Home > Technical Articles

How many controls are in CIS

The Center for Internet Security (CIS) provides a comprehensive set of guidelines known as the CIS Controls, which are designed to help organizations strengthen their cybersecurity. These controls serve as actionable recommendations for addressing and mitigating common cybersecurity threats. In this article, we will explore the different controls included in CIS and provide an easy-to-understand of their importance.

Understanding the CIS Controls

CIS Controls are organized into three distinct categories: Basic, Foundational, and Organizational. Each category represents a specific level of cybersecurity maturity, allowing organizations to focus on building a solid foundation before moving on to more advanced controls.

The Basic Controls consist of six essential measures that provide immediate protection against the most prevalent and damaging cyber attacks. These include inventory and control of hardware assets, inventory and control of software assets, continuous vulnerability management, controlled use of administrative privileges, secure configuration for hardware and software, and maintenance, monitoring, and analysis of audit logs.

The Foundational Controls, numbering 11 in total, dig deeper into security practices by focusing on areas like email and web browser protections, malware defenses, and data recovery capabilities. These controls aim to address the most commonly exploited vulnerabilities across various industries.

The Organizational Controls, the final set of controls, emphasize the importance of governance, risk management, and compliance. These include areas such as personnel security, security awareness training, and incident response planning, among others. By implementing these controls, organizations can ensure a holistic approach to cybersecurity that engages not only technology but also people and processes.

The Significance of CIS Controls

CIS Controls provide a standardized framework that assists organizations in protecting their valuable assets from cyber threats. By following these controls, companies can reduce their attack surface, enhance their cybersecurity posture, and minimize the impact of potential breaches.

Moreover, implementing the CIS Controls can help organizations meet regulatory requirements and industry standards. Compliance with these controls demonstrates a commitment to robust cybersecurity practices, which is critical in today's digital landscape where data breaches and cyber attacks are increasingly common.

Additionally, CIS Controls provide organizations with a roadmap for ongoing cybersecurity improvement. By adopting these controls as part of their cybersecurity strategy, businesses can establish a systematic and proactive approach to threat mitigation, enabling them to stay one step ahead of emerging cyber threats.

In Conclusion

The CIS Controls offer organizations a comprehensive set of guidelines to enhance their cybersecurity defenses. By leveraging a structured framework, companies can strengthen their security posture, mitigate risks, and protect their valuable assets. Whether an organization is just starting its cybersecurity journey or looking to bolster its existing measures, the CIS Controls provide invaluable recommendations that can significantly reduce vulnerabilities and improve overall resilience.


Contact: Nina She

Phone: +86-13751010017

Tel: +86-755-33168386

Email: sales@china-gauges.com

Add: 1F Junfeng Building, Gongle, Xixiang, Baoan District, Shenzhen, Guangdong, China

Scan the qr codeClose
the qr code