Creating a Security Blueprint: A Realistic Approach to Using the CIS 20