Center for Internet Security
The Center for Internet Security (CIS) is a nonprofit organization dedicated to improving cybersecurity across public and private sectors. CIS provides a range of resources, including the CIS Controls and the CIS Benchmarks, to help organizations enhance their security posture.
The CIS Controls, also known as the CIS Critical Security Controls (CIS CSC), are a set of best practices for securing IT systems and data against cyber threats. The CIS Benchmarks are configuration guidelines for securing various technologies, including operating systems, cloud providers, and network devices.
Who is CIS For?
CIS resources are designed for a wide range of organizations, including:
- Public Sector: Government agencies at the federal, state, and local levels looking to standardize and improve their cybersecurity practices.
- Private Sector: Businesses of all sizes and industries seeking to protect their information assets and reduce the risk of cyber incidents.
- Healthcare: Organizations needing to secure sensitive patient data and comply with regulations such as HIPAA.
- Education: Schools and universities aiming to safeguard student and staff information.
- Nonprofits: Mission-driven organizations requiring cost-effective cybersecurity solutions.
- Critical Infrastructure: Sectors like energy, finance, and transportation needing to protect essential services and assets.
CIS Control Families
The CIS Controls are grouped into 18 control families, each addressing a specific area of cybersecurity. These controls are prioritized to provide a clear starting point for improving cybersecurity defenses.
The control families are:
- Inventory and Control of Enterprise Assets
Actively manage all hardware devices on the network. - Inventory and Control of Software Assets
Actively manage all software on the network. - Data Protection
Ensure sensitive data is protected at rest and in transit. - Secure Configuration of Enterprise Assets and Software
Establish security configurations for hardware and software. - Account Management
Control access to assets through management of user accounts. - Access Control Management
Limit and manage access to sensitive information. - Continuous Vulnerability Management
Continuously acquire, assess, and act on information about vulnerabilities. - Audit Log Management
Collect, manage, and analyze audit logs to detect and understand security incidents. - Email and Web Browser Protections
Secure email and web browser use to reduce exposure to malicious content. - Malware Defenses
Control the installation, spread, and execution of malicious code. - Data Recovery
Ensure the integrity and availability of data by implementing appropriate data backup processes. - Network Infrastructure Management
Manage and secure network devices to prevent unauthorized access. - Security Awareness and Skills Training
Educate users on security policies and best practices. - Service Provider Management
Secure outsourced IT services and ensure service providers meet security requirements. - Application Software Security
Manage security of software development lifecycle and applications. - Incident Response Management
Develop and implement incident response capabilities. - Penetration Testing
Test and verify the effectiveness of security controls through simulated attacks. - Security Incident Management
Ensure timely detection and response to security incidents.
CIS Implementation Groups
CIS Controls are organized into three Implementation Groups (IGs), which help organizations prioritize controls based on their resources and risk exposure:
- Implementation Group 1 (IG1)
Focuses on essential cyber hygiene and is intended for small to medium-sized enterprises (SMEs) with limited IT and cybersecurity resources. These controls are foundational and offer the highest return on investment. - Implementation Group 2 (IG2)
Designed for organizations with moderate resources and higher sensitivity to risk. This group builds on IG1 and includes additional controls that address more sophisticated threats and compliance requirements. - Implementation Group 3 (IG3)
Aimed at larger organizations with substantial resources and a higher risk profile. IG3 encompasses all the controls from IG1 and IG2, adding more advanced security measures and practices to counter targeted and persistent threats.
Our Services
vCISO and Fractional Security Analysts
Gap and Risk Assessments
Identify vulnerabilities and gaps in your security posture with our comprehensive assessments designed to not disrupt your operations.
Framework Deployment Programs
Establish security frameworks through a comprehensive year-long assessment and training program, either individually or with a cohort of your peers.
Apptega GRC Platform
Make the most of Apptega’s powerful Governance, Risk, and Compliance (GRC) tool to effectively manage and maintain your security program utilizing its user-friendly interface.
Implementation Support
Meet the Team
Art Provost
Art, with 30 years of experience in Information Security across diverse roles, joined Filament in 2011 and holds multiple certifications, including CISSP, GSEC, GPEN, GWAPT, and CISM.
Tyler Malcom
Tyler, who joined Filament in 2022, has a strong background in cyber defense and offensive operations from his time in the US Navy and holds CISSP and GSEC certifications.
Keri Kunkle
Keri, who joined Filament in 2023, is a seasoned cybersecurity professional with experience in the US Marine Corps and Department of Defense, holding multiple certifications and advanced degrees in cybersecurity.
Expert Help is On the Way
Schedule a Free Discovery Call
Explore your organization’s future with a quick conversation with Filament Information Security services.
Contact us today to learn more about how we can help you achieve your security goals.