<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=229461991482875&amp;ev=PageView&amp;noscript=1">
Gatekeeper Contract and Vendor Management Glossary

Search common contracting language and take a deeper dive to discover what each means

CIS Security Controls

The Center for Internet Security® (CIS) Critical Security Controls is a set of best practices for securing an organisation's computer systems and networks.

The CIS Critical Security Controls provide a prioritised framework of 20 controls that are considered essential for protecting an organisation's assets from cyber threats. 

Some common steps that businesses can take to comply with the CIS Critical Security Controls include:

  1. Assess their current security posture against the CIS Controls to identify any gaps or weaknesses.

  2. Develop a prioritised plan for implementing the controls that aligns with their business goals and available resources.

  3. Implement the controls in a phased approach, starting with the most critical and working towards the less critical.

  4. Monitor and measure the effectiveness of the controls on an ongoing basis to identify and address any gaps or issues.

  5. Conduct regular audits and assessments to ensure ongoing compliance with the CIS Controls.