Small to mid sized organizations face many challenges, including shifting supply chains, staffing shortages, product development limitations, and staying competitive in an increasingly global marketplace. It’s no wonder cybersecurity can sometimes fall by the wayside. Attackers understand this all too well, which is why small businesses are their favorite targets.
Fortunately, cybersecurity is one burden no organization has to bear alone. The Center for Internet Security (CIS) maintains a current list of best practices for preventing the most common forms of cyberattack. Of course, not every organization has the same risk, so these recommendations are thoughtfully organized into three implementation groups.
In this blog, I’ll explore the guidelines for each group and provide tips on the best ways to implement them.
CIS Implementation Groups, Explained
Implementation Groups (IGs) help businesses prioritize implementing CIS Controls based on their risk. Find your group in the infographic below!
Pro tip: If your organization falls somewhere in between groups, in most instances, you should follow the recommendations of the group with the higher number. IG1 is considered a baseline for cybersecurity hygiene for all businesses, but these days, it is highly recommended that companies begin evaluating at least some of the controls in higher implementation groups to increase their security posture and decrease their risk.
Implementation Group 1 (IG1)
Size: Small to medium-sized
Resources: Limited IT resources and infrastructure
Industry: Not highly regulated
Data use: May handle a small amount of customer information and financial data
Examples: Local retail stores that do business online, small law firms, nonprofits
Implementation Group 2 (IG2)
Size: Medium to large
Resources: Moderate IT and cybersecurity resources
Industry: May require specific cybersecurity measures
Data use: May have access to larger volumes of sensitive data or critical systems
Examples: Regional banks, healthcare providers, universities, state governments
Implementation Group 3 (IG3)
Size: Large to enterprise-scale
Resources: Significant IT and cybersecurity resources with specialized teams
Industry: Often highly regulated and/or associated with critical infrastructure
Data use: Handles large volumes of highly sensitive data (e.g. personal, financial, and/or natural security-related)
Examples: Multinational institutions, large government agencies, critical infrastructure
An Overview of CIS Critical Security Controls
CIS Controls are also segmented into basic, foundational, and organizational controls. In total, there are currently 18 controls,
Each control is further broken down into multiple safeguards, but not every group needs to implement every safeguard — or every control, for that matter. Under each control, I’ll spell out what each group should be responsible for.
Security Controls Implementation by Group
Click through each of these to see additional context and resources, and get advice for your organization’s implementation group.
1. Inventory and Control of Enterprise Assets
It’s important to keep track of every device connected to your network because, after all, you can’t protect what you don’t know about! Use the safeguards listed next to your group (below) to make sure you’re sufficiently checking the box with this one.
Safeguards:
- Establish and maintain a detailed enterprise asset inventory
- Address unauthorized assets
- Utilize an active discovery tool
- Use dynamic host configuration protocol (DHCP) logging to update enterprise asset inventory
- Use a passive asset discovery tool
IG1: 1–2
IG2: 1–4
IG3: 1–5
2. Inventory and Control of Software Assets
Just like with hardware, you first need to know what software you have to protect it properly. Outdated or unmanaged software can pose security risks, but this control can also save you money if you find you’re using overlapping tools!
Safeguards:
- Establish and maintain a software inventory
- Ensure authorized software is currently supported
- Address unauthorized software
- Utilize automated software inventory tools
- Allowlist authorized software
- Allowlist authorized libraries
- Allowlist authorized scripts
IG1: 1–3
IG2: 1–6
IG3: 1–7
3. Data Protection
This control is designed to help organizations identify, manage, and protect their data from theft, loss, or misuse. 94% of companies that experience a severe data loss don’t survive.
Fortunately, proper data governance does a lot more than just prevent bad things from happening. It can also help you become more competitive. But to get started with protection, follow the safeguards for your group below.
