CIS Critical Security Controls Version 8

The CIS Critical Security Controls (CIS Controls) are a prioritized set of Safeguards to mitigate the most prevalent cyber-attacks against systems and networks. They are mapped to and referenced by multiple legal, regulatory, and policy frameworks. CIS Controls v8 has been enhanced to keep up with modern systems and software. Movement to cloud-based computing, virtualization, mobility, outsourcing, Work-from-Home, and changing attacker tactics prompted the update and supports an enterprise’s security as they move to both fully cloud and hybrid environments.


Quick navigation – click a resource type to jump to that section

Learn about CIS Controls v8

Tools and Resources

Companion Guides for CIS Controls v8

CIS Controls v8 Mappings

CIS Controls v8 Translations


Learn about CIS Controls v8

Start by downloading the CIS Controls

The CIS Controls are a prioritized set of actions developed by a global IT community. This set of best practices is trusted by security leaders in both the private and public sector.
Download CIS Controls v8 (read FAQs)


Interested in seeing how others implement the CIS Controls?

Industry professionals and organizations all around the world utilize the CIS Controls to enhance their organization’s cybersecurity posture. Check out recent case studies to learn more.
Read CIS Controls Case Studies


Tools and Resources

Assess your Implementation of the CIS Controls

The CIS Controls Self-Assessment Tool, or CIS CSAT, is a free web application that enables security leaders to track and prioritize their implementation of the CIS Controls.


What’s Changed?

Cybersecurity is an evolving industry with an endless list of threat actors. The tools we use to stay safe and secure must be updated to match the current threat landscape. Find out how CIS Controls v8 was updated from v7.1.
Download CIS Controls v8 Change Log


CIS Controls v8 Implementation Groups

Implementation Groups (IGs) provide a simple and accessible way to help organizations of different classes focus their scarce security resources, and still leverage the value of the CIS Controls program, community, and complementary tools and working aids.
Download the Implementation Groups Handout


Assess your risk with CIS RAM

CIS Risk Assessment Method is a free information security risk assessment method that helps organizations implement and assess their security posture against the CIS Controls cybersecurity best practices. CIS RAM provides instructions, examples, templates, and exercises for conducting a cyber risk assessment.
Download CIS RAM

Download the CIS RAM v2.1 brochure



CIS Controls v8 Multimedia Resources

Listen to the CIS Cybersecurity Where You Are Podcast or watch one of our webinars on-demand related to the CIS Controls v8 release.


Companion Guides

CIS Controls Cloud Companion Guide

The CIS Critical Security Controls (CIS Controls) team has created guide to help organizations create secure cloud environments.
Download the Cloud Companion Guide for CIS Controls v8


CIS Controls Commonly Exploited Protocols Windows Management Instrumentation (WMI)

This guide will focus on a commonly exploited protocol, Windows Management Instrumentation (WMI) Remote Protocol, and the Safeguards an enterprise can implement, in part or whole, to reduce their attack surface or detect anomalies associated with the exploitation of WMI. The goal is to deliver a set of best practices from the CIS Controls, CIS Benchmarks™, or additional guidance, that all enterprises can use to protect against WMI facilitated attacks.
Download the WMI Guide


CIS Controls v8 Exploited Protocols Server Message Block (SMB)

The purpose of this guide is to focus on direct mitigations for SMB, as well as which best practices an enterprise can put in place to reduce the risk of an SMB-related attack.
Download the SMB Guide


CIS Controls v8 Privacy Companion Guide

The Privacy Guide supports the objectives of the CIS Controls by aligning privacy principles and highlighting potential privacy concerns that may arise through the usage of the CIS Controls.
Download the Privacy Companion Guide


Community Defense Model v2.0

The Center for Internet Security (CIS) Community Defense Model (CDM) v2.0 can be used to design, prioritize, implement, and improve an enterprise’s cybersecurity program. Enterprises naturally want to know how effective the CIS Critical Security Controls (CIS Controls) are against the most prevalent types of attacks. The CDM was created to help answer that and other questions about the value of the Controls based on currently available threat data from industry reports.
Download the Community Defense Model v2.0 Guide


Establishing Essential Cyber Hygiene

When tasked to implement a cybersecurity program, many enterprises ask “How do we get started?” In response, the CIS Controls Community sorted the Safeguards in the Controls into three Implementation Groups (IGs) based on their difficulty and cost to implement.
Download the Establishing Essential Cyber Hygiene


Guide to Enterprise Assets and Software

CIS simplified the language in v8 to provide enterprises guidance on how enterprise assets and software are organized in the CIS Controls and to help explain what we mean when we say things like “Establish and Maintain Detailed Enterprise Asset Inventory. 
Download Guide to Enterprise Assets and Software


Internet of Things (IoT)

In this document, we provide guidance on how to apply the security best practices found in CIS Controls v8 to IoT environments.
Download Internet of Things Companion Guide


Mobile Guide

In this document, we provide guidance on how to apply the security best practices found in CIS Controls v8 to mobile environments. Organizations will be able to break down and map the applicable CIS Controls and their implementation in mobile environments.
Download Mobile Companion Guide

CIS Controls v8 Mappings

Download individual mappings below or visit our CIS Controls Navigator for all mappings to CIS Controls v8.

CIS Controls v8 Translations

The CIS Controls v8 have been translated into the following languages:

  • Italian
  • Japanese
  • Portuguese
  • Spanish

Download a translation


Back to top