(2022) CIS Controls Cloud Companion Guide - CIS
(2022) CIS Controls Cloud Companion Guide - CIS
CIS Controls
Cloud Companion
Guide
March 2022
CIS would like to thank the many security experts who volunteer their time and talent to This work is licensed under a
support the CIS Controls and other CIS work. CIS products represent the effort of a veritable Creative Commons Attribution-
army of volunteers from across the industry, generously giving their time and talent in the Non Commercial-No Derivatives
4.0 International Public License
name of a more secure online experience for everyone. (the link can be found at https://
creativecommons.org/licenses/
EDITORS by-nc-nd/4.0/legalcode).
G. Carpenter, AWS To further clarify the Creative
Randy Mowen, CIS Commons license related to the
Robin Regnier, CIS CIS Critical Security Controls®
(CIS Controls®) content, you
are authorized to copy and
CONTRIBUTORS redistribute the content as
Ginger Anderson, CIS a framework for use by you,
Tyler Desjardins, Arctic Wolf within your organization and
Siddiqui Faheem, Al Hilal Bank, United Arab Emirates outside of your organization, for
Staffan Huslid, Truesec AB non-commercial purposes only,
provided that (i) appropriate credit
Mosi K. Platt, Security Governance, Risk, Compliance and Assurance Professional is given to CIS, and (ii) a link to the
Dr. James Stewart, SME Cybersecurity, The Lynchpin Group license is provided. Additionally,
Valecia Stocchetti, CIS if you remix, transform, or build
upon the CIS Controls, you may not
In addition, we want to thank those contributors whose attributions were not available at the distribute the modified materials.
time of publication. Users of the CIS Controls
framework are also required to
refer to (http://www.cisecurity.
org/controls/) when referring to
the CIS Controls in order to ensure
that users are employing the most
up-to-date guidance. Commercial
use of the CIS Controls is subject
to the prior approval of the Center
for Internet Security, Inc.(CIS®).
Appendix
The Center for Internet Security, The CIS Critical Security Controls® (CIS Controls®) are a prioritized set of actions that
Inc. (CIS) is a 501(c)(3) nonprofit collectively form a defense-in-depth set of best practices that mitigate the most common
organization whose mission is attacks against systems and networks. The CIS Controls are developed by a community of
to make the connected world
a safer place by developing, information technology (IT) experts who apply their first-hand experience as cyber defenders
validating, and promoting timely to create these globally accepted security best practices. The experts who develop the CIS
best practice solutions that Controls come from a wide range of sectors including, retail, manufacturing, healthcare,
help people, businesses, and education, government, defense, and others. While the CIS Controls address the general
governments protect themselves practices that most enterprises should take to secure their systems, some operational
against pervasive cyber threats.
environments may present unique requirements not addressed by the CIS Controls.
For additional information, go to
www.cisecurity.org. We are at a fascinating point in the evolution of what we now call cyber defense. To help
us understand the cyber threat, we have seen the emergence of threat information feeds,
reports, tools, alert services, standards, and threat-sharing frameworks. To top it all off, we
are surrounded by security requirements, risk management frameworks, compliance regimes,
regulatory mandates, and so forth. There is no shortage of information available to security
practitioners on what they should do to secure their infrastructure. But all of this technology,
information, and oversight has become a veritable “Fog of More” — competing options,
priorities, opinions, and claims that can paralyze or distract an enterprise from vital action.
Business complexity is growing, dependencies are expanding, users are becoming more
mobile, and the threats are evolving. New technology brings us great benefits, but it also
means that our data and applications are distributed across multiple locations, many of which
are not within our enterprise’s infrastructure.
The CIS Controls started as a grassroots activity to cut through the “Fog of More” and
focus on the most fundamental and valuable actions that every enterprise should take. This
companion guide will break down and map the applicable Controls and their implementation
for the cloud environment. As the CIS Controls continue to be refined and re-worked through
the community, the call for CIS Controls guidance for the cloud was identified as one of the
high priority companion documents to be developed.
While many of the core security concerns of enterprise IT systems are shared within
cloud environments, the main challenge in applying best practices is tied to the fact that
these systems typically operate software and hardware under different assumed security
responsibilities. Ensuring and understanding that the service-level agreements (SLAs) and
Legal Contracts with the cloud service provider (CSP) highlight liability, service levels, breach
disclosure, and incident response timeframes is an important piece of your cloud security. The
shared security responsibility, as well as the specific cloud services and deployment models
utilized, changes who handles the security requirements and with whom the assumed security
risk resides. CSPs are constantly adding new functional services along with configuration and
security tools to better manage them at a very rapid pace. As new tools become available, the
cloud consumer should consider a hybrid approach using third-party tools along with CSP
native security tools that best fit an enterprise’s security and management needs. Enterprise
management processes should ensure there is overlap rather than gaps in coverage between
native and third-party tools.
To complicate things even more, a cloud environment has multiple deployment models:
• Private cloud (on-prem) consists of all the computing resources being hosted and used
exclusively in private tenancy by one consumer (enterprise) within its own offices and
data centers. The consumer is responsible for the operational costs, hardware, software,
and the resources required to build and maintain the infrastructure. This is best used for
critical business operations that want to control all access, including physical access, to the
cloud system.
• Private cloud (third-party hosted) is a private tenancy cloud system that is hosted by an
external third-party provider. The third-party provides an exclusive use cloud environment
for the consumer to deploy applications and store data on. The third-party provides the
hardware, software, servers, supporting infrastructure and sometimes staff, which offers
the customer a reduced, up front capital investment and access to additional resources as
needed. This model can be useful for enterprises that have elastic computing needs, have
specific regulatory requirements that can be met at scale by a third-party much cheaper
than on-prem, or for enterprises that do not wish to make a large capital investment in IT
infrastructure and would rather pay as they go.
• Community cloud (shared) is a deployment solution where the computing resources and
infrastructure are shared between several enterprises or community of consumers. The
resources can be managed internally or by a third-party and they can be hosted on-prem or
externally. The enterprises share the cost and often have similar cloud security requirements
and business objectives.
• Public cloud is an infrastructure and computing service hosted by a third-party company
defined as a CSP and exists on the CSP’s premises. It is available over the internet and the
services can be delivered through a self-service portal. Public cloud is provisioned for open
use by the general public and the consumer is provided on-demand access and scalability
without the higher overhead cost of maintaining a private cloud environment, but gives up
private tenancy. The CSP is responsible for the management and maintenance of the system
while the consumer pays only for resources they use. This type of cloud system depends on
a “shared security responsibility model.”
These different deployment models led to and now drive the CIS Controls Cloud
Companion Guide.
A consistent approach is needed for analyzing CIS Controls in the context for cloud. For each
of the CIS Controls, the following information is provided:
• Cloud Applicability — The applicability field assesses the degree to which a CIS Control
functions within the cloud space and which service model should be considered.
• Cloud Service and Deployment Considerations — Service and deployment model
considerations further define who is responsible for the Controls within the service model it
is applicable to and what the consumer of the CSP is responsible for.
• Cloud Additional Considerations — This is a general area for any additional guidance that
also needs to be noted. For instance, relevant tools, products, or threat information that
could be of use can be found here.
In this document, we provide guidance on how to apply the security best practices found in
CIS Controls Version 8 to any cloud environment from the consumer/customer perspective.
For each top-level CIS Control, there is a brief discussion on how to interpret and apply the
CIS Control in such environments, along with any unique considerations or differences from
common IT environments.
The applicability of specific CIS Controls and CIS Safeguards is addressed, and additional
steps needed in any cloud environment are explained, based on the individual service
models. Throughout this document, we take into consideration the unique mission/business
requirements found in cloud environments, as well as the unique risks (vulnerabilities, threats,
consequences, and security responsibilities), which in turn drive the priority of the security
requirements (e.g., availability, integrity, and confidentiality of process data).
By reading through CIS Controls Version 8 with this companion guide, the reader should be
able to tailor the CIS Controls in the context of a specific IT/Operational Technology (OT)
cloud enterprise as an essential starting point for a security improvement assessment and
roadmap. We should mention that OT is hardware and software that detects or causes a
change through the direct monitoring and/or control of physical devices, processes, and
events in the enterprise. Finally, this document is also aimed at guiding enterprises involved in
the agile software development process via utilization of cloud-based services. DevSecOps,
which is short for development, security, and operations, automates the integration of security
at every phase of the software and its underlying infrastructure development life cycle, from
initial design through integration, testing, deployment, and software delivery. CIS Control 16
will cover these aspects.
As part of CIS Controls v8, the Implementation Groups (IGs) are a guideline to help
enterprises determine a starting point for implementation of the CIS Controls. Enterprises
will, at times, find the need to implement CIS Safeguards in a higher IG. When integrating
new technology into an environment, such as cloud, an enterprise should fully consider, and
assess the security risks and impacts to assets and data. That understanding should drive the
selection and implementation of appropriate CIS Safeguards regardless of IG.
IG2 IG3
IG3
IG3 assists enterprises with IT security experts to secure sensitive and
confidential data. IG3 aims to prevent and/or lessen the impact of
sophisticated attacks.
23
SAFEGUARDS
IG2
IG2 assists enterprises managing IT infrastructure of multiple
departments with differing risk profiles. IG2 aims to help enterprises cope
with increased operational complexity.
74
SAFEGUARDS
IG1
IG1 is the definition of essential cyber hygiene and represents a minimum
standard of information security for all enterprises. IG1 assists enterprises
with limited cybersecurity expertise thwart general, non-targeted attacks.
56
SAFEGUARDS
10 Malware Defenses
11 Data Recovery
18 Penetration Testing
CIS Controls Cloud Companion Guide Applicability Overview for Each Service Model 6
CIS Controls
Cloud Applicability
Overview Actively manage (inventory, track, and correct) all enterprise assets (end-user devices,
including portable and mobile; network devices; non-computing/Internet of Things (IoT)
devices; and servers) connected to the infrastructure, physically, virtually, remotely, and
those within cloud environments, to accurately know the totality of assets that need
to be monitored and protected within the enterprise. This will also support identifying
unauthorized and unmanaged assets to remove or remediate.