Safeguards:
- Establish and maintain a data management process
- Establish and maintain a data inventory
- Configure data access control lists
- Enforce data retention
- Securely dispose of data
- Encrypt data on end-user devices
- Establish and maintain a data classification scheme
- Document data flows
- Encrypt data on removable media
- Encrypt sensitive data in transit
- Encrypt sensitive data at rest
- Segment data processing and storage based on sensitivity
- Deploy a data loss prevention solution
- Log sensitive data access
IG1: 1–6
IG2: 1–12
IG3: 1–14
4. Secure Configuration of Enterprise Assets and Software
Cloud platforms typically provide world-class cybersecurity features, but it’s up to end-users to configure them correctly. Overly permissive settings and other vulnerabilities can easily be exploited by hackers, which is why this control is so important.
Safeguards:
- Establish and maintain a secure configuration process
- Establish and maintain a secure configuration process for network infrastructure
- Ensure the use of dedicated administrative accounts
- Implement and manage a firewall on servers
- Implement and manage a firewall on end-user devices
- Securely manage enterprise assets and software
- Manage default accounts on enterprise assets and software
- Uninstall or disable unnecessary services on enterprise assets and software
- Configure trusted DNS servers on enterprise assets
- Enforce automatic device lockout on portable end-user devices
- Enforce remote wipe capability on portable end-user devices
- Separate enterprise workspaces on mobile end-user devices
IG1: 1–7
IG2: 1–11
IG3: 1–12
5. Account Management
When we perform in-depth cybersecurity assessments, we frequently find a wealth of users who have access to critical systems that shouldn’t. So if you haven’t yet, there’s no time like the present! Set up systems to control and monitor who can access your organization's devices, accounts, and software according to the safeguards below.
Safeguards:
- Establish and maintain an inventory of accounts
- Use unique passwords
- Disable dormant accounts
- Restrict administrator privileges to dedicated administrator accounts
- Establish and maintain an inventory of service accounts
- Centralize account management
IG1: 1–4
IG2: 1–6
IG3: 1–6
6. Access Control Management
I know that multi-factor authentication (MFA) isn’t everyone’s favorite cybersecurity tool, but it should be! Organizations that use it are 99% less likely to be successfully hacked. So if you haven’t added it yet, that’s an excellent starting point for implementing the other safeguards you need.
Safeguards:
- Establish an access-granting process
- Establish an access-revoking process
- Require MFA for externally-exposed applications
- Require MFA for remote network access
- Require MFA for administrative access
- Establish and maintain an inventory of authentication and authorization systems
- Centralize access control
- Define and maintain role-based access control
IG1: 1–5
IG2: 1–7
IG3: 1–8
7. Continuous Vulnerability Management
Be sure to patch and update promptly, so you’re not giving cybercriminals more time to exploit vulnerabilities. We’ve got additional tracking and remediation resources if you need help!
Safeguards:
- Establish and maintain a vulnerability management process
- Establish and maintain a remediation process
- Perform automated operating system patch management
- Perform automated application patch management
- Perform automated vulnerability scans of internal enterprise assets
- Perform automated vulnerability scans of externally exposed enterprise assets
- Remediate detected vulnerabilities
IG1: 1–4
IG2: 1–7
IG3: 1–7
8. Audit Log Management
If you were being attacked, would you be able to respond quickly? Proper defensive strategies are extremely effective, but even the toughest defenses can still be breached, which is why it’s helpful to get alerted to a potential cybersecurity incident quickly.
Safeguards:
- Establish and maintain an audit log management process
- Collect audit logs
- Ensure adequate audit log storage
- Standardize time synchronization
- Collect detailed audit logs
- Collect DNS query audit logs
- Collect URL request audit logs
- Collect command-line audit logs
- Centralize audit logs
- Retain audit logs
- Conduct audit log reviews
- Collect service provider logs
IG1: 1–3
IG2: 1–11
IG3: 1–12
9. Email and Web Browser Protections
Email and web browsers are primary entry points for many cyber attacks, like phishing and malware. Your staff should be given proper security awareness training (highlighted in control #14), but the protections listed below can reduce the number of malicious emails and websites your staff is exposed to.
