CIS Controls SANS Poster 2022 4
CIS Controls SANS Poster 2022 4
CIS Controls SANS Poster 2022 4
continue to grow in influence and impact across a world-wide community of adopters, Critical Security Controls v8
vendors, and supporters. What started over ten years ago as a simple grassroots activity to
help enterprises focus on the most important steps to defend themselves against real-world
cyber-attacks has become a world-wide movement. 01 Inventory and Control of Enterprise Assets
Version 8 is the most effective, best-researched version of the Controls. We addressed
Welcome to actions. At the same time, we simplified the document by combining like activities and using
consistent language.
03 Data Protection
Version 8 of the We’ve also matured our ability to bring data, rigor and transparency to our recommendations
to give you confidence in our work, created cross-mappings to numerous other security
frameworks and recommendations, and worked closely with the marketplace to ensure that
04 Secure Configuration of Enterprise Assets
CIS Critical you are supported with high-quality tools and other resources to help you measure your
CIS Controls implementation.
and Software
Security Controls Thanks to everyone for making v8 great!
Phyllis Lee
05 Account Management
06 Access Control Management
07 Continuous Vulnerability Management
08 Audit Log Management
09 Email and Web Browser Protection
10 Malware Defenses
11 Data Recovery
12 Network Infrastructure Management
13 Network Monitoring and Defense
14 Security Awareness and Skills Training
15 Service Provider Management
16 Applications Software Security
17 Incident Response Management
18 Penetration Testing
SANS Security Frameworks and CIS Controls Training Courses It’s not just about the list...
SEC566: Implementing and Auditing Security Frameworks & Controls
We listened to your questions and responded with guidance for implementing the CIS Controls, showing compliance against other frameworks
and tools to measure your Controls implementation. It’s not just about a list of best cybersecurity practices—it’s about the ecosystem around the
Controls to help all enterprises, regardless of size, successfully implement a cybersecurity program.
5 30
CPEs
Laptop
Required
Building and Auditing Critical Security Controls
Day Program
Cybersecurity attacks are increasing and The Center for Internet Security (CIS) Critical SEC566 will enable you to master the
evolving so rapidly that it is more difficult Controls are specific security controls that specific and proven techniques and tools
Security Controls Controls identify a minimum level of information security that all organizations that collect
or maintain personal information should meet. The failure to implement all the Controls that
apply to an organization’s environment constitutes a lack of reasonable security.”
SANS has designed SEC440 as an introduction to the CIS Critical Controls, in order to
AND provide students with an understanding of the underpinnings of a prioritized, risk-based We are proud to have collaborated on
approach to security. The technical and procedural controls explained in the CIS Controls CIS Controls v8 with these fellow nonprofits,
SANS Security Frameworks and were proposed, debated and consolidated by various private and public sector experts from
around the world. Previous versions of the CIS Controls were prioritized with the first six CIS
Critical Controls labeled as “cyber hygiene” and now the CIS Controls are now organized into
who serve the common good by developing
and sharing essential cybersecurity
sans.org/cybersecurity-leadership
“SEC440 is a great course that immerses the auditor with Special thanks
critical controls—provides focus on what really matters.”
—Louis Guion, Mohawk Industries
to our industry
@secleadership SANS Security Leadership partners:
AUTHORS OF BOTH COURSES: James Tarala & Kelli K. Tarala of Enclave Security | enclavesecurity.com
MGTPS_CISCC_v1.3_0521