• Verified
  • CIS Control Mappings Info

    Check out the CIS Controls Navigator for more insight into CIS Controls and Mappings.

    https://www.cisecurity.org/controls/cis-controls-navigator

    We have the Excel version of the ConnectSecure CIS Control mapping file for download here:

    CIS-Controls-V8-1536x1188.png

    Control

    SubControl

    IG

    SubControl Description

    Coverage

    Control

    SubControl

    IG

    SubControl Description

    Coverage

    1

    1

    1

    Establish and Maintain Detailed Enterprise Asset Inventory

    Facilitates

    1

    2

    1

    Address Unauthorized Assets

    Facilitates

    1

    3

    2

    Utilize an Active Discovery Tool

    Partial

    1

    4

    2

    Use DHCP Logging to update asset inventory

     

    1

    5

    3

    Use a Passive Asset Discovery Tool

     

    2

    1

    1

    Establish and Maintain a Software Inventory

    Facilitates

    2

    2

    1

    Ensure Authorized Software is Currently Supported

    Facilitates

    2

    3

    1

    Address Unauthorized Software

    Facilitates

    2

    4

    2

    Utilize Automated Software Inventory Tools

    Partial

    2

    5

    2

    Allowlist Authorized Software

    Facilitates

    2

    6

    2

    Allowlist Authorized Libraries

     

    2

    7

    3

    Allowlist Authorized Scripts

     

    3

    1

    1

    Establish and Maintain a Data Management Process

     

    3

    2

    1

    Establish and Maintain a Data Inventory

    Facilitates

    3

    3

    1

    Configure Data Access Control Lists

     

    3

    4

    1

    Enforce Data Retention

     

    3

    5

    1

    Securely Dispose of Data

     

    3

    6

    1

    Encrypt Data on End-User Devices

     

    3

    7

    2

    Establish and Maintain a Data Classification Scheme

     

    3

    8

    2

    Document Data Flows

     

    3

    9

    2

    Encrypt Data on Removable Media

     

    3

    10

    2

    Encrypt Sensitive Data In Transit

     

    3

    11

    2

    Encrypt Sensitive Data at Rest

     

    3

    12

    2

    Segment Data Processing and Storage Based on Sensitivity

     

    3

    13

    3

    Deploy a Data Loss Prevention Solution

    Facilitates

     

    3

    14

    3

    Log Sensitive Data Access

     

    4

    1

    1

    Establish and Maintain a Secure Configuration Process

    Facilitates

     

    4

    2

    1

    Establish and Maintain a Secure Configuration Process for Network Infrastructure

     

    4

    3

    1

    Configure Automatic Session Locking on Enterprise Assets

    Facilitates

    4

    4

    1

    Implement and Manage a Firewall on Servers

    Facilitates

     

    4

    5

    1

    Implement and Manage a Firewall on End-User Devices

    Facilitates

    4

    6

    1

    Securely Manage Enterprise Assets and Software

     

    4

    7

    1

    Manage Default Accounts on Enterprise Assets and Software

    Facilitates

    4

    8

    2

    Uninstall or Disable Unnecessary Services on Enterprise Assets and Software

    Facilitates

    4

    9

    2

    Configure Trusted DNS Servers on Enterprise Assets

     

    4

    10

    2

    Enforce Automatic Device Lockout on Portable End-User Devices

    Facilitates

    4

    11

    2

    Enforce Remote Wipe Capability on Portable End-User Devices

     

    4

    12

    3

    Separate Enterprise Workspaces on Mobile End-User Devices

     

    5

    1

    1

    Establish and Maintain an Inventory of Accounts

    Facilitates

    5

    2

    1

    Use Unique Passwords

    Facilitates

    5

    3

    1

    Disable Dormant Accounts

    Facilitates

    5

    4

    1

    Restrict Administrator Privileges to Dedicated Administrator Accounts

     

    5

    5

    2

    Establish and Maintain an Inventory of Service Accounts

    Facilitates

    5

    6

    2

    Centralize Account Management

     

    6

    1

    1

    Establish an Access Granting Process

     

    6

    2

    1

    Establish an Access Revoking Process

     

    6

    3

    1

    Require MFA for Externally-Exposed Applications

     

