The CIS Top 20 Controls Explained
The CIS Top 20 Controls Explained
by Justin Peacock
T he Center for Internet Security (CIS) is a non-profit organization responsible for developing best
practices to improve internet security and protect against security incidences. The frameworks set
forth by CIS affect everybody from people to organizations and governments and were done to
create safe, reliable standards of protection for IT systems and cybersecurity programs from data
breaches. The CIS Controls, formerly the CIS Top 20, make a strong foundation for a newly maturing
cybersecurity program. Below we explore the top 20 Critical Security Controls and their
requirements.
Controlled Use of Administrative Configure systems to issue a log entry, alert when accounts are
Privileges changed, and ensure administrative accounts have proper
access.
Email and Web Browser Ensure that only supported web browsers and email clients
Protections can execute in the organization using the latest official version.
Ensure that all system data and key systems are automatically
Data Recovery Capabilities
backed up on a regular basis.
Secure Configuration for Network Compare all network device configuration against approved
Devices, such as Firewalls, Routers, security configurations, and manage all network devices using
and Switches multi-factor authentication and encrypted sessions.
Controlled Access Based on the Segment the network based on the label or classification level
Need to Know of the information stored.
Implementing CIS controls doesn’t need to be as daunting as it seems with the help of an integrated
risk management (IRM) solution. Thankfully, CyberStrong can streamline and automate your