New feature release, internal Vulnerabilities –

Explore Supported Frameworks

CIS-18 v8.0 IG1

Select from a range of over 50 supported frameworks

**CIS-18 v8.0 IG1: A Cornerstone Framework for Enhanced Cybersecurity**

**Overview:**

The CIS-18 v8.0 IG1, short for the Center for Internet Security Controls version 8.0 Implementation Group 1, is a comprehensive cybersecurity framework designed to provide organizations with a prioritized set of actions to improve their cyber defense capabilities. Developed by the Center for Internet Security (CIS), a global non-profit entity focused on securing public and private sector organisations against cyber threats, the CIS-18 framework serves as a guide to safeguarding against prevalent security challenges.

This framework is especially crucial for Chief Information Security Officers (CISOs), security professionals, and IT managers who are at the forefront of protecting their organizations’ digital assets against increasingly sophisticated cyber attacks.

**Key Components/Pillars:**

The CIS-18 v8.0 IG1 is built on a foundation of best practices and actionable controls that span various security domains. While the complete framework encompasses 18 critical controls, the Implementation Group 1 (IG1) focuses on a prioritised subset tailored for small to medium-sized organisations or those beginning their cybersecurity journey.

**Guidelines/Controls:**

1. **Governance and Risk Management:** The framework emphasizes the development of a sound cybersecurity governance structure, incorporating risk assessment and mitigation strategies to manage cyber risks effectively.

2. **Personnel Security:** Guidelines for ensuring that employees, contractors, and third-party users understand their roles and responsibilities in maintaining cybersecurity, including security awareness training and background checks.

3. **Physical Security:** Controls to protect physical assets and data from unauthorized access, damage, or interference, including secure physical access to IT systems and facilities.

4. **System Hardening and Configuration:** Best practices for securing systems and applications by implementing secure configurations, reducing the system’s attack surface.

5. **Access Control:** Principles for managing access to information and systems, including least privilege and segregation of duties, to minimize risk exposure.

6. **Cryptography:** Standards for protecting information confidentiality and integrity through cryptographic means, ensuring secure storage, and transmission of data.

7. **Incident Response:** Guidance on preparing for and managing cybersecurity incidents to reduce impact and recover from breaches effectively.

**Implementation and Compliance:**

The framework advocates a risk-based and iterative approach to implementation, enabling organisations to progressively enhance their cybersecurity maturity. While there’s no formal certification for CIS-18 v8.0 IG1 compliance, the framework offers self-assessment tools and third-party assessment references to help organisations measure and improve their security posture.

**Additional Resources:**

CIS provides a suite of complementary resources, including advisories, alerts, and training programmes. For more detailed information, visit the official [Center for Internet Security (CIS)](https://www.cisecurity.org/) website and access the [CIS Controls v8.0 documentation](https://www.cisecurity.org/controls/cis-controls-list/) for comprehensive guidance.

**Benefits and Adoption:**

Adopting the CIS-18 v8.0 IG1 framework offers tangible benefits, such as strengthening the organisation’s cyber resilience, protecting against data breaches, and ensuring compliance with relevant regulations. Various sectors, including government, healthcare, and finance, have recognised its value, integrating CIS controls into their cybersecurity strategies.

**In conclusion,** the CIS-18 v8.0 IG1 framework is an indispensable resource that equips organisations with the knowledge and tools needed to fortify their cybersecurity defenses. Its practical, actionable controls make it accessible for a wide range of audiences, from seasoned security professionals to organisations just beginning to focus on their cybersecurity efforts.

TESTIMONIALS

What our clients are saying

50+ FRAMEWORKS

and growing, all mapped back to a common set of controls

GUIDE

70% of Organisations Faced Major Business Disruption from a Breach Last Year

A security incident is no longer just an IT issue. With 7 in 10 organisations experiencing significant or very significant disruption due to a breach, the need for a structured and strategic approach to cyber risk is more urgent than ever.

Our Ultimate Guide to Creating a Security Improvement Strategy provides a practical 12-step framework to help you assess risk, prioritise actions and build a resilient security posture that protects your operations, reputation and bottom line.

*Cost of a Data Breach Report 2024, IBM

Security Improvement Strategy

Submitting your request...