Professional Documents
Culture Documents
CIS Controls Checklist
CIS Controls Checklist
SECURITY CONTROLS
CHECKLIST
CONTROL
Continuous safeguards
®
CONTROLS ?
8
12
CONTROL
Audit Log safeguards
Management IG1 3 / 12
IG2 11 / 12
9
7
CONTROL
many turn to ISO 27001 & ISO 27002. These Email and safeguards
10
7
CONTROL
Malware safeguards
11
5
CONTROL
detailed practical and prioritized advice on how Data safeguards
12
to measure, how to prioritize, and how to audit 8
CONTROL
Network safeguards
1 13
5 11
CONTROL
CONTROL
2 14
7 9
CONTROL
CONTROL
3 15
14 7
CONTROL
CONTROL
Protection IG1 6 / 14
Management IG1 1/7
IG2 12 / 14 IG2 4/7
IG3 14 / 14 IG3 7/7
4 16
12 14
CONTROL
CONTROL
5 17
6 9
CONTROL
CONTROL
6 18
8 5
CONTROL
CONTROL
2
3 REASONS WHY YOU WHAT ARE THE 18 CIS
WOULD WANT TO BE CRITICAL SECURITY
®
CIS COMPLIANT: CONTROLS ?
Get an instant cybersecurity audit of your Lansweeper can support your CIS® compliance
entire network through valuable reports. for these 6 controls below.
Secure Configuration of
3 Enterprise Assets and Software
4 Account Management
3
CIS 18 CRITICAL
SECURITY CONTROLS
CHECKLIST
CIS® CONTROL #1
Are you able to automatically discover new Are you able to check and report on
software on your hardware devices? Processes, Services & System settings?
Are you able to automatically discover new Are you able to check and report on
software updates/versions on your hardware Bitlocker’s status?
devices?
4
CIS 18 CRITICAL CIS® CONTROL #7
Are you able to control who can manage Are you able to create email alerts to review
your assets and place restrictions per user? or alert people when a vulnerability has been
addressed or spotted?
CIS® CONTROL #8
How Lansweeper helps
implement CIS Critical
Audit Log Management
Security Controls
Do you have the possibility to access event
Learn More log information and keep an eye on anything
that might indicate a security risk?
5
Lansweeper is an IT asset management
software provider helping businesses better
understand, manage and protect their IT
devices and network. Lansweeper helps
customers minimize risks and optimize their IT
assets by providing actionable insight into their
IT infrastructure at all times, offering
trustworthy, valuable, and accurate insights
about the state of users, devices, and software.