The Top Five Controls
The Top Five Controls
The Top Five Controls
1)
Understanding the CIS Controls
In 2008, the Center for Internet Security (CIS) Controls – formerly known as the Critical
Security Controls – were created in collaboration with representatives from the U.S.
government and private sector security research organizations. A set of practical defenses
targeted toward stopping cyber attacks, the CIS Controls are technical in nature and define
specific, practical steps an organization can take to stop the most common cyber threats from
compromising their systems.
Put simply, the CIS Controls were developed to answer the frequent question: “Where should I
start when I want to improve my cyber defenses?”
While the CIS Controls are focused on technical action, the developers of the CIS Controls
recognize that many of these recommendations would force organizations to re -evaluate their
basic cybersecurity strategies and plans. There is no “magic box” solution for security. As with
any cybersecurity framework, success with the CIS Controls depends on an organization’s
available resources and commitment to operating from a new comprehensive roadmap for
improved cyber-defense.
At first, organizations implementing the CIS Controls may become discouraged, thinking that
the CIS Controls reflect too high a bar and are unachievable. This could not be further from the
truth. However, successful implementation of the CIS Controls will require many organizations
to shift their mindset on security processes and organizational culture. For example, no longer
can employees be allowed to install software at random or travel with sensitive data in their
pockets. This is probably the most significant obstacle most organizations need to overcome. In
this regard, buy-in and reinforcement from senior management are essential.
1
Organizations implementing the CIS Controls should assume that their efforts will take, on
average, between one and three years to achieve an initial level of conformance with the most
critical CIS Controls (i.e., the First 5) and possibly up to five years of dedicated effort to
successfully implement all or most of the CIS Controls. Ultimately, the spe ed of implementation
will largely depend on investments committed to the effort and the level of support from senior
management. For those looking to accelerate implementation, dividing the work among different
individuals/teams has worked well for several organizations.
Many organizations have found success by implementing the CIS Controls in a phased
approach, tackling some early and implementing others later as part of a long -term strategy
coordinated and approved by senior management. Organizations rar ely implement every sub-
control described in the CIS Controls (Version 6.0, for example, has 149 sub -controls). Most sub-
controls are foundational to effective cyber defense, while others provide advice on advanced
techniques (Version 6.1 was created to add categories for “foundational and “advanced”
controls).
A phased implementation approach also helps ensure that organizations receive the most
significant benefits by implementing the highest priority controls first. In fact, implementation of
asset inventory (CIS Controls 1 & 2) and standard configurations (CIS Control 3) often results in
cost savings as fewer resources are required to manage the organization’s cyber environment.
There are a few practical considerations to make when embarking on this jo urney.
Keeping these suggestions in mind and building them into the program’s plan will help to ensure
its success. Specifically, an organization should:
• Make a formal, conscious top-level decision to make the CIS Controls part of the
organization’s standard for cybersecurity. Senior management and the Board of Directors
should be on board for support and accountability.
• Assign a program manager who will be empowered and responsible for the
implementation of the CIS Controls.
• Decide who will be responsible for the long-term sustainability of maintaining cyber
defenses.
• Start with a gap analysis, assessment or audit of the current organization’s state against
the CIS Controls and develop an implementation plan scheduled with priority focus on the
First 5 CIS Controls.
• Document the long-term plan (3-5 years) for implementing cyber defenses that are not
already a part of the entity’s defensive strategy.
• Embed the definitions or goals of the CIS Controls into the organization’s security policies
to streamline their implementation.
• Ensure that internal and external auditors use the CIS Controls as a part of their
benchmark for assessing the organization’s security stance.
• Educate workforce members on the organization’s security goals and enlist their help as a
part of the long-term defense of the organization’s data.
2
While there may be other steps that help improve an organization’s chances of success, these
considerations are a good starting point for structuring a program to implement the CIS Controls.
Getting Started
A number of studies show that implementation of the First 5 CIS Controls provides an effective
defense against the most common cyber attacks (~85% of attacks). In an effort to help
organizations implement the First 5 CIS Controls, the objective of each is plainly described
below. These objectives can be used to help organizations determine how best to implement the
First 5 CIS Controls and sub-controls.
3
CIS Control 5 | Controlled Use of Administrative Privileges
This CIS Control ensures that workforce members have only the system rights, privileges and
permissions that they need in order to do their job – no more and no less than necessary.
Unfortunately, for the sake of speed and convenience, many organizations allow staff to have
local system or even domain administrator rights which are too generous and open the door for
abuse, accidental or otherwise. The simple answer for CIS Control 5 is to remove unnecessary
system rights or permissions. For larger organizations struggling with this task at scale, privilege
management vendors who can provide endpoint solutions to help lessen the administrative
burden.
With hard work and dedication, an effective cyber defense is achievable. As we know, rarely do
worthy rewards and accolades come easily. Organizations must assume that implementing and
then maintaining these technical defenses will be an ongoing program, not a short-term project
with a defined end date. As with any program, appropriate resources such as time, budgets, and
people must be dedicated to the effort to ensure its success.
About Us
CIS is a forward-thinking nonprofit entity that harnesses the power of a global IT community to
safeguard private and public organizations against cyber threats. Our CIS Controls and
Benchmarks are the global standard and recognized best practices for securing IT systems and
data against the most pervasive attacks. These proven guidelines are continually refined and
verified by a volunteer, global community of experienced IT professionals. CIS is home to the
Multi-State Information Sharing and Analysis Center (MS-ISAC), the go-to resource for cyber
threat prevention, protection, response, and recovery in state to tribal governments.