Cloud Applicability The first CIS Control is considered the most important because it is necessary to first identify
the systems and devices that need to be secured. CIS Control 1 is about taking inventory.
Understanding and solving the asset inventory and device visibility problem is critical in
managing a business security program. This is challenging in cloud environments due to the
shared security responsibility and the cloud service model utilized.
IMPLEMENTATION APPLICABILITY OF
CIS Control 01: Inventory and Control of Enterprise Assets GROUPS SERVICE MODEL
SECURITY
SAFEGUARD ASSET TYPE CONTROL TITLE/DESCRIPTION IG1 IG2 IG3 IaaS PaaS SaaS FaaS
FUNCTION
1.1 Devices Identify Establish and Maintain Detailed Enterprise Asset Inventory 1 2 3 ✓ ✓
Establish and maintain an accurate, detailed, and up-to-date inventory of all enterprise assets with the potential to
store or process data, to include: end-user devices (including portable and mobile), network devices, non-computing/
IoT devices, and servers. Ensure the inventory records the network address (if static), hardware address, machine name,
data asset owner, department for each asset, and whether the asset has been approved to connect to the network. For
mobile end-user devices, mobile device management (MDM) type tools can support this process, where appropriate.
This inventory includes assets connected to the infrastructure physically, virtually, remotely, and those within cloud
environments. Additionally, it includes assets that are regularly connected to the enterprise’s network infrastructure,
even if they are not under control of the enterprise. Review and update the inventory of all enterprise assets bi-annually,
or more frequently.
Ensure that a process exists to address unauthorized assets on a weekly basis. The enterprise may choose to remove
the asset from the network, deny the asset from connecting remotely to the network, or quarantine the asset.
Utilize an active discovery tool to identify assets connected to the enterprise’s network. Configure the active discovery
tool to execute daily, or more frequently.
1.4 Devices Identify Use Dynamic Host Configuration Protocol (DHCP) Logging to Update 2 3 ✓ ✓
Enterprise Asset Inventory
Use DHCP logging on all DHCP servers or Internet Protocol (IP) address management tools to update the enterprise’s
asset inventory. Review and use logs to update the enterprise’s asset inventory weekly, or more frequently.
Use a passive discovery tool to identify assets connected to the enterprise’s network. Review and use scans to update
the enterprise’s asset inventory at least weekly, or more frequently.
CIS Controls Cloud Companion Guide CIS Control 01: Inventory and Control of Enterprise Assets 8
Cloud Service and When considering deployment models, you will find that this CIS Control and Safeguards
Deployment Considerations are applicable for Private (on-prem). For Private (third-party hosted), Public, and Hybrid
deployment models, you will need to defer to the service/deployment model(s) your
enterprise is using.
• Private (on-prem) — The local administrator (cloud consumer) is responsible for the security
of everything (physical servers, room, network, storage, hypervisor, operating systems, etc.).
• IaaS — The administrator (cloud consumer) deploys, operates, and maintains the virtual
networks and virtual machines within this service model but does not manage the
underlying cloud infrastructure (physical servers, physical network, physical storage,
hypervisor, etc.) as that is the responsibility of the CSP.
• PaaS — The administrator (cloud consumer) manages the development, testing, and
deployment of their applications. They have full control over the applications and in some
cases the host environment settings and operating systems. The CSP is responsible for
the physical servers, physical network, storage, hypervisor, and operating systems. DHCP
logging, port level access control might not be applicable.
• SaaS — This is not applicable for the cloud consumer as SaaS and FaaS is under software
assets. The CSP is responsible for everything but the data.
• FaaS — This is not applicable for the cloud consumer as SaaS and FaaS is under software
assets. The CSP is responsible for everything but the data.
CIS Controls Cloud Companion Guide CIS Control 01: Inventory and Control of Enterprise Assets 9
CIS CONTROL
02 Inventory and Control of
Software Assets
Overview Actively manage (inventory, track, and correct) all software (operating systems and
applications) on the network so that only authorized software is installed and can
execute, and that unauthorized and unmanaged software is found and prevented from
installation or execution.
Cloud Applicability The second CIS Control offers the guidance needed to identify, track, and account for all
software utilized in an environment. This is challenging in cloud environments due to the
shared security responsibility and the cloud service model utilized.
IMPLEMENTATION APPLICABILITY OF
CIS Control 02: Inventory and Control of Software Assets GROUPS SERVICE MODEL
SECURITY
SAFEGUARD ASSET TYPE CONTROL TITLE/DESCRIPTION IG1 IG2 IG3 IaaS PaaS SaaS FaaS
FUNCTION
Establish and maintain a detailed inventory of all licensed software installed on enterprise assets. The software
inventory must document the title, publisher, initial install/use date, and business purpose for each entry; where
appropriate, include the Uniform Resource Locator (URL), app store(s), version(s), deployment mechanism, and
decommission date. Review and update the software inventory bi-annually, or more frequently.
Ensure that only currently supported software is designated as authorized in the software inventory for enterprise
assets. If software is unsupported yet necessary for the fulfillment of the enterprise’s mission, document an exception
detailing mitigating controls and residual risk acceptance. For any unsupported software without an exception
documentation, designate as unauthorized. Review the software list to verify software support at least monthly, or more
frequently.
Ensure that unauthorized software is either removed from use on enterprise assets or receives a documented
exception. Review monthly, or more frequently.
Utilize software inventory tools, when possible, throughout the enterprise to automate the discovery and
documentation of installed software.
Use technical controls, such as application allowlisting, to ensure that only authorized software can execute or be
accessed. Reassess bi-annually, or more frequently.
Use technical controls to ensure that only authorized software libraries, such as specific .dll, .ocx, .so, etc. files, are
allowed to load into a system process. Block unauthorized libraries from loading into a system process. Reassess bi-
annually, or more frequently.
Use technical controls, such as digital signatures and version control, to ensure that only authorized scripts, such as
specific .ps1, .py, etc. files, are allowed to execute. Block unauthorized scripts from executing. Reassess bi-annually, or
more frequently.
CIS Controls Cloud Companion Guide CIS Control 02: Inventory and Control of Software Assets 10
Cloud Service and When considering deployment models, you will find that these CIS Safeguards are applicable
Deployment Considerations for Private (on-prem). For Private (third-party hosted), Public, and Hybrid deployment models,
you will need to defer to the service/deployment model(s) your enterprise is using.
• Private (on-prem) — The local administrator is responsible for keeping the inventory of all
software utilized regardless of the service model.
• IaaS — The administrator (cloud consumer) deploys, operates, and maintains the software
utilized within this service model but does not manage the underlying cloud software like
the hypervisor, operating systems, or applications that provide specific services as that is
the responsibility of the CSP.
• PaaS — The administrator (cloud consumer) manages the development, testing, and
deployment of their software and applications. They have full control over the applications
and in some cases the operating systems so they are responsible for all software running
at this level. The CSP is responsible for the hypervisor and operating systems and other
applications that provide this service. Application whitelisting, whitelisting of libraries,
whitelisting of scripts, and segregating high-risk applications will not be applicable to all
PaaS service models.
• SaaS — The administrator (cloud consumer) is responsible for registering the software on
the inventory list as approved. They are also responsible to make sure the vendor maintains
support and vulnerability updates for the software and to keep record of it in the tracking
software. Tracking software inventory could be manual.
• FaaS — The administrator (cloud consumer) is responsible for maintaining an inventory of
authorized software. Tracking software inventory could be manual.
CIS Controls Cloud Companion Guide CIS Control 02: Inventory and Control of Software Assets 11
CIS CONTROL
03 Data
Protection
Overview Develop processes and technical controls to identify, classify, securely handle, retain,
and dispose of data.
Cloud Applicability The focus of this CIS Control is on data protection and ensuring the privacy and integrity
of sensitive information. The cloud environment is not an exception to private data. If cloud
consumers have realized anything while migrating information to the cloud, it is that protecting
data can be more complicated. It is a growing concern for CSPs and consumers because any
data leakage can go undetected for long periods of time.
IMPLEMENTATION APPLICABILITY OF
CIS Control 03: Data Protection GROUPS SERVICE MODEL
SECURITY
SAFEGUARD ASSET TYPE CONTROL TITLE/DESCRIPTION IG1 IG2 IG3 IaaS PaaS SaaS FaaS
FUNCTION
Establish and maintain a data management process. In the process, address data sensitivity, data owner, handling of
data, data retention limits, and disposal requirements, based on sensitivity and retention standards for the enterprise.
Review and update documentation annually, or when significant enterprise changes occur that could impact this
Safeguard.
Establish and maintain a data inventory, based on the enterprise’s data management process. Inventory sensitive data,
at a minimum. Review and update inventory annually, at a minimum, with a priority on sensitive data.
Configure data access control lists based on a user’s need to know. Apply data access control lists, also known as
access permissions, to local and remote file systems, databases, and applications.
Retain data according to the enterprise’s data management process. Data retention must include both minimum and
maximum timelines.
Securely dispose of data as outlined in the enterprise’s data management process. Ensure the disposal process and
method are commensurate with the data sensitivity.
Encrypt data on end-user devices containing sensitive data. Example implementations can include, Windows
BitLocker®, Apple FileVault®, Linux® dm-crypt.
Establish and maintain an overall data classification scheme for the enterprise. Enterprises may use labels, such
as “Sensitive,” “Confidential,” and “Public,” and classify their data according to those labels. Review and update the
classification scheme annually, or when significant enterprise changes occur that could impact this Safeguard.
