Skip to content
CIS Controls v.8.1 to ISO 27001

icon picker
CIS Controls to ISO 27001

Search
Name
Description
ISO 27001 controls
ISO 27001 Control name
1. Inventory and Control of Enterprise Assets
Actively manage (inventory, track, and correct) all enterprise assets (end-user devices, including portable and mobile; network devices; non-computing/Internet of Things (IoT) devices; and servers) connected to the infrastructure physically, virtually, remotely, and those within cloud environments, to accurately know the totality of assets that need to be monitored and protected within the enterprise. This will also support identifying unauthorized and unmanaged assets to remove or remediate.
A5.9
A8.8
A5.9 Inventory of information and other associated assets
A8.8 Management of technical vulnerabilities

2. Inventory and Control of Software Assets
Actively manage (inventory, track, and correct) all software (operating systems and applications) on the network so that only authorized software is installed and can execute, and that unauthorized and unmanaged software is found and prevented from installation or execution.
A5.9
A8.7
A8.19
A5.9 Inventory of information and other associated assets
A8.7 Protection against malware
A8.19 Installation of software on operational systems

3. Data Protection
Develop processes and technical controls to identify, classify, securely handle, retain, and dispose of data.
A5.9
A5.10
A5.12
A5.13
A5.14
A5.15
A5.33
A6.7
A8.1
A8.3
A8.4
A8.12
A8.15
A8.20
A8.22
A5.9 Inventory of information and other associated assets
A5.10 Acceptable use of information and other associated assets
A5.12 Classification of information
A5.13 Labelling of information
A5.14 Information transfer
A5.15 Access control
A5.33 Protection of records
A6.7 Remote working
A8.1 User end point devices
A8.3 Information access restriction
A8.4 Access to source code
A8.12 Data leakage prevention
A8.15 Logging
A8.20 Networks security
A8.22 Segregation of networks
4. Secure Configuration of Enterprise Assets and Software
Establish and maintain the secure configuration of enterprise assets (end-user devices, including portable and mobile; network devices; non-computing/IoT devices; and servers) and software (operating systems and applications).
A6.7
A8.1
A8.2
A8.5
A8.9
A8.10
A6.7 Remote working
A8.1 User end point devices
A8.2 Privileged access rights
A8.5 Secure authentication
A8.9 Configuration management
A8.10 Information deletion

5. Account Management
Use processes and tools to assign and manage authorization to credentials for user accounts, including administrator accounts, as well as service accounts, to enterprise assets and software.
A5.15
A5.16
A5.17
A8.2
A8.18
A5.15 Access control
A5.16 Identity management
A5.17 Authentication information
A8.2 Privileged access rights
A8.18 Use of privileged utility programs

6. Access Control Management
Use processes and tools to create, assign, manage, and revoke access credentials and privileges for user, administrator, and service accounts for enterprise assets and software.
A5.3
A5.15
A5.16
A5.18
A6.5
A6.7
A8.2
A8.3
A8.5
A5.3 Segregation of duties
A5.15 Access control
A5.16 Identity management
A5.18 Access rights
A6.5 Responsibilities after termination or change of employment
A6.7 Remote working
A8.2 Privileged access rights
A8.3 Information access restriction
A8.5 Secure authentication
7. Continuous Vulnerability Management
Develop a plan to continuously assess and track vulnerabilities on all enterprise assets within the enterprise’s infrastructure, in order to remediate, and minimize, the window of opportunity for attackers. Monitor public and private industry sources for new threat and vulnerability information.
A8.8
A8.8 Management of technical vulnerabilities
8. Audit Log Management
Collect, alert, review, and retain audit logs of events that could help detect, understand, or recover from an attack.
A5.25
A5.28
A8.6
A8.15
A8.17
A8.20
A5.25 Assessment and decision on information security events
A5.28 Collection of evidence
A8.6 Capacity management
A8.15 Logging
A8.17 Clock synchronization
A8.20 Networks security

9. Email and Web Browser Protections
Improve protections and detections of threats from email and web vectors, as these are opportunities for attackers to manipulate human behavior through direct engagement.
A8.1
A8.7
A8.23
A8.1 User end point devices
A8.7 Protection against malware
A8.23 Web filtering

