CIS Controls v8
Center for Internet Security Critical Security Controls Version 8
Overview
Prioritized set of 18 actions that provide a proven defense against common cyber attacks. Focuses on practical, actionable security measures that can be implemented to significantly improve security posture.
Applicability
Practical cybersecurity controls for IT infrastructure
Relevance to Network and Information Security Directive (NIS2)
Practical implementation guidance for NIS2 technical and organizational security measures
Key Coverage Areas
Standard Sections & Chapters
Implementation Group 1 (essential cyber hygiene)
Implementation Group 2 (growing enterprise)
Implementation Group 3 (mature security programs)
Basic CIS Controls (foundational)
Foundational CIS Controls
Organizational CIS Controls
Related Network and Information Security Directive (NIS2) Articles
Article I: SECTORS OF HIGH CRITICALITY
View Article →Advanced technical controls
Implementation Guidance:
Implement CIS IG2 or IG3 depending on organization maturity
Article II: OTHER CRITICAL SECTORS
View Article →Foundational technical controls
Implementation Guidance:
Implement CIS IG1 minimum, IG2 recommended
Article 21: Cybersecurity risk-management measures
View Article →Practical technical security controls
Implementation Guidance:
Implement CIS Controls appropriate to organization size (IG1, IG2, or IG3)
Mapped Obligations:
- Ensure business continuity through backup management and disaster recovery plans
- Manage security in system development and maintenance including vulnerability handling
- Provide basic cyber hygiene practices and cybersecurity training
- Implement cryptography and encryption policies where appropriate
- Enforce human resources security, access control and asset management
- Use multi-factor or continuous authentication where appropriate
Article 22: Union level coordinated security risk assessments of critical supply chains
View Article →Data recovery capabilities
Implementation Guidance:
Implement CIS Control 11 for backup and recovery
Article 28: Database of domain name registration data
View Article →Service provider management
Implementation Guidance:
Use CIS Control 15 for third-party risk management
Quick Information
- Organization
- CIS
- Category
- Technical Controls
- Certification
- Not available