CIS Controls Cloud Companion Guide CIS Control 03: Data Protection 12
IMPLEMENTATION APPLICABILITY OF
CIS Control 03: Data Protection GROUPS SERVICE MODEL
SECURITY
SAFEGUARD ASSET TYPE CONTROL TITLE/DESCRIPTION IG1 IG2 IG3 IaaS PaaS SaaS FaaS
FUNCTION
Document data flows. Data flow documentation includes service provider data flows and should be based on the
enterprise’s data management process. Review and update documentation annually, or when significant enterprise
changes occur that could impact this Safeguard.
Encrypt sensitive data in transit. Example implementations can include, Transport Layer Security (TLS) and Open Secure
Shell (OpenSSH).
Encrypt sensitive data at rest on servers, applications, and databases containing sensitive data. Storage-layer
encryption, also known as server-side encryption, meets the minimum requirement of this Safeguard. Additional
encryption methods may include application-layer encryption, also known as client-side encryption, where access to
the data storage device(s) does not permit access to the plain-text data.
3.12 Network Protect Segment Data Processing and Storage Based on Sensitivity 2 3 ✓
Segment data processing and storage, based on the sensitivity of the data. Do not process sensitive data on enterprise
assets intended for lower sensitivity data.
Implement an automated tool, such as a host-based Data Loss Prevention (DLP) tool to identify all sensitive data stored,
processed, or transmitted through enterprise assets, including those located onsite or at a remote service provider, and
update the enterprise’s sensitive data inventory.
Cloud Service and When considering deployment models, you will find that this CIS Control and Safeguards
Deployment Considerations are applicable for Private (on-prem). For Private (third-party hosted), Public, and Hybrid
deployment models, you will need to defer to the service/deployment model(s) your
enterprise is using.
• Private (on-prem) — The administrator (cloud consumer) is responsible for all of the data
regardless of the service model used.
• IaaS — The administrator (cloud consumer) is responsible for data protection but is limited
to the virtual networks and virtual machines within this service model. The CSP is not
responsible for any data loss due to lack of action or security defined for the consumer.
• PaaS — The administrator (cloud consumer) manages the data and access for the
applications and in some cases the host environment settings and operating systems.
• SaaS — The administrator (cloud consumer) is responsible for the data. The CSP is only
responsible for making sure the data is online and that access is not granted outside of the
application controlled by the cloud consumer.
• FaaS — The administrator (cloud consumer) is responsible for the code and any data. The
CSP is only responsible for making sure the data is online and that access is not granted
outside of the functions called and controlled by the cloud consumer.
CIS Controls Cloud Companion Guide CIS Control 03: Data Protection 13
CLOUD ADDITIONAL CONSIDERATIONS
• Make sure that the data is not accessible to the public. Encrypt or use tokenization to protect
sensitive data. Encryption has a number of limitations in SaaS solutions and does not allow
the data to be searched; however, tokenization addresses that concern and limitation.
• Control the systems and users that have access to the cloud platform and the data
that might be exposed. When hosting any data in the cloud, consider the possible legal
implications based on the data classification. More often than not, data protection,
redundancy, and backup are the responsibility of the cloud consumer and not the CSP.
CIS Controls Cloud Companion Guide CIS Control 03: Data Protection 14
CIS CONTROL
04 Secure Configuration of
Enterprise Assets and Software
Overview Establish and maintain the secure configuration of enterprise assets (end-user devices,
including portable and mobile; network devices; non-computing/IoT devices; and
servers) and software (operating systems and applications).
Cloud Applicability This CIS Control provides guidance for securing hardware and software. As delivered by the
CSP, the default configurations for operating systems and applications are normally geared
toward ease-of-deployment and ease-of-use ― not security. Basic controls, open services
and ports, default accounts or passwords, older (vulnerable) protocols, pre-installation
of unneeded software ― all can be exploitable in their default state. Even if a strong initial
configuration is developed and deployed in the cloud, it must be continually managed to avoid
configuration drift as software is updated or patched, new security vulnerabilities are reported,
and configurations are “tweaked” to allow the installation of new software or to support new
operational requirements. If not, attackers will find opportunities to exploit both network-
accessible services and client software.
IMPLEMENTATION APPLICABILITY OF
CIS Control 04: Secure Configuration of Enterprise Assets and Software GROUPS SERVICE MODEL
SECURITY
SAFEGUARD ASSET TYPE CONTROL TITLE/DESCRIPTION IG1 IG2 IG3 IaaS PaaS SaaS FaaS
FUNCTION
Establish and maintain a secure configuration process for enterprise assets (end-user devices, including portable
and mobile, non-computing/IoT devices, and servers) and software (operating systems and applications). Review and
update documentation annually, or when significant enterprise changes occur that could impact this Safeguard.
4.2 Network Protect Establish and Maintain a Secure Configuration Process for Network 1 2 3 ✓ ✓
Infrastructure
Establish and maintain a secure configuration process for network devices. Review and update documentation
annually, or when significant enterprise changes occur that could impact this Safeguard.
Configure automatic session locking on enterprise assets after a defined period of inactivity. For general purpose
operating systems, the period must not exceed 15 minutes. For mobile end-user devices, the period must not exceed 2
minutes.
Implement and manage a firewall on servers, where supported. Example implementations include a virtual firewall,
operating system firewall, or a third-party firewall agent.
Implement and manage a host-based firewall or port-filtering tool on end-user devices, with a default-deny rule that
drops all traffic except those services and ports that are explicitly allowed.
CIS Controls Cloud Companion Guide CIS Control 04: Secure Configuration of Enterprise Assets and Software 15
IMPLEMENTATION APPLICABILITY OF
CIS Control 04: Secure Configuration of Enterprise Assets and Software GROUPS SERVICE MODEL
SECURITY
SAFEGUARD ASSET TYPE CONTROL TITLE/DESCRIPTION IG1 IG2 IG3 IaaS PaaS SaaS FaaS
FUNCTION
Securely manage enterprise assets and software. Example implementations include managing configuration through
version-controlled-infrastructure-as-code and accessing administrative interfaces over secure network protocols, such
as Secure Shell (SSH) and Hypertext Transfer Protocol (HTTPS). Do not use insecure management protocols, such as
Telnet and HTTP, unless operationally essential.
4.7 Users Protect Manage Default Accounts on Enterprise Assets and Software 1 2 3 ✓ ✓ ✓ ✓
Manage default accounts on enterprise assets and software, such as root, administrator, and other pre-configured
vendor accounts. Example implementations can include, disabling default accounts or making them unusable.
4.8 Devices Protect Uninstall or Disable Unnecessary Services on Enterprise Assets and 1 2 3 ✓ ✓
Applications
Uninstall or disable unnecessary services on enterprise assets and software, such as an unused file sharing service,
web application module, or service function.
4.9 Devices Protect Configure Trusted Domain Name System (DNS) Servers on 2 3 ✓ ✓
Enterprise Assets
Configure trusted DNS servers on enterprise assets. Example implementations include, configuring assets to use
enterprise-controlled DNS servers and/or reputable externally accessible DNS servers.
4.10 Devices Respond Enforce Automatic Device Lockout on Portable End-User Devices 2 3 ✓ ✓
Enforce automatic device lockout following a predetermined threshold of local failed authentication attempts on
portable end-user devices, where supported. For laptops, do not allow more than 20 failed authentication attempts; for
tablets and smartphones, no more than 10 failed authentication attempts. Example implementations include Microsoft ®
InTune Device Lock and Apple® Configuration Profile maxFailedAttempts.
4.11 Devices Protect Enforce Remote Wipe Capability on Portable End-User Devices 2 3 ✓ ✓
Remotely wipe enterprise data from enterprise-owned portable end-user devices when deemed appropriate such as
lost or stolen devices, or when an individual no longer supports the enterprise.
Ensure separate enterprise workspaces are used on mobile end-user devices, where supported. Example
implementations include using an Apple® Configuration Profile or Android™ Work Profile to separate enterprise
applications and data from personal applications and data.
Cloud Service and When considering deployment models, you will find that this CIS Control and Safeguards
Deployment Considerations are applicable for Private (on-prem). For Private (third-party hosted), Public, and Hybrid
deployment models, you will need to defer to the service/deployment model(s) your
enterprise is using.
CIS Controls Cloud Companion Guide CIS Control 04: Secure Configuration of Enterprise Assets and Software 16
CLOUD ADDITIONAL CONSIDERATIONS
• When configuration management tools are used, they should be set to alert-only without
automated configuration re-deployment unless it is known to be safe to do so.
• The CSP hosts typical image storage in cloud environments for PaaS, SaaS, and FaaS;
therefore, the secure configuration of the underlying servers is the responsibility of the CSP.
• As part of the established secure configurations, SaaS and FaaS should always
communicate over TLS and validate the TLS API endpoint certificate.
• Also consider cloud access security broker (CASB) services that can provide granular
controls for monitoring user’s application sessions and blocking actions.
CIS Controls Cloud Companion Guide CIS Control 04: Secure Configuration of Enterprise Assets and Software 17
CIS CONTROL
05 Account
Management
Overview Use processes and tools to assign and manage authorization to credentials for user
accounts, including administrator accounts, as well as service accounts, to enterprise
assets and software.
Cloud Applicability This CIS Control focuses on managing the life cycle of system, application, and user accounts.
As part of this management, rules and processes should be established for the creation, use,
dormancy, and deletion of all cloud accounts, in order to minimize opportunities for attackers
to leverage them. When an employee leaves the enterprise or changes roles, vulnerabilities
can arise if employee accounts are not closed or modified.
IMPLEMENTATION APPLICABILITY OF
CIS Control 05: Account Management GROUPS SERVICE MODEL
SECURITY
SAFEGUARD ASSET TYPE CONTROL TITLE/DESCRIPTION IG1 IG2 IG3 IaaS PaaS SaaS FaaS
FUNCTION
Establish and maintain an inventory of all accounts managed in the enterprise. The inventory must include both user
and administrator accounts. The inventory, at a minimum, should contain the person’s name, username, start/stop
dates, and department. Validate that all active accounts are authorized, on a recurring schedule at a minimum quarterly,
or more frequently.
