20 CIS Controls v7.0
20 CIS Controls v7.0
20 CIS Controls v7.0
Security Controls
(V 7.0)
Introduction
Foundational
7. Email and Web Browser Protections
8. Malware Defenses
9. Limitation and Control of Network Ports, Protocols, and
Services
10. Data Recovery Capabilities
11. Secure Configuration for Network Devices, such as Firewalls,
Routers and Switches
12. Boundary Defense
13. Data Protection
14. Controlled Access Based on the Need to Know
15. Wireless Access Control
16. Account Monitoring and Control
Organizational
17. Implement a Security Awareness and Training Program
18. Application Software Security
19. Incident Response and Management
20. Penetration Tests and Red Team Exercises
Basic
1. Inventory and Control of
Hardware Assets
o Actively manage (inventory, track, and
correct) all hardware devices on the network
so that only authorized devices are given
access, and unauthorized and unmanaged
devices are found and prevented from gaining
access.
4. Controlled Use of
Administrative Privileges
o The processes and tools used to
track/control/prevent/correct the use,
assignment, and configuration of administrative
privileges on computers, networks, and
applications.
5. Secure Configuration for
Hardware and Software on Mobile
Devices, Laptops, Workstations
and Servers
o Establish, implement, and actively manage (track,
report on, correct) the security configuration of
mobile devices, laptops, servers, and workstations
using a rigorous configuration management and
change control process in order to prevent
attackers from exploiting vulnerable services and
settings.
8. Malware Defenses
o Control the installation, spread, and execution of
malicious code at multiple points in the enterprise,
while optimizing the use of automation to enable
rapid updating of defense, data gathering, and
corrective action.
9. Limitation and Control of
Network Ports, Protocols, and
Services
o Manage (track/control/correct) the ongoing
operational use of ports, protocols, and services
on networked devices in order to minimize
windows of vulnerability available to attackers.