizations that need clear guidance on what to implement and in what order. The controls are organized into three Implementation Groups (IGs) based on organizational size and risk profile. IG1 contains the essential cyber hygiene controls that every organization should implement, including hardware and software inventory, data protection, secure configuration, access control management, and continuous vulnerability management. IG2 and IG3 add progressively more advanced controls for organizations with greater risk exposure or regulatory obligations. Each control includes specific safeguards with detailed implementation guidance, metrics for measuring effectiveness, and mappings to other frameworks like NIST CSF and ISO 27001. The CIS Controls community regularly updates the controls based on real-world threat data to ensure they remain effective against the current threat landscape.

Why It Matters

Why cis controls matters for your business

For SMBs that are early in their cybersecurity journey, the CIS Controls provide the clearest starting point. The Implementation Group 1 controls represent the minimum security baseline that every organization should achieve, and implementing them addresses the attack techniques used in the vast majority of successful breaches. The prescriptive, prioritized nature of CIS Controls is especially valuable for resource-constrained SMBs that cannot afford to boil the ocean. By focusing on IG1 first, businesses can achieve meaningful risk reduction with limited investment. The controls also serve as evidence of security due diligence for cyber insurance applications, client questionnaires, and regulatory compliance demonstrations.

How Cyber Defense Agent Helps

CIS Controls and Cyber Defense Agent

Cyber Defense Agent maps its security assessment findings to CIS Controls, helping you understand which controls are implemented and which have gaps. The platform focuses on the IG1 essential cyber hygiene safeguards that are most relevant to SMBs, providing specific remediation actions that move you toward full implementation of foundational security controls.

Get your Cyber Defense Score™ in 60 seconds.

100 tools. No installation. No credit card.

Get My Cyber Defense Score™ →