Use unique passwords for all enterprise assets. Best practice implementation includes, at a minimum, an 8-character
password for accounts using multifactor authentication (MFA) and a 14-character password for accounts not
using MFA.
Delete or disable any dormant accounts after a period of 45 days of inactivity, where supported.
Restrict administrator privileges to dedicated administrator accounts on enterprise assets. Conduct general computing
activities, such as internet browsing, email, and productivity suite use, from the user’s primary, non-privileged, account.
Establish and maintain an inventory of service accounts. The inventory, at a minimum, must contain department owner,
review date, and purpose. Perform service account reviews to validate all active accounts are authorized, on a recurring
schedule at a minimum quarterly, or more frequently.
CIS Controls Cloud Companion Guide CIS Control 05: Account Management 18
Cloud Service and When considering deployment models, you will find that this CIS Control and Safeguards
Deployment Considerations are applicable for Private (on-prem). For Private (third-party hosted), Public, and Hybrid
deployment models, you will need to defer to the service/deployment model(s) your
enterprise is using.
CIS Controls Cloud Companion Guide CIS Control 05: Account Management 19
CIS CONTROL
06 Access Management
Control
Overview Use processes and tools to create, assign, manage, and revoke access credentials
and privileges for user, administrator, and service accounts for enterprise assets
and software.
Cloud Applicability This CIS Control addresses the need for limiting and managing access. The misuse of
administrative privileges is a primary method for attackers to spread laterally inside a target
enterprise. One of the two primary ways for attackers to spread inside a system is by tricking
a user with elevated credentials into opening an email attachment, downloading and running
an infected file, and visiting a malicious website from an asset connected to the cloud
environment. The second common technique used by attackers is elevation of privileges
by guessing or cracking a password for an administrative user to gain access to a target
machine. If administrator privileges are loosely and widely distributed, or identical passwords
are used on less critical systems, the attacker has a much easier time gaining full control of
systems, because there are many more accounts that can act as avenues for the attacker to
compromise administrative privileges.
IMPLEMENTATION APPLICABILITY OF
CIS Control 06: Access Management Control GROUPS SERVICE MODEL
SECURITY
SAFEGUARD ASSET TYPE CONTROL TITLE/DESCRIPTION IG1 IG2 IG3 IaaS PaaS SaaS FaaS
FUNCTION
Establish and follow a process, preferably automated, for granting access to enterprise assets upon new hire, rights
grant, or role change of a user.
Establish and follow a process, preferably automated, for revoking access to enterprise assets, through disabling
accounts immediately upon termination, rights revocation, or role change of a user. Disabling accounts, instead of
deleting accounts, may be necessary to preserve audit trails.
Require all externally-exposed enterprise or third-party applications to enforce MFA, where supported. Enforcing MFA
through a directory service or single sign-on (SSO) provider is a satisfactory implementation of this Safeguard.
Require MFA for all administrative access accounts, where supported, on all enterprise assets, whether managed on-
site or through a third-party provider.
Establish and maintain an inventory of the enterprise’s authentication and authorization systems, including those
hosted on-site or at a remote service provider. Review and update the inventory, at a minimum, annually, or more
frequently.
CIS Controls Cloud Companion Guide CIS Control 06: Access Management Control 20
IMPLEMENTATION APPLICABILITY OF
CIS Control 06: Access Management Control GROUPS SERVICE MODEL
SECURITY
SAFEGUARD ASSET TYPE CONTROL TITLE/DESCRIPTION IG1 IG2 IG3 IaaS PaaS SaaS FaaS
FUNCTION
Centralize access control for all enterprise assets through a directory service or SSO provider, where supported.
Define and maintain role-based access control, through determining and documenting the access rights necessary
for each role within the enterprise to successfully carry out its assigned duties. Perform access control reviews of
enterprise assets to validate all privileges are authorized, on a recurring schedule at a minimum annually, or more
frequently.
Cloud Service and When considering deployment models, you will find that this CIS Control and Safeguards
Deployment Considerations are applicable for Private (on-prem). For Private (third-party hosted), Public, and Hybrid
deployment models, you will need to defer to the service/deployment model(s) your
enterprise is using.
CIS Controls Cloud Companion Guide CIS Control 06: Access Management Control 21
CIS CONTROL
07 Continuous Vulnerability
Management
Overview Develop a plan to continuously assess and track vulnerabilities on all enterprise assets
within the enterprise’s infrastructure, in order to remediate, and minimize, the window of
opportunity for attackers. Monitor public and private industry sources for new threat and
vulnerability information.
Cloud Applicability This CIS Control addresses the need for continuous vulnerability management, which can be
a significant task in most enterprises. Understanding and managing vulnerabilities in a cloud
environment can be more challenging than in traditional IT systems. A cloud environment
is dynamic, allowing you to scale your environment at an ever-changing pace. With the
increasing use of DevSecOps, the internal landscape is ever-changing. As enterprises migrate
to the cloud, they are in a difficult position because of the risks and vulnerabilities associated
with the use of cloud services. Giving control of some assets to a third-party depending on the
deployment model you are utilizing, and verifying the security and vulnerability status of those
assets, is not always the responsibility of cloud consumers. Cloud environments also host
cloud-specific vulnerabilities that have to be monitored and managed.
IMPLEMENTATION APPLICABILITY OF
CIS Control 07: Continuous Vulnerability Management GROUPS SERVICE MODEL
SECURITY
SAFEGUARD ASSET TYPE CONTROL TITLE/DESCRIPTION IG1 IG2 IG3 IaaS PaaS SaaS FaaS
FUNCTION
Establish and maintain a documented vulnerability management process for enterprise assets. Review and update
documentation annually, or when significant enterprise changes occur that could impact this Safeguard.
Establish and maintain a risk-based remediation strategy documented in a remediation process, with monthly, or more
frequent, reviews.
Perform operating system updates on enterprise assets through automated patch management on a monthly, or more
frequent, basis.
Perform application updates on enterprise assets through automated patch management on a monthly, or more
frequent, basis.
7.5 Applications Identify Perform Automated Vulnerability Scans of Internal Enterprise Assets 2 3 ✓ ✓
Perform automated vulnerability scans of internal enterprise assets on a quarterly, or more frequent, basis. Conduct
both authenticated and unauthenticated scans, using a security content automation protocol (SCAP)-compliant
vulnerability scanning tool.
Perform automated vulnerability scans of externally-exposed enterprise assets using a SCAP-compliant vulnerability
scanning tool. Perform scans on a monthly, or more frequent, basis.
CIS Controls Cloud Companion Guide CIS Control 07: Continuous Vulnerability Management 22
IMPLEMENTATION APPLICABILITY OF
CIS Control 07: Continuous Vulnerability Management GROUPS SERVICE MODEL
SECURITY
SAFEGUARD ASSET TYPE CONTROL TITLE/DESCRIPTION IG1 IG2 IG3 IaaS PaaS SaaS FaaS
FUNCTION
Remediate detected vulnerabilities in software through processes and tooling on a monthly, or more frequent, basis,
based on the remediation process.
Cloud Service and When considering deployment models, you will find that this CIS Control and Safeguards
Deployment Considerations are applicable for Private (on-prem). For Private (third-party hosted), Public, and Hybrid
deployment models, you will need to defer to the service/deployment model(s) your
enterprise is using.
CIS Controls Cloud Companion Guide CIS Control 07: Continuous Vulnerability Management 23
CIS CONTROL
08 Audit Log
Management
Overview Collect, alert, review, and retain audit logs of events that could help detect, understand,
or recover from an attack.
Cloud Applicability This CIS Control offers guidance for the maintenance and monitoring of audit logs. Without
protected and complete logging records, an attack may go unnoticed indefinitely and the
particular damages done may be irreversible. The CSP helps a consumer meet this Control by
providing the ability to generate and monitor audit logs.
IMPLEMENTATION APPLICABILITY OF
CIS Control 08: Audit Log Management GROUPS SERVICE MODEL
SECURITY
SAFEGUARD ASSET TYPE CONTROL TITLE/DESCRIPTION IG1 IG2 IG3 IaaS PaaS SaaS FaaS
FUNCTION
8.1 Network Protect Establish and Maintain an Audit Log Management Process 1 2 3 ✓ ✓ ✓ ✓
Establish and maintain an audit log management process that defines the enterprise’s logging requirements. At
a minimum, address the collection, review, and retention of audit logs for enterprise assets. Review and update
documentation annually, or when significant enterprise changes occur that could impact this Safeguard.
Collect audit logs. Ensure that logging, per the enterprise’s audit log management process, has been enabled across
enterprise assets.
Ensure that logging destinations maintain adequate storage to comply with the enterprise’s audit log management
process.
Standardize time synchronization. Configure at least two synchronized time sources across enterprise assets, where
supported.
Configure detailed audit logging for enterprise assets containing sensitive data. Include event source, date, username,
timestamp, source addresses, destination addresses, and other useful elements that could assist in a forensic
investigation.
Collect DNS query audit logs on enterprise assets, where appropriate and supported.
Collect URL request audit logs on enterprise assets, where appropriate and supported.
Collect command-line audit logs. Example implementations include collecting audit logs from PowerShell®, BASH, and
remote administrative terminals.
CIS Controls Cloud Companion Guide CIS Control 08: Audit Log Management 24
IMPLEMENTATION APPLICABILITY OF
CIS Control 08: Audit Log Management GROUPS SERVICE MODEL
SECURITY
SAFEGUARD ASSET TYPE CONTROL TITLE/DESCRIPTION IG1 IG2 IG3 IaaS PaaS SaaS FaaS
FUNCTION
Centralize, to the extent possible, audit log collection, and retention across enterprise assets.