10. Malware Defenses
Prevent or control the installation, spread, and execution of malicious applications, code, or scripts on enterprise assets.
A8.1
A8.7
A8.1 User end point devices
A8.7 Protection against malware

11. Data Recovery
Establish and maintain data recovery practices sufficient to restore in-scope enterprise assets to a pre-incident and trusted state.
A8.12
A8.13
A8.12 Data leakage prevention
A8.13 Information backup
12. Network Infrastructure Management
Establish, implement, and actively manage (track, report, correct) network devices, in order to prevent attackers from exploiting vulnerable network services and access points.
A6.7
A8.1
A8.2
A8.20
A8.21
A8.22
A8.27
A6.7 Remote working
A8.1 User end point devices
A8.2 Privileged access rights
A8.20 Networks security
A8.21 Security of network services
A8.22 Segregation of networks
A8.27 Secure system architecture and engineering principles

13. Network Monitoring and Defense
Operate processes and tooling to establish and maintain comprehensive network monitoring and defense against security threats across the enterprise’s network infrastructure and user base.
A6.7
A8.1
A8.3
A8.8
A8.15
A8.16
A8.22
A6.7 Remote working
A8.1 User end point devices
A8.3 Information access restriction
A8.8 Management of technical vulnerabilities
A8.15 Logging
A8.16 Monitoring activities
A8.22 Segregation of networks

14. Security Awareness and Skills Training
Establish and maintain a security awareness program to influence behavior among the workforce to be security conscious and properly skilled to reduce cybersecurity risks to the enterprise.
A5.10
A6.3
A6.8
A8.7
A5.10 Acceptable use of information and other associated assets
A6.3 Information security awareness, education and training
A6.8 Information security event reporting
A8.7 Protection against malware

15. Service Provider Management
Develop a process to evaluate service providers who hold sensitive data, or are responsible for an enterprise’s critical IT platforms or processes, to ensure these providers are protecting those platforms and data appropriately.
A5.1
A5.10
A5.14
A5.19
A5.20
A5.21
A5.22
A5.23
A5.1 Policies for information security
A5.10 Acceptable use of information and other associated assets
A5.14 Information transfer
A5.19 Information security in supplier relationships
A5.20 Addressing information security within supplier agreements
A5.21 Managing information security in the information and communication technology (ICT) supply chain
A5.22 Monitoring, review and change management of supplier services
A5.23 Information security for use of cloud services
16. Application Software Security
Manage the security life cycle of in-house developed, hosted, or acquired software to prevent, detect, and remediate security weaknesses before they can impact the enterprise.
A5.8
A8.4
A8.8
A8.25
A8.26
A8.27
A8.28
A8.29
A8.30
A8.31
A5.8 Information security in project management
A8.4 Access to source code
A8.8 Management of technical vulnerabilities
A8.25 Secure development life cycle
A8.26 Application security requirements
A8.27 Secure system architecture and engineering principles
A8.28 Secure coding
A8.29 Security testing in development and acceptance
A8.30 Outsourced development
A8.31 Separation of development, test and production environments
17. Incident Response Management
Establish a program to develop and maintain an incident response capability (e.g., policies, plans, procedures, defined roles, training, and communications) to prepare, detect, and quickly respond to an attack.
A5.2
A5.5
A5.6
A5.20
A5.24
A5.25
A5.26
A5.27
A5.30
A6.8
A5.2 Information security roles and responsibilities
A5.5 Contact with authorities
A5.6 Contact with special interest groups
A5.20 Addressing information security within supplier agreements
A5.24 Information security incident management planning and preparation
A5.25 Assessment and decision on information security events
A5.26 Response to information security incidents
A5.27 Learning from information security incidents
A5.30 ICT readiness for business continuity
A6.8 Information security event reporting
18. Penetration Testing
Test the effectiveness and resiliency of enterprise assets through identifying and exploiting weaknesses in controls (people, processes, and technology), and simulating the objectives and actions of an attacker.
A8.8
A8.8 Management of technical vulnerabilities
There are no rows in this table
Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (
CtrlP
) instead.