Safeguards:
- Ensure the use of only fully supported browsers and email clients
- Use DNS filtering services
- Maintain and enforce network-based URL filters
- Restrict unnecessary or unauthorized browser and email client extensions
- Implement DMARC
- Block unnecessary file types
- Deploy and maintain email server anti-malware protections
IG1: 1–2
IG2: 1–6
IG3: 1–7
10. Malware Defenses
Ready for a little bit of good news? So far in 2024, ransomware attacks have actually gone down! There are a few reasons for that. In February, an international operation was responsible for the arrest of multiple members of the LockBit ransomware syndicate! Last December, the FBI disrupted the ALPHV/BlackCat ransomware group. Also, more organizations have wised up and are refusing to pay ransoms.
Ransomware isn’t paying off like it used to, and there are more consequences for people who are still trying to use it. Still, we’re not out of the woods with this one, so malware defenses of some kind are still a non-negotiable necessity for all groups.
Safeguards:
- Deploy and maintain anti-malware software
- Configure automatic anti-malware signature updates
- Disable autorun and autoplay for removable media
- Configure automatic anti-malware scanning of removable media
- Enable anti-exploitation features
- Centrally manage anti-malware software
- Use behavior-based anti-malware software
IG1: 1–3
IG2: 1–7
IG3: 1–7
11. Data Recovery
Should any business experience a severe data loss for any reason, restoring business continuity quickly can be vital to the organization’s very survival. That’s why all of the following safeguards except for #5 are seen as necessary for all groups. However, I’d personally recommend that every organization test its data recovery solution. Fortunately, today’s cloud tools make it easy to back up data cost-effectively and restore it quickly.
Safeguards:
- Establish and maintain a data recovery process
- Perform automated backups
- Protect recovery data
- Establish and maintain an isolated instance of recovery data
- Test data recovery
IG1: 1–4
IG2: 1–5
IG3: 1–5
12. Network Infrastructure Management
These safeguards are designed to help you reduce vulnerabilities and attack surfaces. Group 1 — just make sure your infrastructure is up-to-date! Generally speaking, your infrastructure should be updated every 5–7 years.
Safeguards:
- Ensure network infrastructure is up-to-date
- Establish and maintain a secure network architecture
- Securely manage network infrastructure
- Establish and maintain architecture diagram(s)
- Centralize network authentication, authorization, and auditing (AAA)
- Use of secure network management and communication protocols
- Ensure remote devices utilize a VPN and are connecting to an enterprise’s AAA infrastructure
- Establish and maintain dedicated computing resources for all administrative work
IG1: 1
IG2: 1–7
IG3: 1–8
13. Network Monitoring and Defense
These safeguards are designed to help groups 2 and 3 respond to anomalies or threats promptly.
Safeguards:
- Centralize security event alerting
- Deploy a host-based intrusion detection solution
- Deploy a network intrusion detection solution
- Perform traffic filtering between network segments
- Manage access control for remote assets
- Collect network traffic flow logs
- Deploy a host-based intrusion prevention solution
- Deploy a network intrusion prevention solution
- Deploy port-level access control
- Perform application layer filtering
- Tune security event alerting thresholds
IG1: 0
IG2: 1–6
IG3: 1–11
14. Security Awareness and Skills Training
Creating a human firewall is one of the most important cybersecurity steps an organization can take in 2024. Ongoing security awareness training is remarkably effective against phishing and other attacks, but only when it’s done well.