Conduct reviews of audit logs to detect anomalies or abnormal events that could indicate a potential threat. Conduct
reviews on a weekly, or more frequent, basis.
Collect service provider logs, where supported. Example implementations include collecting authentication and
authorization events; data creation and disposal events; and user management events.
Cloud Service and When considering deployment models, you will find that this CIS Control and Safeguards
Deployment Considerations are applicable for Private (on-prem). For Private (third-party hosted), Public, and Hybrid
deployment models, you will need to defer to the service/deployment model(s) your
enterprise is using.
CIS Controls Cloud Companion Guide CIS Control 08: Audit Log Management 25
CIS CONTROL
09 Email and Web Browser
Protections
Overview Improve protections and detections of threats from email and web vectors, as these are
opportunities for attackers to manipulate human behavior through direct engagement.
Cloud Applicability This CIS Control focuses on the security of web browsers and email clients, which are very
vulnerable attack vectors. Quite often, cloud environments require internet web access.
Depending on the cloud model, there might not be a requirement for email clients, and if email
is utilized, it is typically only in an outgoing manner. It is common to have alerts and other
message systems in place that monitor critical processes and send out reports via email.
These emails are typically accessed from business or corporate assets that are on separate
networks. Most web-based applications are now operating in the cloud.
IMPLEMENTATION APPLICABILITY OF
CIS Control 09: Email and Web Browser Protections GROUPS SERVICE MODEL
SECURITY
SAFEGUARD ASSET TYPE CONTROL TITLE/DESCRIPTION IG1 IG2 IG3 IaaS PaaS SaaS FaaS
FUNCTION
9.1 Applications Protect Ensure Use of Only Fully Supported Browsers and Email Clients 1 2 3 ✓ ✓ ✓ ✓
Ensure only fully supported browsers and email clients are allowed to execute in the enterprise, only using the latest
version of browsers and email clients provided through the vendor.
Use DNS filtering services on all enterprise assets to block access to known malicious domains.
Enforce and update network-based URL filters to limit an enterprise asset from connecting to potentially malicious or
unapproved websites. Example implementations include category-based filtering, reputation-based filtering, or through
the use of block lists. Enforce filters for all enterprise assets.
9.4 Applications Protect Restrict Unnecessary or Unauthorized Browser and Email Client 2 3 ✓ ✓ ✓ ✓
Extensions
Restrict, either through uninstalling or disabling, any unauthorized or unnecessary browser or email client plugins,
extensions, and add-on applications.
To lower the chance of spoofed or modified emails from valid domains, implement DMARC policy and verification,
starting with implementing the Sender Policy Framework (SPF) and the DomainKeys Identified Mail (DKIM) standards.
Block unnecessary file types attempting to enter the enterprise’s email gateway.
9.7 Network Protect Deploy and Maintain Email Server Anti-Malware Protections 3 ✓ ✓ ✓
Deploy and maintain email server anti-malware protections, such as attachment scanning and/or sandboxing.
CIS Controls Cloud Companion Guide CIS Control 09: Email and Web Browser Protections 26
Cloud Service and When considering deployment models, you will find that this CIS Control and Safeguards
Deployment Considerations are applicable for Private (on-prem). For Private (third-party hosted), Public, and Hybrid
deployment models, you will need to defer to the service/deployment model(s) your
enterprise is using.
CIS Controls Cloud Companion Guide CIS Control 09: Email and Web Browser Protections 27
CIS CONTROL
10 Malware
Defenses
Overview Prevent or control the installation, spread, and execution of malicious applications, code,
or scripts on enterprise assets.
Cloud Applicability This CIS Control addresses the steps needed to ensure a strong defense against malware
intrusions. Malicious code is a very real threat to all environments and the cloud is no
exception. While proper network segmentation and defense-in-depth strategies help
to mitigate this risk by making it difficult for threat actors to deliver malware to their
intended locations, malware defense still needs tools and processes in place to thwart and
detect incidents.
IMPLEMENTATION APPLICABILITY OF
CIS Control 10: Malware Defenses GROUPS SERVICE MODEL
SECURITY
SAFEGUARD ASSET TYPE CONTROL TITLE/DESCRIPTION IG1 IG2 IG3 IaaS PaaS SaaS FaaS
FUNCTION
Configure automatic updates for anti-malware signature files on all enterprise assets.
10.3 Devices Protect Disable Autorun and Autoplay for Removable Media 1 2 3 ✓
Enable anti-exploitation features on enterprise assets and software, where possible, such as Microsoft® Data
Execution Prevention (DEP), Windows® Defender Exploit Guard (WDEG), or Apple® System Integrity Protection (SIP) and
Gatekeeper™.
CIS Controls Cloud Companion Guide CIS Control 10: Malware Defenses 28
Cloud Service and When considering deployment models, you will find that this CIS Control and Safeguards
Deployment Considerations are applicable for Private (on-prem). For Private (third-party hosted), Public, and Hybrid
deployment models, you will need to defer to the service/deployment model(s) your
enterprise is using.
CIS Controls Cloud Companion Guide CIS Control 10: Malware Defenses 29
CIS CONTROL
11 Data
Recovery
Overview Establish and maintain data recovery practices sufficient to restore in-scope enterprise
assets to a pre-incident and trusted state.
Cloud Applicability This CIS Control references the need for performing system backups for data recovery
capability. Backing up system data to include user data in the cloud environment is important
in all four service models. The ability to protect and recover a system or user data in a
timely manner is critical to cloud consumers. The challenge is often for the cloud consumer
to remember that the protection and integrity of the user and system data can be their
responsibility where the only thing the CSP is guaranteeing is the availability of the data.
IMPLEMENTATION APPLICABILITY OF
CIS Control 11: Data Recovery GROUPS SERVICE MODEL
SECURITY
SAFEGUARD ASSET TYPE CONTROL TITLE/DESCRIPTION IG1 IG2 IG3 IaaS PaaS SaaS FaaS
FUNCTION
Establish and maintain a data recovery process. In the process, address the scope of data recovery activities, recovery
prioritization, and the security of backup data. Review and update documentation annually, or when significant
enterprise changes occur that could impact this Safeguard.
Perform automated backups of in-scope enterprise assets. Run backups weekly, or more frequently, based on the
sensitivity of the data.
Protect recovery data with equivalent controls to the original data. Reference encryption or data separation, based on
requirements.
11.4 Data Recover Establish and Maintain an Isolated Instance of Recovery Data 1 2 3 ✓ ✓ ✓ ✓
Establish and maintain an isolated instance of recovery data. Example implementations include, version controlling
backup destinations through offline, cloud, or off-site systems or services.
Test backup recovery quarterly, or more frequently, for a sampling of in-scope enterprise assets.
CIS Controls Cloud Companion Guide CIS Control 11: Data Recovery 30
Cloud Service and When considering deployment models, you will find that this CIS Control and Safeguards
Deployment Considerations are applicable for Private (on-prem). For Private (third-party hosted), Public, and Hybrid
deployment models, you will need to defer to the service/deployment model(s) your
enterprise is using.
• Private (on-prem) — The administrator (cloud consumer) is responsible for all data recovery
capabilities in the environment.
• IaaS — The administrator (cloud consumer) is responsible for data recovery capabilities
for all software, virtual servers, virtual networking, middleware, and applications, where
applicable, in the cloud environment.
• PaaS — The administrator (cloud consumer) is responsible for data recovery capabilities
for all applications, hosting environment operating systems settings, and developing the
tools utilized.
• SaaS — The administrator (cloud consumer) is responsible for data recovery capabilities for
the application/software that is running as a service in the cloud environment.
• FaaS — The administrator (cloud consumer) is responsible for data recovery capabilities for
the code and functions that are running as a service in the cloud environment.
CIS Controls Cloud Companion Guide CIS Control 11: Data Recovery 31
CIS CONTROL
12 Network Infrastructure
Management
Overview Establish, implement, and actively manage (track, report, correct) network devices, in
order to prevent attackers from exploiting vulnerable network services and access points.
Cloud Applicability This CIS Control addresses the need to manage the configuration of the network using
architecture diagrams along with authentication, authorization, and auditing. The network
infrastructure of a cloud environment should require the same rigorous configuration
management and change control process as a physical environment. Attack vectors, although
virtual, remain the same with unsecure services, poor firewall and network configurations, and
default or legacy credentials.
IMPLEMENTATION APPLICABILITY OF
CIS Control 12: Network Infrastructure Management GROUPS SERVICE MODEL
SECURITY
SAFEGUARD ASSET TYPE CONTROL TITLE/DESCRIPTION IG1 IG2 IG3 IaaS PaaS SaaS FaaS
FUNCTION
Ensure network infrastructure is kept up-to-date. Example implementations include running the latest stable release of
software and/or using currently supported network-as-a-service (NaaS) offerings. Review software versions monthly, or
more frequently, to verify software support.
Establish and maintain a secure network architecture. A secure network architecture must address segmentation, least
privilege, and availability, at a minimum.
Establish and maintain architecture diagram(s) and/or other network system documentation. Review and update
documentation annually, or when significant enterprise changes occur that could impact this Safeguard.
12.5 Network Protect Centralize Network Authentication, Authorization, and Auditing (AAA) 2 3 ✓
12.6 Network Protect Use of Secure Network Management and Communication Protocols 2 3 ✓
Use secure network management and communication protocols (e.g. 802.1X, Wi-Fi Protected Access 2 (WPA2)
Enterprise or greater).
CIS Controls Cloud Companion Guide CIS Control 12: Network Infrastructure Management 32
IMPLEMENTATION APPLICABILITY OF
CIS Control 12: Network Infrastructure Management GROUPS SERVICE MODEL
SECURITY
SAFEGUARD ASSET TYPE CONTROL TITLE/DESCRIPTION IG1 IG2 IG3 IaaS PaaS SaaS FaaS
FUNCTION
12.7 Devices Protect Ensure Remote Devices Utilize a VPN and are Connecting to an 2 3 ✓
Enterprise’s AAA Infrastructure
Require users to authenticate using MFA to enterprise-managed VPN and authentication services prior to accessing
enterprise resources on end-user devices.
