WoT

CIS Controls v8

Official standard
Full Name
CIS Critical Security Controls Version 8
Region
Global
Codes
29
Crosswalk Edges
0
Sign in to download nodes or crosswalk data as CSV.
Authority
Center for Internet Security (CIS)
Data Provenance
Manual TranscriptionLicense: CC BY-NC-SA 4.0Source

Hierarchy Explorer

Hierarchy Explorer
ctrl_01Control 01 - Inventory and Control of Enterprise Assets
ctrl_02Control 02 - Inventory and Control of Software Assets
ctrl_03Control 03 - Data Protection
ctrl_04Control 04 - Secure Configuration of Enterprise Assets and Software
ctrl_05Control 05 - Account Management
ctrl_06Control 06 - Access Control Management
ctrl_07Control 07 - Continuous Vulnerability Management
ctrl_08Control 08 - Audit Log Management
ctrl_09Control 09 - Email and Web Browser Protections
ctrl_10Control 10 - Malware Defenses
ctrl_11Control 11 - Data Recovery
ctrl_12Control 12 - Network Infrastructure Management
ctrl_13Control 13 - Network Monitoring and Defense
ctrl_14Control 14 - Security Awareness and Skills Training
ctrl_15Control 15 - Service Provider Management
ctrl_16Control 16 - Application Software Security
ctrl_17Control 17 - Incident Response Management
ctrl_18Control 18 - Penetration Testing
ig_1Implementation Group 1 (IG1) - Essential Cyber Hygiene
ig_2Implementation Group 2 (IG2) - Managed Security
ig_3Implementation Group 3 (IG3) - Comprehensive Security

Structure Overview

CIS Controls v8 - WorldOfTaxonomy | WorldOfTaxonomy