CIS Controls v8.1 Guide To Asset Classes 2024 09
CIS Controls v8.1 Guide To Asset Classes 2024 09
Asset Classes
CIS Critical Security
Controls v8.1
September 2024
Contents
Introduction 1
Asset Classes 2
What is an Asset Class? 2
Devices 3
What are Devices? 3
What are enterprise assets? 3
Where do remote devices fit into enterprise assets? 3
What types of environments can enterprise assets exist in? 3
What are end-user devices? 3
Are there subsets of end-user devices? 4
What other types of enterprise assets are there? 4
What is removable media? 4
Software 6
What are software assets? 6
Are there subsets of software assets? 6
Are there components of applications and operating systems? 6
Data 7
What is Data? 7
Are there Subsets of Data? 7
Users 8
What are Users? 8
Are there Subsets of Users? 8
Network 9
What is a Network? 9
Are there Subsets of Network? 9
Documentation 9
What is Documentation? 9
Are there subsets of Documentation? 9
Resources 10
CIS Controls version 8.1 (v8.1) is an iterative update to version 8. As part of our process to evolve the
CIS Controls, we establish "design principles" that guide us through any minor or major updates to
the document. Our design principles for this revision are context, clarity, and consistency. Context
enhances the scope and practical applicability of Safeguards by incorporating specific examples
and additional explanations. Clarity aligns with other major security frameworks to the extent
practical, while preserving the unique features of the CIS Controls. Consistency maintains continuity
for existing CIS Controls users, ensuring little to no change due to this update.
At the very foundation of the CIS Controls are a few critical actions that should be taken before
any other Safeguards are implemented, which surround knowing your environment. In order to
protect what you have, you first must know what you have. When implementing and auditing
the CIS Controls, there are several references to terms such as enterprise assets, software, end-
user devices, and more. CIS simplified the language in v8 to provide enterprises guidance on how
enterprise assets and software are organized in the CIS Controls and to help explain what we
mean when we say things like “Establish and Maintain Detailed Enterprise Asset Inventory.” In v8.1,
CIS restructured Asset Classes and their respective definitions to ensure consistency throughout
the Controls.
Adopters of the CIS Controls should use this guide as a reference during activities such as
implementation or auditing to verify that all in-scope assets are being accounted for and
are secured.
Asset Classes can help to classify controls into different categories based on what assets they are
protecting. An Asset Class is a group of information assets that are evaluated as one set based on
their similarity. In Controls v8.1, the Asset Classes are broken into the following categories:
• Devices
• Software
• Data
• Users
• Network
• Documentation
End-user Services
Log Service Network
Devices Policies
Libraries Data Providers Architecture
Portable APIs
Physical User
Mobile Processes
Data Accounts
Operating
Systems
Servers Administrator Procedures
Services Accounts
Internet of Libraries
Things (IoT) Service
and Non- APIs Accounts
computing
Devices
Firmware
Network
Devices
Removable
Media
A physical environment consists of hardware parts that make up a network, including cables
and routers. The hardware is required for communication and interaction between devices
on a network.
A virtualized environment simulates hardware to allow a software environment to run without the
need to use a lot of actual hardware. Virtualized environments are used to make a small number
of resources act as many—with plenty of processing, memory, storage, and network capacity.
Virtualization is a fundamental technology that allows cloud computing to work.
Portable devices are transportable, end-user devices that have the capability to wirelessly connect
to a network. Portable end-user devices can include laptops which may require external hardware
for connectivity, and mobile devices such as smartphones and tablets, all of which are a subset of
enterprise assets.
Mobile devices are small, enterprise-issued end-user devices with intrinsic wireless capability, such
as smartphones and tablets. Mobile devices are a subset of portable devices.
Non-computing and Internet of Things (IoT) devices are devices embedded with sensors,
software, and other technologies for the purpose of connecting, storing, and exchanging data with
other devices and systems over the internet. While these devices are not used for computational
processes, they support an enterprise’s ability to conduct business processes. Examples of these
devices include printers, smart screens, physical security sensors, industrial control systems, and
information technology sensors. Non-computing/IoT devices are a subset of enterprise assets.
Servers are devices or systems that provide resources, data, services, or programs to other devices
on either a local area network or wide area network. Servers can provide resources and use them
from another system at the same time. Servers can exist in datacenters, public/private/hybrid
cloud environments, including temporal containers or serverless workloads. Examples include web
servers, application servers, mail servers, and file servers. Servers are a subset of enterprise assets.
Figures 2 and 3 shows a high-level chart of how enterprise assets and removable media are
categorized in CIS Controls v8.1. Cells in white are examples of the enterprise asset subsets and are
not meant to represent an exhaustive list.