12.8 Devices Protect Establish and Maintain Dedicated Computing Resources For All 3 ✓
Administrative Work
Establish and maintain dedicated computing resources, either physically or logically separated, for all administrative
tasks or tasks requiring administrative access. The computing resources should be segmented from the enterprise’s
primary network and not be allowed internet access.
Cloud Service and When considering deployment models, you will find that this CIS Control and Safeguards
Deployment Considerations are applicable for Private (on-prem). For Private (third-party hosted), Public, and Hybrid
deployment models, you will need to defer to the service/deployment model(s) your
enterprise is using.
• Private (on-prem) — The local administrator (cloud consumer) is responsible for the secure
configuration of all network devices.
• IaaS — The administrator (cloud consumer) deploys, operates, and maintains the virtual
networks and web application firewalls within this service model but does not manage
the underlying cloud infrastructure like the physical servers, physical network, storage,
hypervisor, etc., as that is the responsibility of the CSP.
• PaaS — The administrator (cloud consumer) manages the application, the host environment
network settings, and the development tools network settings. The CSP is responsible for
the physical servers, physical network, storage, hypervisor, and operating systems.
• SaaS — This is not applicable for the cloud consumer. The CSP is responsible for all physical
and virtual network device configuration.
• FaaS — This is not applicable for the cloud consumer. The CSP is responsible for all physical
and virtual network device configuration.
CIS Controls Cloud Companion Guide CIS Control 12: Network Infrastructure Management 33
CIS CONTROL
13 Network Monitoring
and Defense
Overview Operate processes and tooling to establish and maintain comprehensive network
monitoring and defense against security threats across the enterprise’s network
infrastructure and user base.
Cloud Applicability This CIS Control focuses on the importance of managing the flow of information between
networks of different trust levels. To control the flow of traffic through network borders and
police content by looking for attacks and evidence of compromised machines, boundary
defenses should be multi-layered, relying on firewalls, proxies, demilitarized zone (DMZ)
perimeter networks, network-based intrusion prevention systems (IPS) and intrusion detection
systems (IDS). It is also critical to filter both inbound and outbound traffic. This can be
challenging in a cloud environment, as you do not always have the ability to set up multiple
layers to the same extent you can in a physical setup. Therefore, your boundary changes,
along with where you set up that defense. Nonetheless, you still have to set up some defense.
IMPLEMENTATION APPLICABILITY OF
CIS Control 13: Network Monitoring and Defense GROUPS SERVICE MODEL
SECURITY
SAFEGUARD ASSET TYPE CONTROL TITLE/DESCRIPTION IG1 IG2 IG3 IaaS PaaS SaaS FaaS
FUNCTION
Centralize security event alerting across enterprise assets for log correlation and analysis. Best practice implementation
requires the use of a security information and event management (SIEM), which includes vendor-defined event correlation
alerts; a log analytics platform configured with security-relevant correlation alerts also satisfies this Safeguard.
Deploy a host-based intrusion detection solution on enterprise assets, where appropriate and/or supported.
Deploy a network intrusion detection solution on enterprise assets, where appropriate. Example implementations
include the use of a Network Intrusion Detection System (NIDS) or equivalent Cloud Service Provider (CSP) service.
Manage access control for assets remotely connecting to enterprise resources. Determine amount of access to
enterprise resources based on: up-to-date anti-malware software installed, configuration compliance with the
enterprise’s secure configuration process, and ensuring the operating system and applications are up-to-date.
Collect network traffic flow logs and/or network traffic to review and alert upon from network devices.
Deploy a host-based intrusion prevention solution on enterprise assets, where appropriate and/or supported. Example
implementations include use of an Endpoint Detection and Response (EDR) client or host-based IPS agent.
CIS Controls Cloud Companion Guide CIS Control 13: Network Monitoring and Defense 34
IMPLEMENTATION APPLICABILITY OF
CIS Control 13: Network Monitoring and Defense GROUPS SERVICE MODEL
SECURITY
SAFEGUARD ASSET TYPE CONTROL TITLE/DESCRIPTION IG1 IG2 IG3 IaaS PaaS SaaS FaaS
FUNCTION
Deploy a network intrusion prevention solution, where appropriate. Example implementations include the use of a
Network Intrusion Prevention System (NIPS) or equivalent CSP service.
Deploy port-level access control. Port-level access control utilizes 802.1x, or similar network access control protocols,
such as certificates, and may incorporate user and/or device authentication.
Perform application layer filtering. Example implementations include a filtering proxy, application layer firewall, or
gateway.
Cloud Service and When considering deployment models, you will find that this CIS Control and Safeguards
Deployment Considerations are applicable for Private (on-prem). For Private (third-party hosted), Public, and Hybrid
deployment models, you will need to defer to the service/deployment model(s) your
enterprise is using.
CIS Controls Cloud Companion Guide CIS Control 13: Network Monitoring and Defense 35
CIS CONTROL
14 Security Awareness
and Skills Training
Overview Establish and maintain a security awareness program to influence behavior among the
workforce to be security conscious and properly skilled to reduce cybersecurity risks to
the enterprise.
Cloud Applicability This CIS Control focuses on educating and training the enterprise workforce in a range
of security practices that span from “basic to advanced skills” to “security awareness and
vigilance.” Human error, oversights, and negligence are leading causes of security weakness,
and the consequences of untrained or infrequently trained personnel in a cloud environment
can have a range of damaging effects. Regardless of the service model or deployment,
security awareness and training are the responsibility of the enterprise operating in the cloud.
IMPLEMENTATION APPLICABILITY OF
CIS Control 14: Security Awareness and Skills Training GROUPS SERVICE MODEL
SECURITY
SAFEGUARD ASSET TYPE CONTROL TITLE/DESCRIPTION IG1 IG2 IG3 IaaS PaaS SaaS FaaS
FUNCTION
Establish and maintain a security awareness program. The purpose of a security awareness program is to educate the
enterprise’s workforce on how to interact with enterprise assets and data in a secure manner. Conduct training at hire
and, at a minimum, annually. Review and update content annually, or when significant enterprise changes occur that
could impact this Safeguard.
Train workforce members to recognize social engineering attacks, such as phishing, pre-texting, and tailgating.
Train workforce members on authentication best practices. Example topics include MFA, password composition, and
credential management.
Train workforce members on how to identify and properly store, transfer, archive, and destroy sensitive data. This also
includes training workforce members on clear screen and desk best practices, such as locking their screen when they
step away from their enterprise asset, erasing physical and virtual whiteboards at the end of meetings, and storing data
and assets securely.
Train workforce members to be aware of causes for unintentional data exposure. Example topics include misdelivery of
sensitive data, losing a portable end-user device, or publishing data to unintended audiences.
Train workforce members to be able to recognize a potential incident and be able to report such an incident.
CIS Controls Cloud Companion Guide CIS Control 14: Security Awareness and Skills Training 36
IMPLEMENTATION APPLICABILITY OF
CIS Control 14: Security Awareness and Skills Training GROUPS SERVICE MODEL
SECURITY
SAFEGUARD ASSET TYPE CONTROL TITLE/DESCRIPTION IG1 IG2 IG3 IaaS PaaS SaaS FaaS
FUNCTION
14.7 Protect Train Workforce on How to Identify and Report if their Enterprise 1 2 3 ✓ ✓ ✓ ✓
Assets are Missing Security Updates
Train workforce to understand how to verify and report out-of-date software patches or any failures in automated
processes and tools. Part of this training should include notifying IT personnel of any failures in automated processes
and tools.
Train workforce members on the dangers of connecting to, and transmitting data over, insecure networks for enterprise
activities. If the enterprise has remote workers, training must include guidance to ensure that all users securely
configure their home network infrastructure.
Conduct role-specific security awareness and skills training. Example implementations include secure system
administration courses for IT professionals, OWASP® Top 10 vulnerability awareness and prevention training for web
application developers, and advanced social engineering awareness training for high-profile roles.
Cloud Service and When considering deployment models, you will find that this CIS Control and Safeguards
Deployment Considerations are applicable for Private (on-prem). For Private (third-party hosted), Public, and Hybrid
deployment models, you will need to defer to the service/deployment model(s) your
enterprise is using.
Private Cloud (on-prem) is not a shared security model like public cloud. So the responsibility
is strictly on the organization to provide and meet all security standards.
Be aware that Private Cloud deployments are not necessarily more secure than any other
deployment method. It requires diligence and attention to:
• Breach Exposure
• Physical Security Risk
• Compliance Issues
• Responsiveness, Capacity, Performance, and Uptime
CLOUD CONSIDERATIONS
• The security awareness and training program is solely the cloud consumer’s responsibility.
Although the CSP should implement their own security training program, this CIS Control
and its applicability to the cloud environment is a requirement for the cloud consumer.
CIS Controls Cloud Companion Guide CIS Control 14: Security Awareness and Skills Training 37
CIS CONTROL
15 Service Provider
Management
Overview Develop a process to evaluate service providers who hold sensitive data, or are
responsible for an enterprise’s critical IT platforms or processes, to ensure these
providers are protecting those platforms and data appropriately.
Cloud Applicability This CIS Control focuses on evaluating and maintaining the many different service providers
that can be utilized by an enterprise. Service providers can be classified as internal, external
or shared. They can include many different types from: application, cloud, internet, managed,
etc. At times, the service provider will handle and hold your enterprise’s sensitive data. When
working in the cloud, you are often storing and transferring sensitive data; and, based on the
shared responsibility of the enterprise operating in the cloud, keeping track of this information
is critical.
