Skip to main content
The CIS Controls (Center for Internet Security Controls) are a prioritized set of cybersecurity best practices designed to help organizations defend against the most common cyber threats. Version 8.1 includes 18 control groups organized by implementation priority.

Who needs CIS Controls?

Any organization looking for a practical, prioritized approach to cybersecurity — especially those without the resources for comprehensive frameworks like ISO 27001. CIS Controls are widely used in government, healthcare, and education.

18 CIS Control groups

#ControlPriority
1Inventory and Control of Enterprise AssetsIG1
2Inventory and Control of Software AssetsIG1
3Data ProtectionIG1
4Secure Configuration of Assets and SoftwareIG1
5Account ManagementIG1
6Access Control ManagementIG1
7Continuous Vulnerability ManagementIG2
8Audit Log ManagementIG2
9Email and Web Browser ProtectionsIG2
10Malware DefensesIG2
11Data RecoveryIG2
12Network Infrastructure ManagementIG2
13Network Monitoring and DefenseIG3
14Security Awareness and Skills TrainingIG2
15Service Provider ManagementIG2
16Application Software SecurityIG2
17Incident Response ManagementIG2
18Penetration TestingIG3

Implementation Groups

IG1 — Essential

Basic cyber hygiene. Minimum standard for all organizations regardless of size.

IG2 — Foundational

For organizations with moderate IT complexity managing sensitive data.

IG3 — Organizational

For mature organizations facing sophisticated threats and regulatory requirements.

How DSALTA helps

  • All 18 CIS control groups mapped to actionable controls
  • Implementation Group tracking to prioritize by your organization’s maturity
  • Automated evidence from connected integrations
  • Cross-framework mapping — CIS Controls overlap heavily with SOC 2, ISO 27001, and NIST

Frequently asked questions

No, they are voluntary best practices. However, many regulatory frameworks reference CIS Controls, and some industries require them (e.g., CMMC references CIS).
Most small and medium businesses should start with IG1 (essential hygiene). Move to IG2 as your security program matures.