Skip to Content

CIS 18, or CIS Controls v8, is a set of 18 security safeguards that organisations can implement to improve their cybersecurity. Some of the controls include:

  • Inventory and control of software assets
  • Inventory and control of enterprise assets
  • Access control management
  • Ensure proper user authentication and access control measures are in place.
  • Continuous vulnerability management
  • Penetration testing
  • Incident response management
  • Network infrastructure management
  • Audit log management

How can we help?

Based on your requirements we can provide the right support to help you achieve CIS compliance, including:

CIS Gap Analysis

If you are looking to assess and measure your current compliance to CIS Standard, we can assist by delivering a CIS gap analysis.

This is often the first step in any CIS project and provides a roadmap for CIS compliance.  This CIS consultancy service typically involves one of Security Consultants spending time on site with the key individuals responsible for the CIS implementation programme, e.g., those involved in network administration and IT systems, as well as those involved in developing policies and processes/procedures.

Implementation Support

Having conducted a gap analysis and identified any areas where improvements are required, we can assist with any implementation or remediation activities to ensure you achieve and maintain compliance in the most practical and effective manner.

Penetration Testing and Vulnerability Scanning

A key requirements of CIS is the need to undertake both vulnerability scanning and penetration testing in order to assess the network infrastructure and applications for security vulnerabilities.

Cyber Security Specialists can help you to implement a Vulnerability Management program utilising market leading technologies, or provide you with our managed vulnerability scanning service, where we provide the technology platform and provide full support from our team of experts.

As a CREST-accredited organisation, Cyber Security Specialists can also conduct penetration tests, where our team of testers will not only analyse your network environment, cloud services, or web applications but also try to exploit those vulnerabilities as a real-world adversary would.

Our Security Consultants are all vendor agnostic and come with a wide range of technical and information security (e.g. ISO 27001) skills and experience and are well placed to understand the impact that the implementation of the CIS controls is likely to have on your organisation.

Get in touch

Start your CIS Compliance Journey

Speak with one of our team to see how we can help you implement the CIS Framework.

Contact us