IMPLEMENTATION APPLICABILITY OF
CIS Control 15: Service Provider Management GROUPS SERVICE MODEL
SECURITY
SAFEGUARD ASSET TYPE CONTROL TITLE/DESCRIPTION IG1 IG2 IG3 IaaS PaaS SaaS FaaS
FUNCTION
Establish and maintain an inventory of service providers. The inventory is to list all known service providers, include
classification(s), and designate an enterprise contact for each service provider. Review and update the inventory
annually, or when significant enterprise changes occur that could impact this Safeguard.
Establish and maintain a service provider management policy. Ensure the policy addresses the classification, inventory,
assessment, monitoring, and decommissioning of service providers. Review and update the policy annually, or when
significant enterprise changes occur that could impact this Safeguard.
Classify service providers. Classification consideration may include one or more characteristics, such as data
sensitivity, data volume, availability requirements, applicable regulations, inherent risk, and mitigated risk. Update and
review classifications annually, or when significant enterprise changes occur that could impact this Safeguard.
Ensure service provider contracts include security requirements. Example requirements may include minimum security
program requirements, security incident and/or data breach notification and response, data encryption requirements,
and data disposal commitments, and must be consistent with the enterprise’s service provider management policy.
Review service provider contracts annually to ensure contracts are not missing security requirements.
Assess service providers consistent with the enterprise’s service provider management policy. Assessment scope
may vary based on classification(s), and may include review of standardized assessment reports, such as Service
Organizational Control 2 (SOC 2) and Payment Card Industry (PCI) Attestation of Compliance (AoC), customized
questionnaire, or other appropriately rigorous process. Reassess service providers annually, at a minimum, or with new
and renewed contracts.
CIS Controls Cloud Companion Guide CIS Control 15: Service Provider Management 38
IMPLEMENTATION APPLICABILITY OF
CIS Control 15: Service Provider Management GROUPS SERVICE MODEL
SECURITY
SAFEGUARD ASSET TYPE CONTROL TITLE/DESCRIPTION IG1 IG2 IG3 IaaS PaaS SaaS FaaS
FUNCTION
Monitor service providers consistent with the enterprise’s service provider management policy. Monitoring may include
periodic reassessment of service provider compliance, monitoring service provider release notes, and dark web
monitoring.
Securely decommission service providers. Example considerations include user and service account deactivation,
termination of data flows, and secure disposal of enterprise data within service provider systems.
Cloud Service and When considering deployment models, you will find that this CIS Control and Safeguards
Deployment Considerations are applicable for Private (on-prem). For Private (third party hosted), Public, and Hybrid
deployment models, you will need to defer to the service/deployment model(s) your
enterprise is using.
CIS Controls Cloud Companion Guide CIS Control 15: Service Provider Management 39
CIS CONTROL
16 Application Software
Security
Overview Manage the security life cycle of in-house developed, hosted, or acquired software
to prevent, detect, and remediate security weaknesses before they can impact
the enterprise.
Cloud Applicability This CIS Control focuses on the security of applications (in-house developed or acquired
off the shelf or from external developers). This is a complex activity requiring a complete
program encompassing enterprise-wide policy, technology, and the role of people. Any
cloud environment service model or deployment model should be a part of this program.
All software should be regularly tested for vulnerabilities when applicable. The operational
practice of scanning for application vulnerabilities is consolidated within CIS Control 3:
Continuous Vulnerability Management. However, the most effective approach is to implement
a full supply chain security program for externally acquired software and a Secure Software
Development Life Cycle for internally developed software.
IMPLEMENTATION APPLICABILITY OF
CIS Control 16: Application Software Security GROUPS SERVICE MODEL
SECURITY
SAFEGUARD ASSET TYPE CONTROL TITLE/DESCRIPTION IG1 IG2 IG3 IaaS PaaS SaaS FaaS
FUNCTION
Establish and maintain a secure application development process. In the process, address such items as: secure
application design standards, secure coding practices, developer training, vulnerability management, security of
third-party code, and application security testing procedures. Review and update documentation annually, or when
significant enterprise changes occur that could impact this Safeguard.
16.2 Applications Protect Establish and Maintain a Process to Accept and Address Software 2 3 ✓ ✓ ✓ ✓
Vulnerabilities
Establish and maintain a process to accept and address reports of software vulnerabilities, including providing a
means for external entities to report. The process is to include such items as: a vulnerability handling policy that
identifies reporting process, responsible party for handling vulnerability reports, and a process for intake, assignment,
remediation, and remediation testing. As part of the process, use a vulnerability tracking system that includes severity
ratings, and metrics for measuring timing for identification, analysis, and remediation of vulnerabilities. Review and
update documentation annually, or when significant enterprise changes occur that could impact this Safeguard.
Third-party application developers need to consider this an externally-facing policy that helps to set expectations for
outside stakeholders.
Perform root cause analysis on security vulnerabilities. When reviewing vulnerabilities, root cause analysis is the task
of evaluating underlying issues that creates vulnerabilities in code, and allows development teams to move beyond just
fixing individual vulnerabilities as they arise.
Establish and manage an updated inventory of third-party components used in development, often referred to as a “bill
of materials,” as well as components slated for future use. This inventory is to include any risks that each third-party
component could pose. Evaluate the list at least monthly to identify any changes or updates to these components, and
validate the component is still supported.
CIS Controls Cloud Companion Guide CIS Control 16: Application Software Security 40
IMPLEMENTATION APPLICABILITY OF
CIS Control 16: Application Software Security GROUPS SERVICE MODEL
SECURITY
SAFEGUARD ASSET TYPE CONTROL TITLE/DESCRIPTION IG1 IG2 IG3 IaaS PaaS SaaS FaaS
FUNCTION
16.5 Applications Protect Use Up-to-Date and Trusted Third-Party Software Components 2 3 ✓ ✓ ✓
Use up-to-date and trusted third-party software components. When possible, choose established and proven
frameworks and libraries that provide adequate security. Acquire these components from trusted sources or evaluate
the software for vulnerabilities before use.
16.6 Applications Protect Establish and Maintain a Severity Rating System and Process for 2 3 ✓ ✓ ✓ ✓
Application Vulnerabilities
Establish and maintain a severity rating system and process for application vulnerabilities that facilitates prioritizing
the order in which discovered vulnerabilities are fixed. This process includes setting a minimum level of security
acceptability for releasing code or applications. Severity ratings bring a systematic way of triaging vulnerabilities that
improves risk management and helps ensure the most severe bugs are fixed first. Review and update the system and
process annually.
16.7 Applications Protect Use Standard Hardening Configuration Templates for Application 2 3 ✓ ✓ ✓ ✓
Infrastructure
Use standard, industry-recommended hardening configuration templates for application infrastructure components.
This includes underlying servers, databases, and web servers, and applies to cloud containers, Platform as a Service
(PaaS) components, and SaaS components. Do not allow in-house developed software to weaken configuration
hardening.
16.9 Applications Protect Train Developers in Application Security Concepts and Secure Coding 2 3 ✓ ✓ ✓ ✓
Ensure that all software development personnel receive training in writing secure code for their specific development
environment and responsibilities. Training can include general security principles and application security standard
practices. Conduct training at least annually and design in a way to promote security within the development team, and
build a culture of security among the developers.
Apply secure design principles in application architectures including the security of APIs involved. Secure design
principles include the concept of least privilege and enforcing mediation to validate every operation that the user
makes, promoting the concept of “never trust user input.” Examples include ensuring that explicit error checking is
performed and documented for all input, including for size, data type, and acceptable ranges or formats. Secure design
also means minimizing the application infrastructure attack surface, such as turning off unprotected ports and services,
removing unnecessary programs and files, and renaming or removing default accounts.
16.11 Applications Protect Leverage Vetted Modules or Services for Application Security 2 3 ✓ ✓ ✓ ✓
Components
Leverage vetted modules or services for application security components, such as identity management, encryption,
and auditing and logging. Using platform features in critical security functions will reduce developers’ workload and
minimize the likelihood of design or implementation errors. Modern operating systems provide effective mechanisms
for identification, authentication, and authorization and make those mechanisms available to applications. Use only
standardized, currently accepted, and extensively reviewed encryption algorithms. Operating systems also provide
mechanisms to create and maintain secure audit logs.
Apply static and dynamic analysis tools within the application life cycle to verify that secure coding practices are being
followed.
Conduct application penetration testing. For critical applications, authenticated penetration testing is better suited to
finding business logic vulnerabilities than code scanning and automated security testing. Penetration testing relies on
the skill of the tester to manually manipulate an application as an authenticated and unauthenticated user.
CIS Controls Cloud Companion Guide CIS Control 16: Application Software Security 41
IMPLEMENTATION APPLICABILITY OF
CIS Control 16: Application Software Security GROUPS SERVICE MODEL
SECURITY
SAFEGUARD ASSET TYPE CONTROL TITLE/DESCRIPTION IG1 IG2 IG3 IaaS PaaS SaaS FaaS
FUNCTION
Conduct threat modeling. Threat modeling is the process of identifying and addressing application security design
flaws within a design, before code is created. It is conducted through specially trained individuals who evaluate the
application design and gauge security risks for each entry point and access level. The goal is to map out the application,
architecture, and infrastructure in a structured way to understand its weaknesses.
Cloud Service and When considering deployment models, you will find that this CIS Control and Safeguards
Deployment Considerations are applicable for Private (on-prem). For Private (third-party hosted), Public, and Hybrid
deployment models, you will need to defer to the service/deployment model(s) your
enterprise is using.
CIS Controls Cloud Companion Guide CIS Control 16: Application Software Security 42
CIS CONTROL
17 Incident Response
Management
Overview Establish a program to develop and maintain an incident response capability (e.g.,
policies, plans, procedures, defined roles, training, and communications) to prepare,
detect, and quickly respond to an attack.