    6

    4

    1

    Require MFA for Remote Network Access

     

    6

    5

    1

    Require MFA for Administrative Access

     

    6

    6

    2

    Establish and Maintain an Inventory of Authentication and Authorization Systems

     

    6

    7

    2

    Centralize Access Control

     

    6

    8

    3

    Define and Maintain Role-Based Access Control

     

    7

    1

    1

    Establish and Maintain a Vulnerability Management Process

    Facilitates

    7

    2

    1

    Establish and Maintain a Remediation Process

    Facilitates

    7

    3

    1

    Perform Automated Operating System Patch Management

    Partial

    7

    4

    1

    Perform Automated Application Patch Management

    Partial

    7

    5

    2

    Perform Automated Vulnerability Scans of Internal Enterprise Assets

    Fully

    7

    6

    2

    Perform Automated Vulnerability Scans of Externally-Exposed Enterprise Assets

    Fully

    7

    7

    2

    Remediate Detected Vulnerabilities

    Partial

    8

    1

    1

    Establish and Maintain an Audit Log Management Process

     

    8

    2

    1

    Collect Audit Logs

     

    8

    3

    1

    Ensure Adequate Audit Log Storage

     

    8

    4

    2

    Standardize Time Synchronization

    Facilitates

    8

    5

    2

    Collect Detailed Audit Logs

     

    8

    6

    2

    Collect DNS Query Audit Logs

     

    8

    7

    2

    Collect URL Request Audit Logs

     

    8

    8

    2

    Collect Command-Line Audit Logs

     

    8

    9

    2

    Centralize Audit Logs

     

    8

    10

    2

    Retain Audit Logs

     

    8

    11

    2

    Conduct Audit Log Reviews

     

    8

    12

    3

    Collect Service Provider Logs

     

    9

    1

    1

    Ensure Use of Only Fully Supported Browsers and Email Clients

    Facilitates

    9

    2

    1

    Use DNS Filtering Services

     

    9

    3

    2

    Maintain and Enforce Network-Based URL Filters

     

    9

    4

    2

    Restrict Unnecessary or Unauthorized Browser and Email Client Extensions

     

    9

    5

    2

    Implement DMARC

     

    9

    6

    2

    Block Unnecessary File Types

     

    9

    7

    3

    Deploy and Maintain Email Server Anti-Malware Protections

     

    10

    1

    1

    Deploy and Maintain Anti-Malware Software

     

    10

    2

    1

    Configure Automatic Anti-Malware Signature Updates

     

    10

    3

    1

    Disable Autorun and Autoplay for Removable Media

     

    10

    4

    2

    Configure Automatic Anti-Malware Scanning of Removable Media

     

    10

    5

    2

    Enable Anti-Exploitation Features

     

    10

    6

    2

    Centrally Manage Anti-Malware Software

     

    10

    7

    3

    Use Behavior-Based Anti-Malware Software

     

    11

    1

    1

    Establish and Maintain a Data Recovery Process

     

    11

    2

    1

    Perform Automated Backups

     

    11

    3

    1

    Protect Recovery Data

     

    11

    4

    1

    Establish and Maintain an Isolated Instance of Recovery Data

     

    11

    5

    2

    Test Data Recovery

     

    12

    1

    1

    Ensure Network Infrastructure is Up-to-Date

    Facilitates

    12

    2

    2

    Establish and Maintain a Secure Network Architecture

     

    12

    3

    2

    Securely Manage Network Infrastructure

     

    12

    4

    2

    Establish and Maintain Architecture Diagram(s)

     

    12

    5

    2

    Centralize Network Authentication, Authorization, and Auditing (AAA)

     

    12

    6

    2

    Use of Secure Network Management and Communication Protocols

     

    12

    7

    2

    Ensure Remote Devices Utilize a VPN and are Connecting to an Enterprise’s AAA Infrastructure

     

    12

    8

    3

    Establish and Maintain Dedicated Computing Resources for All Administrative Work

     

    13

    1

    2

    Centralize Security Event Alerting

     

    13

    2

    2

    Deploy a Host-Based Intrusion Detection Solution

     

    13

    3

    2

    Deploy a Network Intrusion Detection Solution

     

