What are the basic CIS controls?
1. Inventory and Control of Hardware Assets: This involves maintaining an accurate inventory of all hardware assets, including the serial numbers of each device, and controlling access to them. This can be done through physical security measures, such as locks, as well as software-based access control systems.
2. Continuous Vulnerability Management: This involves regularly scanning systems for vulnerabilities and patching them as soon as possible. This can be done using automated scanning tools, as well as manual reviews.
3. Controlled Use of Administrative Privileges: This involves restricting the use of administrative privileges to only those individuals who need them for their job. This can be done through user access control systems, as well as regular audits of who has access to what.
4. Configuration for Hardware and Software on Mobile Devices, Laptops and Servers: This involves ensuring that all devices are properly configured to meet the organization’s security requirements. This can be done through automated configuration management tools, as well as manual reviews.
5. Maintenance, Monitoring and Analysis of Audit Logs: This involves regularly monitoring and analyzing audit logs to detect any suspicious or anomalous activity. This can be done through automated log analysis tools, as well as manual reviews.
Useful References
Official Guides
- What is Center for Internet Security (CIS)?
- Who do the CIS Critical Security Controls apply to?
- How mny CIS critical security controls are there?
- Why are CIS controls important?
- What are CIS benchmarks?
Blogs & Thought Leadership
- Center for Internet Security (CIS) Framework vs ISO 27001
- Center for Internet Security (CIS) Framework vs Right Fit For Risk (RFFR)
- Center for Internet Security (CIS) Framework vs PCI-DSS
- Center for Internet Security (CIS) Framework vs NIST Cybersecurity Framework (CSF)
- Center for Internet Security (CIS) Framework vs ASD IRAP
Answers
Hear from world-renowned GRC analyst Michael Rasmussen about 6clicks and why it's breakthrough approach is winning
Get up and running with 6clicks in just a matter of hours.

'Push-down' standards to teams
'Push' your standard templates, controls, and risk libraries to your teams.

'Roll up' analytics for reporting
Roll-up analytics for consolidated reporting across your teams.
Our customers have spoken.
They genuinely love 6clicks.
"The best cyber GRC platform for businesses and advisors."
David Simpson | CyberCX
"We chose 6clicks not only for our clients, but also our internal use”
Chief Risk Officer | Publically Listed
"We use Hub & Spoke globally for our cyber compliance program. Love it."
Head of Compliance | Fortune 500






"The 6clicks solution simplifies and strengthens risk, compliance, and control processes across entities and can grow and adapt as the organization changes and evolves."
Michael Rasmussen
GRC 20/20 Research LLC
6clicks is powered by AI and includes all the content you need.
Our unique 6clicks Hub & Spoke architecture makes it simple to use and deploy.
.png)

.png)

.png)
.png)