CIS Implementation Group 1 (IG1) consists of essential cybersecurity controls designed for small to medium-sized organizations with limited IT and security resources.
Actively manage all enterprise assets (end-user devices including portable and mobile; network devices; non-computing/IoT devices; and servers) connected to the infrastructure physically virtually remotely and those within cloud environments to accurately know the totality of assets that need to be monitored and protected within the enterprise.
Actively manage (inventory track and correct) all enterprise assets (end-user devices including portable and mobile; network devices; non-computing/IoT devices; and servers) connected to the infrastructure physically virtually remotely and those within cloud environments to accurately know the totality of assets that need to be monitored and protected within the enterprise.
Implement a process to identify and manage assets that are not authorized.
Actively manage all enterprise software installed on enterprise assets to accurately know the totality of software that needs to be monitored and protected within the enterprise.
Actively manage (inventory track and correct) all enterprise software installed on enterprise assets to accurately know the totality of software that needs to be monitored and protected.
Only use software that is licensed and supported.
Implement a process to identify and manage software that is not authorized.
Establish and maintain processes to identify classify securely handle retain and dispose of data.
Develop and document a data management process to identify classify handle retain and dispose of data.
Maintain an inventory of sensitive data.
Configure access control lists based on the principle of least privilege.
Retain data as long as required and securely dispose of it afterward.
Use secure methods for data destruction.
Encrypt sensitive data stored on enterprise assets.
Encrypt sensitive data transmitted over networks.
Establish and maintain the secure configuration of enterprise assets (end-user devices including portable and mobile; network devices; non-computing/IoT devices; and servers) and software (operating systems applications and firmware).
Establish and maintain secure configuration standards for all enterprise assets and software.
Establish and maintain secure configuration standards for network devices.
Change default passwords and disable unnecessary default accounts.
Remove or disable any software or services that are not required.
Configure automatic session locking after a period of inactivity.
Deploy and maintain a firewall on the network perimeter.
Use processes and tools to assign and manage authorization to enterprise assets and resources.
Maintain a list of all enterprise accounts.
Require unique passwords for all accounts.
Disable accounts that have been inactive for a defined period.
Limit administrative privileges to only those who require them.
Use groups to manage access rights.
Use processes and tools to manage grant and revoke access to enterprise assets and resources.
Define a process for granting access to enterprise assets and data.
Define a process for revoking access when it is no longer needed.
Implement MFA for all accounts.
Implement MFA for all externally facing services.
Securely manage service accounts.
Develop a process to identify report and manage vulnerabilities.
Develop and maintain a process for identifying assessing and remediating vulnerabilities.
Conduct regular automated vulnerability scans.
Address identified vulnerabilities in a timely manner.
Automate the patching of applications.
Collect manage and analyze audit logs of events that could help detect understand or recover from a security incident.
Define a process for collecting reviewing and retaining audit logs.
Ensure that audit logs are collected from relevant systems.
Retain audit logs for a sufficient period.
Minimize the attack surface and the interaction with dangerous websites and email.
Implement measures to filter malicious emails and prevent phishing attacks.
Use security features and extensions to protect web browsers.
Prevent or control the installation spread and execution of malicious software (malware) at multiple points in the enterprise.
Install and maintain anti-malware software on all enterprise assets.
Ensure that anti-malware signatures are updated automatically.
Prevent automatic execution of programs from removable media.
Establish and maintain a process to perform data recovery in order to restore systems and data in a timely manner after an event.
Develop and maintain a plan for recovering data in case of loss.
Implement automated backups of critical data.
Securely store backup data.
Ensure that recovery capabilities are isolated from the primary environment.
Establish and maintain network infrastructure devices.
Keep network devices updated and securely configured.
Implement a security awareness and training program to inform workforce members about threats and required behaviors.
Implement a program to educate users about security threats and best practices.
Provide training on identifying and avoiding social engineering tactics.
Educate users on creating strong passwords and using MFA.
Instruct users on how to handle sensitive data securely.
Develop a process to manage service providers.
Maintain a list of all third-party service providers.
Establish and maintain an incident response plan to prepare for detect contain eradicate and recover from incidents.
Identify individuals responsible for managing security incidents.
Provide clear instructions and contact information for reporting incidents.
Define a process for reporting and escalating security incidents.