Cloud Applicability This CIS Control focuses on how to manage and respond to a successful cyber-attack against
an enterprise. The question of a successful cyber-attack against an enterprise is not “if” but
“when.” Cyber incidents are now just part of our way of life. Even large, well-funded, and
technically sophisticated enterprises struggle to keep up with the frequency and complexity
of attacks. When an incident occurs, it is too late to develop the right procedures, reporting,
data collection, management responsibility, legal protocols, and communications strategy that
will allow the enterprise to successfully manage and recover. Without an incident response
plan, an enterprise may not discover an attack in the first place, or, if the attack is detected,
the enterprise may not follow good procedures to contain damage, eradicate the attacker’s
presence, and recover in a secure fashion.
IMPLEMENTATION APPLICABILITY OF
CIS Control 17: Incident Response Management GROUPS SERVICE MODEL
SECURITY
SAFEGUARD ASSET TYPE CONTROL TITLE/DESCRIPTION IG1 IG2 IG3 IaaS PaaS SaaS FaaS
FUNCTION
Designate one key person, and at least one backup, who will manage the enterprise’s incident handling process.
Management personnel are responsible for the coordination and documentation of incident response and recovery
efforts and can consist of employees internal to the enterprise, third-party vendors, or a hybrid approach. If using a
third-party vendor, designate at least one person internal to the enterprise to oversee any third-party work. Review
annually, or when significant enterprise changes occur that could impact this Safeguard.
17.2 Respond Establish and Maintain Contact Information for Reporting Security 1 2 3 ✓ ✓ ✓ ✓
Incidents
Establish and maintain contact information for parties that need to be informed of security incidents. Contacts may
include internal staff, third-party vendors, law enforcement, cyber insurance providers, relevant government agencies,
Information Sharing and Analysis Center (ISAC) partners, or other stakeholders. Verify contacts annually to ensure that
information is up-to-date.
17.3 Respond Establish and Maintain an Enterprise Process for Reporting Incidents 1 2 3 ✓ ✓ ✓ ✓
Establish and maintain an enterprise process for the workforce to report security incidents. The process includes
reporting timeframe, personnel to report to, mechanism for reporting, and the minimum information to be reported.
Ensure the process is publicly available to all of the workforce. Review annually, or when significant enterprise changes
occur that could impact this Safeguard.
Establish and maintain an incident response process that addresses roles and responsibilities, compliance
requirements, and a communication plan. Review annually, or when significant enterprise changes occur that could
impact this Safeguard.
CIS Controls Cloud Companion Guide CIS Control 17: Incident Response Management 43
IMPLEMENTATION APPLICABILITY OF
CIS Control 17: Incident Response Management GROUPS SERVICE MODEL
SECURITY
SAFEGUARD ASSET TYPE CONTROL TITLE/DESCRIPTION IG1 IG2 IG3 IaaS PaaS SaaS FaaS
FUNCTION
Assign key roles and responsibilities for incident response, including staff from legal, IT, information security, facilities,
public relations, human resources, incident responders and analysts, as applicable. Review annually, or when
significant enterprise changes occur that could impact this Safeguard.
Determine which primary and secondary mechanisms will be used to communicate and report during a security
incident. Mechanisms can include phone calls, emails, or letters. Keep in mind that certain mechanisms, such as emails,
can be affected during a security incident. Review annually, or when significant enterprise changes occur that could
impact this Safeguard.
Plan and conduct routine incident response exercises and scenarios for key personnel involved in the incident response
process to prepare for responding to real-world incidents. Exercises need to test communication channels, decision-
making, and workflows. Conduct testing on an annual basis, at a minimum.
Conduct post-incident reviews. Post-incident reviews help prevent incident recurrence through identifying lessons
learned and follow-up action.
Establish and maintain security incident thresholds, including, at a minimum, differentiating between an incident and
an event. Examples can include, abnormal activity, security vulnerability, security weakness, data breach, privacy
incident, etc. Review annually, or when significant enterprise changes occur that could impact this Safeguard.
Cloud Service and When considering deployment models, you will find that this CIS Control and Safeguards
Deployment Considerations are applicable for Private (on-prem). For Private (third-party hosted), Public, and Hybrid
deployment models, you will need to defer to the service/deployment model(s) your
enterprise is using.
Incident response and management is no different in the cloud. If you have process and
procedures in place organizationally, they can be utilized for any of the cloud service and
deployment models. The major consideration is where the security management lies and the
conversations that you will have with the CSP around the incident.
CIS Controls Cloud Companion Guide CIS Control 17: Incident Response Management 44
CIS CONTROL
18 Penetration
Testing
Overview Test the effectiveness and resiliency of enterprise assets through identifying and
exploiting weaknesses in controls (people, processes, and technology), and simulating
the objectives and actions of an attacker.
Cloud Applicability This CIS Control is focused on designing and conducting controlled penetration testing in an
operational technology environment, including connected devices and systems regardless
of their location and nature (physical, virtual, cloud). Attackers often exploit the gap between
good defensive designs and intentions and implementation or maintenance. Examples
include: the time window between announcement of a vulnerability, the availability of a vendor
patch, and actual installation on every machine. Other examples include: failure to apply good
configurations to machines that come on and off of the network, and failure to understand
the interaction among multiple defensive tools, or with normal system operations that have
security implications.
As outlined in the Controls, penetration tests can provide significant value and improvement,
but only when basic defensive measures are already in place and when these tests are
performed as part of a comprehensive, ongoing security management program. Each
enterprise should define a clear scope and rules of engagement for penetration testing and
Red Team analyses. The scope of such projects should include, at a minimum, systems with
the enterprise’s highest value information and production processing functionality.
IMPLEMENTATION APPLICABILITY OF
CIS Control 18: Penetration Testing GROUPS SERVICE MODEL
SECURITY
SAFEGUARD ASSET TYPE CONTROL TITLE/DESCRIPTION IG1 IG2 IG3 IaaS PaaS SaaS FaaS
FUNCTION
Establish and maintain a penetration testing program appropriate to the size, complexity, and maturity of the
enterprise. Penetration testing program characteristics include: scope, such as network, web application, Application
Programming Interface (API), hosted services, and physical premise controls, frequency; limitations, such as acceptable
hours, and excluded attack types, point of contact information, remediation, such as how findings will be routed
internally, and retrospective requirements.
Perform periodic external penetration tests based on program requirements, no less than annually. External penetration
testing must include enterprise and environmental reconnaissance to detect exploitable information. Penetration
testing requires specialized skills and experience and must be conducted through a qualified party. The testing may be
clear box or opaque box.
Remediate penetration test findings based on the enterprise’s policy for remediation scope and prioritization.
Validate security measures after each penetration test. If deemed necessary, modify rulesets and capabilities to detect
the techniques used during testing.
CIS Controls Cloud Companion Guide CIS Control 18: Penetration Testing 45
IMPLEMENTATION APPLICABILITY OF
CIS Control 18: Penetration Testing GROUPS SERVICE MODEL
SECURITY
SAFEGUARD ASSET TYPE CONTROL TITLE/DESCRIPTION IG1 IG2 IG3 IaaS PaaS SaaS FaaS
FUNCTION
Perform periodic internal penetration tests based on program requirements, no less than annually. The testing may be
clear box or opaque box.
Cloud Service and When considering deployment models, you will find that this CIS Control and Safeguards
Deployment Considerations are applicable for Private (on-prem). For Private (third-party hosted), Public, and Hybrid
deployment models, you will need to defer to the service/deployment model(s) your
enterprise is using.
Pen testing is no different in the cloud. If you have process and procedures in place
organizationally, they can be utilized for any of the cloud service and deployment models. The
major consideration is where the security management lies and the conversations that you will
have with the CSP if an exception is detected.
CLOUD CONSIDERATIONS
• Running pen tests will require the cloud consumer to request permission from the CSP. As
part of this request, the consumer will often have to provide detailed information to include
any IPs to be scanned, source IPs, timeframe, etc. A penetration tester might have to obtain
credentials to any third-party tools that complement the cloud provider tools available in
the security center to obtain a complete picture of the client’s security operations. The
penetration tester, when doing a cloud review, will also need, at minimum, the Reader and
SecurityReader roles to include access to the cloud provider’s security center.
• While you may need permission to test from the FaaS service provider, regular testing
against the application interface should be a part of this process. Penetration testing
against FaaS may require commentary to permit exceptions where this is not practical, or is
explicitly prohibited by the FaaS service provider. In the case that pen testing is not practical
or is prohibited, source code review should be done in addition to performing security
related unit testing.
CIS Controls Cloud Companion Guide CIS Control 18: Penetration Testing 46
Appendix
API Application Program Interface ISAC Information Sharing and Analysis Center
CWPP Cloud Workload Protection Platforms NIDS Network Intrusion Detection System
DevSecOps Development, Security, and Operations, Automats the NIS National Intelligence Service
Integration of Security
OpenSSH Open Secure Shell
DHCP Dynamic Host Configuration Protocol
OT Operational Technology
DKIM DomainKeys Identified Mail
PaaS Platform as a Service
DLP Data Loss Prevention
PCI Payment Card Industry
DMARC Domain-based Message Authentication Reporting, and
Conformance RBAC Role-Based Access Control
EDR Endpoint Detection and Response SIEM Security Information and Event Management
CONTACT In this document, we provide guidance on how to apply the security best practices found in
CIS CIS Controls Version 8 to cloud environments. You can find the newest version of the CIS
31 Tech Valley Drive Controls and other complementary documents at www.cisecurity.org.
East Greenbush, NY 12061
518.266.3460 As a nonprofit organization driven by its volunteers, we are always in the process of looking
[email protected] for new topics and for assistance in creating cybersecurity guidance. If you are interested
in volunteering or if you have questions, comments, or have identified ways to improve this
guide, please contact us at [email protected].
All references to tools or other products in this document are provided for informational
purposes only, and do not represent the endorsement by CIS of any particular company,
product, or technology.
Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries.
cisecurity.org
[email protected]
518-266-3460
Center for Internet Security
@CISecurity
TheCISecurity
cisecurity