One step ahead of cyber criminals requires expertise, technology and robust processes. Add the pressures of regulatory compliance and finite resources, and the cyber security puzzle can become overwhelming.
You know you need to prioritise your defences but without a clear roadmap, you can’t help feeling you’ve left a chink in your cyber armour.
The Centre for Internet Security (CIS) Controls come in here. In this 4-part series, we’ll look at what these CIS Controls are and dig into how each one works to protect organisations of all types and sizes to better defend against known attacks and achieve a greater overall cyber security posture.
All Articles in The Series:
The 20 CIS critical security controls are specific actions that defend against the most prevalent cyber attacks. They are an actionable list of high-priority, effective steps that form your cyber security groundwork. Instead of starting from scratch, you can stand on the shoulders of other cyber security experts to get the essentials in place... and protect yourself from 85% of common cyber attacks.
In 2008, volunteer experts from various fields developed the CIS Controls. This consortium included public and private sector teams and individuals:
The 20 CIS Controls they developed stop most attacks, providing a framework for systems management and automation that will serve you well into the future. They’re free to access and widely adopted as best practice by government agencies and enterprises across the UK, EU and US.
The CIS Controls aren’t designed to replace existing compliance or regulatory frameworks. They’re designed to map to the regulations and compliance commitments your business needs to adhere to. They can work as a stand-alone strategy or in combination with other frameworks:
Since cyber criminals don’t stand still, experts continue to bring their knowledge to the CIS Controls, keeping them up-to-date with the ever-changing cyber threats of today.
CIS V7 was released in Mar 2018. The framework has been re-ordered and updated to include security tools and threats. Outlined in three layers, the current CIS controls comprise these components:
Often, a more cost-effective route is to seek external help from security experts rather than hiring, training and retaining your own 24/7 cyber security team. Whether fully outsourced or working in partnership with internal teams, an outsourced Security Operations Centre will help you quickly scale your security, keep pace with ever-changing threats, and ultimately make a real difference to your cyber security posture.
In the next 3 CIS articles, we dig a little deeper to help you implement as much as you can in-house and determine whether you’d be better off with any outsourced areas.