Safeguards:
- Establish and Maintain a Security Awareness Program
- Train Workforce Members to Recognize Social Engineering Attacks
- Train Workforce Members on Authentication Best Practices
- Train Workforce on Data Handling Best Practices
- Train Workforce Members on Causes of Unintentional Data Exposure
- Train Workforce Members on Recognizing and Reporting Security Incidents
- Train Workforce on How to Identify and Report if Their Enterprise Assets are Missing Security Updates
- Train Workforce on the Dangers of Connecting to and Transmitting Enterprise Data Over Insecure Networks
- Conduct Role-Specific Security Awareness and Skills Training
IG1: 1–8
IG2: 1–9
IG3: 1–9
15. Service Provider Management
Anyone with access to your systems, location, or data also represents a potential security risk. If you haven’t already, it’s time to get serious about vendor due diligence. Group 1 doesn’t have a lot of to-dos on this list, but I’d still recommend checking out this recent blog.
Safeguards:
- Establish and maintain an inventory of service providers
- Establish and maintain a service provider management policy
- Classify service providers
- Ensure service provider contracts include security requirements
- Assess service providers
- Monitor service providers
- Securely decommission service providers
IG1: 1
IG2: 1–4
IG3: 1–7
16. Application Software Security
Group 1 can typically skip these safeguards, but they’re critical for helping larger organizations with their own in-house software identify and resolve any related security weaknesses.
Safeguards:
- Establish and maintain a secure application development process
- Establish and maintain a process to accept and address software vulnerabilities
- Perform root cause analysis on security vulnerabilities
- Establish and manage an inventory of third-party software components
- Use up-to-date and trusted third-party software components
- Establish and maintain a severity rating system and process for application vulnerabilities
- Use standard hardening configuration templates for application infrastructure
- Separate production and non-production systems
- Train developers in application security concepts and secure coding
- Apply secure design principles in application architectures
- Leverage vetted modules or services for application security components
- Implement code-level security checks
- Conduct application penetration testing
- Conduct threat modeling
IG1: 0
IG2: 1–11
IG3: 1–14
17. Incident Response Management
A comprehensive cybersecurity strategy should include protection, detection, response, and recovery tools. Unfortunately, a lot of organizations neglect the last two. Prevention and detection are important, but it’s important to remember that nothing is 100% safe. And depending on the industry you’re in, reporting any incidents promptly may soon be required by law.
Safeguards:
- Designate personnel to manage incident handling
- Establish and maintain contact information for reporting security incidents
- Establish and maintain an enterprise process for reporting incidents
- Establish and maintain an incident response process
- Assign key roles and responsibilities
- Define mechanisms for communicating during incident response
- Conduct routine incident response exercises
- Conduct post-incident reviews
- Establish and maintain security incident thresholds
IG1: 1–3
IG2: 1–8
IG3: 1–9
18. Penetration Testing
Group 1, you can sit this one out. However, groups 2 and 3 should use simulated attack scenarios to identify any vulnerabilities before hackers do.
Safeguards:
- Establish and maintain a penetration testing program
- Perform periodic external penetration tests
- Remediate penetration test findings
- Validate security measures
- Perform periodic internal penetration tests
IG1: 0
IG2: 1–3
IG3: 1–5
Getting Help With Implementing CIS Basic Controls
If you’re in Group 1, I highly recommend using our interactive cybersecurity checklist to see if you’re currently following best practices. It’s easier to see if you’re falling short, and where you should focus your efforts moving forward.
But implementing some safeguards is easier said than done. If you suspect you’re behind on best practices, our Cybersecurity Assessments combine the popular NIST Cybersecurity Framework (NIST-CSF) with IG1 controls. This combination works very well to help IT teams move their security program forward and communicate these needs to non-technical executive leadership.
However, depending on your organization and where you’re falling behind in terms of security, ongoing mentorship may be a better way to protect your business without over-taxing your budget. An enterprise-scale business is typically able to rely on a Chief Information Security Officer (CISO) to keep up with cybersecurity threats, but it’s often difficult for smaller organizations to access advanced skills.
That’s unfortunate, which is why we’ve recently added IT Consulting services at Marco. For a tiny fraction of the cost of a typical CISO’s salary, smaller organizations can access the same mentorship that big businesses have relied on for years.