Center for Internet Security

The Center for Internet Security (CIS) is a nonprofit organization dedicated to improving cybersecurity across public and private sectors. CIS provides a range of resources, including the CIS Controls and the CIS Benchmarks, to help organizations enhance their security posture.

The CIS Controls, also known as the CIS Critical Security Controls (CIS CSC), are a set of best practices for securing IT systems and data against cyber threats. The CIS Benchmarks are configuration guidelines for securing various technologies, including operating systems, cloud providers, and network devices.

Who is CIS For?

CIS resources are designed for a wide range of organizations, including:

  • Public Sector: Government agencies at the federal, state, and local levels looking to standardize and improve their cybersecurity practices.
  • Private Sector: Businesses of all sizes and industries seeking to protect their information assets and reduce the risk of cyber incidents.
  • Healthcare: Organizations needing to secure sensitive patient data and comply with regulations such as HIPAA.
  • Education: Schools and universities aiming to safeguard student and staff information.
  • Nonprofits: Mission-driven organizations requiring cost-effective cybersecurity solutions.
  • Critical Infrastructure: Sectors like energy, finance, and transportation needing to protect essential services and assets.

 

CIS Control Families

The CIS Controls are grouped into 18 control families, each addressing a specific area of cybersecurity. These controls are prioritized to provide a clear starting point for improving cybersecurity defenses.

The control families are:

  1. Inventory and Control of Enterprise Assets
    Actively manage all hardware devices on the network.
    • Inventory and Control of Software Assets
      Actively manage all software on the network.
      • Data Protection
        Ensure sensitive data is protected at rest and in transit.
        • Secure Configuration of Enterprise Assets and Software
          Establish security configurations for hardware and software.
          • Account Management
            Control access to assets through management of user accounts.
            • Access Control Management
              Limit and manage access to sensitive information.
              • Continuous Vulnerability Management
                Continuously acquire, assess, and act on information about vulnerabilities.
                • Audit Log Management
                  Collect, manage, and analyze audit logs to detect and understand security incidents.
                  • Email and Web Browser Protections
                    Secure email and web browser use to reduce exposure to malicious content.
                    • Malware Defenses
                      Control the installation, spread, and execution of malicious code.
                      • Data Recovery
                        Ensure the integrity and availability of data by implementing appropriate data backup processes.
                        • Network Infrastructure Management
                          Manage and secure network devices to prevent unauthorized access.
                          • Security Awareness and Skills Training
                            Educate users on security policies and best practices.
                            • Service Provider Management
                              Secure outsourced IT services and ensure service providers meet security requirements.
                              • Application Software Security
                                Manage security of software development lifecycle and applications.
                                • Incident Response Management
                                  Develop and implement incident response capabilities.
                                  • Penetration Testing
                                    Test and verify the effectiveness of security controls through simulated attacks.
                                    • Security Incident Management
                                      Ensure timely detection and response to security incidents.

                                     

                                      CIS Implementation Groups

                                      CIS Controls are organized into three Implementation Groups (IGs), which help organizations prioritize controls based on their resources and risk exposure:

                                      • Implementation Group 1 (IG1)
                                        Focuses on essential cyber hygiene and is intended for small to medium-sized enterprises (SMEs) with limited IT and cybersecurity resources. These controls are foundational and offer the highest return on investment.
                                        • Implementation Group 2 (IG2)
                                          Designed for organizations with moderate resources and higher sensitivity to risk. This group builds on IG1 and includes additional controls that address more sophisticated threats and compliance requirements.
                                          • Implementation Group 3 (IG3)
                                            Aimed at larger organizations with substantial resources and a higher risk profile. IG3 encompasses all the controls from IG1 and IG2, adding more advanced security measures and practices to counter targeted and persistent threats.

                                            Our Services

                                            vCISO and Fractional Security Analysts

                                            vCISO and Fractional Security Analysts

                                            Enhance security leadership and strategy with experienced professionals through one-time projects or continued engagements.
                                            Gap and Risk Assessments

                                            Gap and Risk Assessments

                                            Identify vulnerabilities and gaps in your security posture with our comprehensive assessments designed to not disrupt your operations.

                                            Framework Deployment Programs

                                            Framework Deployment Programs

                                            Establish security frameworks through a comprehensive year-long assessment and training program, either individually or with a cohort of your peers.

                                            GRC Platform

                                            Apptega GRC Platform

                                            Make the most of Apptega’s powerful Governance, Risk, and Compliance (GRC) tool to effectively manage and maintain your security program utilizing its user-friendly interface.

                                            Implementation Support

                                            Implementation Support

                                            Certified assistance in planning and implementing best practices and solutions to mature your security posture.

                                            Meet the Team

                                            Art Provost

                                            Art Provost

                                            Art, with 30 years of experience in Information Security across diverse roles, joined Filament in 2011 and holds multiple certifications, including CISSP, GSEC, GPEN, GWAPT, and CISM.

                                            Tyler Malcom

                                            Tyler Malcom

                                            Tyler, who joined Filament in 2022, has a strong background in cyber defense and offensive operations from his time in the US Navy and holds CISSP and GSEC certifications.

                                            Keri Kunkle

                                            Keri Kunkle

                                            Keri, who joined Filament in 2023, is a seasoned cybersecurity professional with experience in the US Marine Corps and Department of Defense, holding multiple certifications and advanced degrees in cybersecurity.

                                            Expert Help is On the Way

                                            Schedule a Free Discovery Call

                                            Explore your organization’s future with a quick conversation with Filament Information Security services.

                                            Contact us today to learn more about how we can help you achieve your security goals.