    13

    4

    2

    Perform Traffic Filtering Between Network Segments

     

    13

    5

    2

    Manage Access Control for Remote Assets

     

    13

    6

    2

    Collect Network Traffic Flow Logs

     

    13

    7

    3

    Deploy a Host-Based Intrusion Prevention Solution

     

    13

    8

    3

    Deploy a Network Intrusion Prevention Solution

     

    13

    9

    3

    Deploy Port-Level Access Control

     

    13

    10

    3

    Perform Application Layer Filtering

     

    13

    11

    3

    Tune Security Event Alerting Thresholds

     

    14

    1

    1

    Establish and Maintain a Security Awareness Program

     

    14

    2

    1

    Train Workforce Members to Recognize Social Engineering Attacks

     

    14

    3

    1

    Train Workforce Members on Authentication Best Practices

     

    14

    4

    1

    Train Workforce on Data Handling Best Practices

     

    14

    5

    1

    Train Workforce Members on Causes of Unintentional Data Exposure

     

    14

    6

    1

    Train Workforce Members on Recognizing and Reporting Security Incidents

     

    14

    7

    1

    Train Workforce on How to Identify and Report if Their Enterprise Assets are Missing Security Updates

     

    14

    8

    1

    Train Workforce on the Dangers of Connecting to and Transmitting Enterprise Data Over Insecure Networks

     

    14

    9

    2

    Conduct Role-Specific Security Awareness and Skills Training

     

    15

    1

    1

    Establish and Maintain an Inventory of Service Providers

     

    15

    2

    2

    Establish and Maintain a Service Provider Management Policy

     

    15

    3

    2

    Classify Service Providers

     

    15

    4

    2

    Ensure Service Provider Contracts Include Security Requirements

     

    15

    5

    3

    Assess Service Providers

     

    15

    6

    3

    Monitor Service Providers

     

    15

    7

    3

    Securely Decommission Service Providers

     

    16

    1

    2

    Establish and Maintain a Secure Application Development Process

     

    16

    2

    2

    Establish and Maintain a Process to Accept and Address Software Vulnerabilities

     

    16

    3

    2

    Perform Root Cause Analysis on Security Vulnerabilities

     

    16

    4

    2

    Establish and Manage an Inventory of Third-Party Software Components

     

    16

    5

    2

    Use Up-to-Date and Trusted Third-Party Software Components

     

    16

    6

    2

    Establish and Maintain a Severity Rating System and Process for Application Vulnerabilities

     

    16

    7

    2

    Use Standard Hardening Configuration Templates for Application Infrastructure

     

    16

    8

    2

    Separate Production and Non-Production Systems

     

    16

    9

    2

    Train Developers in Application Security Concepts and Secure Coding

     

    16

    10

    2

    Apply Secure Design Principles in Application Architectures

     

    16

    11

    2

    Leverage Vetted Modules or Services for Application Security Components

     

    16

    12

    3

    Implement Code-Level Security Checks

     

    16

    13

    3

    Conduct Application Penetration Testing

     

    16

    14

    3

    Conduct Threat Modeling

     

    17

    1

    1

    Designate Personnel to Manage Incident Handling

     

    17

    2

    1

    Establish and Maintain Contact Information for Reporting Security Incidents

     

    17

    3

    1

    Establish and Maintain an Enterprise Process for Reporting Incidents

     

    17

    4

    2

    Establish and Maintain an Incident Response Process

     

    17

    5

    2

    Assign Key Roles and Responsibilities

     

    17

    6

    2

    Define Mechanisms for Communicating During Incident Response

     

    17

    7

    2

    Conduct Routine Incident Response Exercises

     

    17

    8

    2

    Conduct Post-Incident Reviews

     

    17

    9

    3

    Establish and Maintain Security Incident Thresholds

     

    18

    1

    2

    Establish and Maintain a Penetration Testing Program

     

    18

    2

    2

    Perform Periodic External Penetration Tests

     

    18

    3

    2

    Remediate Penetration Test Findings

     

    18

    4

    3

    Validate Security Measures

     

    18

    5

    3

    Perform Periodic Internal Penetration Tests

     

     

     

     

     

    Â