Non-computing/
End-user Devices Network Devices Servers IoT Devices
Removable Media
CDs, DVDs, External Hard Drives SD Cards Tape Backups Diskettes USB Drives
Blue-ray Discs
An operating system is software on enterprise assets that manages computer hardware and
software resources, and provides common services for programs. Operating systems are considered
a software asset and can be single- and multi-tasking, single- and multi-user, distributed, templated,
embedded, real-time, and library. Operating systems are a subset of software.
Firmware is software stored within a device’s non-volatile memory, such as ROM or flash memory,
used to allow different types of hardware to communicate with the operating system. Firmware is
often updated outside of the enterprise’s operating system and application software update process.
Firmware is a subset of software.
A service refers to specialized programs that perform well-defined critical tasks for the operating
system. Services often start with the operating system, run in the background, and can be stopped
and started by users. Example services include managing network communications, users, file
permissions, system security, and device interaction.
An Application Programming Interface (API) is a set of rules and interfaces for software
components to interact with each other in a standardized way. APIs allow applications to access and
communicate with both internal and external resources.
Figure 4 shows a high-level chart of how software assets are categorized in v8.1 of the CIS Controls.
Enterprise Assets
CONTAIN
Software Assets
SUBSETS
CONTAINED WITHIN
Data
What is Data?
Data is a collection of facts that can be examined, considered, and used for decision-making.
Although data may be physical, the CIS Controls primarily provide protection for digital data that
may be stored, transferred, and processed by enterprise assets.
Sensitive Data is physical or digital data stored, processed, or managed by the enterprise that must
be kept private, accurate, reliable, and available. If released or destroyed in an unauthorized manner,
it would cause harm to the enterprise or its customers. These impacts may be due to a data breach
or a violation of a policy, contract, or regulation.
Log Data is a computer-generated data file that records the events occurring within the enterprise.
Examples of logs include: operating system, anti-malware detection, database, application, network,
firewall, web server, or access control logs (e.g., electronic locks, alarm system).
Physical Data is data that is stored in physical documents or stored on physical types of removable
devices (e.g., USB drives, tape backups). Physical data may be sensitive or not.
Workforce includes all individuals who are employed or engaged by an organization and have
access to its information systems, assets, or resources. It includes employees both on-site and
remote. Contractors are often part of the workforce, whereas consultants and service providers are
not, although this may vary based on the contract.
Service Providers are entities that offer platforms, software, and services to other enterprises.
Examples include IT consultants, managed service provider (MSPs), and cloud service providers.
Third-party providers and vendors are also considered Service Providers. These services may be
paid or free. Some relationships may or may not require a contract or SLA in place. Examples include
data analysis, traffic blocking, and similar services.
User Accounts is an identity comprised of a set of credentials (e.g., username, password) that
defines a user on a computer or computing system. A user account keeps track of a user’s
information and settings, controls the files, folders, and resources a user is allowed to access, as well
as the tasks a user is allowed to perform. For the purpose of this document, user accounts refer to
“standard” user accounts with limited privileges and are used for general tasks.
Administrator Accounts are accounts for users requiring escalated privileges. The accounts
are used for managing aspects of a computer, domain, or the whole enterprise information
technology infrastructure. Each administrator account should be assigned to a single user. Common
administrator account subtypes include root accounts, local administrator accounts, domain
administrator accounts, and network or security appliance administrator accounts.
Service Accounts are created specifically to run applications, services, and automated tasks on
an operating system. Service accounts may also be created just to own data and configuration
files. Each service account should be used for a specific service or function, and it should have an
assigned owner who is responsible for how the account is used. Service accounts should not be
used for general purpose computing.
What is a Network?
A network is a group of interconnected devices that exchange data. Enterprises may operate one or
more networks that are managed together or independently.
Network Infrastructure refers to all of the resources of a network that make network or internet
connectivity, management, business operations, and communication possible. It consists of
hardware and software, systems and devices, and it enables computing and communication
between users, services, applications, and processes. Network infrastructure can be in the cloud,
physical, or virtual.
Network Architecture refers to how a network is designed, both physically and logically. It defines
how a network is organized, including the connections between devices and software as well as
the data that is transmitted between them. This should include network architecture diagrams and
security architecture diagrams.
Documentation
What is Documentation?
Documentation includes policies, processes, procedures, plans, diagrams, and other written
material (e.g., compliance reports) either physical or digital. Examples include methods of
governance for an enterprise and processes that users follow or describe network architecture.
A plan implements policies and may include groups of policies, processes, and procedures.
A process is a set of general tasks and activities to achieve a series of security-related goals.
A process should be documented, and can be documented in a plan, policy, procedure, or
less formally.
A procedure is an ordered set of steps that must be followed to accomplish a specific task. It
provides the approved way of performing an action in a specific technological and organizational
environment.
www.cisecurity.org CenterforIntSec
info@cisecurity.org @CISecurity
518-266-3460 TheCISecurity
Center for Internet Security cisecurity