Skip to content

The GRC buyer’s guide for 2025: Building resilience with AI-powered, federated solutions

Discover the ultimate GRC buyer's guide for 2025! Uncover how AI-powered, federated solutions transform compliance and security management for industries like government, aerospace, banking, and more. Learn about centralized control, continuous compliance, and advanced cyber GRC capabilities. Download now!

Group 193 (1)-1

The GRC buyer’s guide for 2025: Building resilience with AI-powered, federated solutions


What is the CIS 20 framework?

The CIS 20 framework, or Center for Internet Security Critical Security Controls, is a set of 20 critical security controls aimed at helping organizations strengthen their cybersecurity defenses. Organized into three categories—Basic, Foundational, and Organizational—these controls provide a structured approach to securing systems and data. By following the CIS 20, organizations can improve their ability to prevent, detect, and respond to cyber threats. The framework is widely recognized as a practical baseline for robust cybersecurity, enabling companies to protect critical assets, mitigate risk, and defend against a wide range of cyber attacks.

The three main categories of the CIS 20 Framework

The CIS 20 framework offers a structured approach to cybersecurity through 20 controls, grouped into three categories:

Category 1: Basic controls

These are the initial steps that provide a foundation for any security program. Basic controls are intended to offer a rapid return on investment and mitigate common cyber threats.
  • Inventory and control of enterprise assets: Develop and maintain an accurate inventory of hardware and physical devices connected to the organization's network. By identifying unauthorized or unmanaged devices, organizations can reduce potential attack surfaces.
  • Inventory and control of software assets: This involves identifying and monitoring all software in use within an organization. Unapproved or unpatched software can expose an organization to risks, so having visibility into software assets helps reduce vulnerabilities.
  • Data protection: Secure and manage data throughout its lifecycle, ensuring that data is appropriately classified and protected against unauthorized access.
  • Secure configuration of enterprise assets and software: Standardize security configurations for hardware and software, reducing potential vulnerabilities from unnecessary services or settings.
  • Account management: Manage user accounts, especially those with privileged access, to ensure that only authorized users can access sensitive systems and information.

Category 2: Foundational controls

These controls expand on the basics, focusing on ongoing and proactive measures to build a stronger security posture. They address various aspects of security, including access controls, monitoring, and defenses at different network layers.
  • Email and web browser protections: Protect against malware, phishing, and other web-based attacks by securing email gateways, web browsers, and ensuring safe browsing practices.
  • Malware defenses: Implement antivirus and anti-malware solutions that can detect, respond to, and remove malicious software across enterprise assets.
  • Limitation and control of network ports, protocols, and services: Restrict access to only the necessary network services and ports, reducing the risk of attacks on open, unsecured ports.
  • Data recovery capability: Implement robust backup solutions and regularly test recovery capabilities to ensure critical data can be restored in the event of a cyber incident.
  • Secure configuration for network devices: Apply secure settings to firewalls, routers, and other network devices to reduce vulnerabilities in network infrastructure.
  • Boundary defense: Deploy measures to control data flow across network boundaries, detecting and blocking suspicious activities at external and internal perimeters.
  • Data protection: Classify, label, and protect sensitive data, especially when it is in transit, ensuring that data is encrypted and handled securely.

Category 3: Organizational controls

Organizational controls are focused on governance, policies, and procedures that support a resilient security program. These controls help establish a security-aware culture and ensure that security measures are sustainable over time.
  • Security awareness and skills training: Educate employees and staff on security best practices, helping them recognize and respond to potential security threats, such as phishing.
  • Application software security: Implement secure development practices, ensuring that applications are developed with security in mind and regularly tested for vulnerabilities.
  • Incident response management: Develop, document, and test incident response plans to effectively handle security incidents, from identification to remediation and recovery.
  • Penetration testing: Conduct simulated attacks to test the security of systems and networks, identifying weaknesses that need to be addressed.
  • Control of access based on the need to know: Apply principles of least privilege, ensuring that employees have access only to information and resources necessary for their roles.
  • Audit log management: Maintain, protect, and regularly review audit logs to detect potential security incidents and maintain a record of activities for forensic and compliance purposes.

Each category plays a critical role in a layered defense strategy. Basic controls provide a quick boost in security, foundational controls enhance operational defenses, and organizational controls sustain and guide the security program over the long term. Together, these categories help organizations build a comprehensive approach to cybersecurity.

Summary

The CIS 20 framework is a set of 20 critical security controls designed to help organizations improve cybersecurity. Divided into three categories—Basic, Foundational, and Organizational—the framework provides a structured approach to securing assets, reducing risks, and building resilience against cyber threats. Basic controls establish core security practices like asset inventory and secure configurations, Foundational controls focus on proactive defenses such as malware protection and data recovery, and Organizational controls strengthen governance through policies and training. Together, these categories enable organizations to develop a comprehensive, layered defense strategy.

General thought leadership and news

6clicks and Scyne join forces to transform risk and compliance for Government agencies and regulators

6clicks and Scyne join forces to transform risk and compliance for Government agencies and regulators

Melbourne, Australia – 15 April 2025 – Pioneering governance, risk, and compliance (GRC) software, 6clicks is proud to announce a strategic...

Top 10 pain points of Archer IRM software

Top 10 pain points of Archer IRM software

Archer IRM software, while robust in functionality, presents significant challenges for users. Based on extensive research including interviews with...

Enhanced risk management with 6clicks: Smart automation + new updates

Enhanced risk management with 6clicks: Smart automation + new updates

Risk management is evolving—and it's now smarter, faster, and powered by AI. At 6clicks, we’re continuing to push the boundaries of intelligent GRC...

SOC 2 compliance in Australia: Information security for fintech firms

SOC 2 compliance in Australia: Information security for fintech firms

Protecting customer information is becoming increasingly critical in Australia’s fast-evolving financial services landscape. According to the...

How to implement a risk management framework

How to implement a risk management framework

Managing information security risks in today’s threat landscape requires more than just reactive measures. As systems grow more complex and...

Responsible AI and the rise of AI cyber GRC in the Middle East

Responsible AI and the rise of AI cyber GRC in the Middle East

Artificial intelligence is rapidly becoming the foundation for economic transformation across the Middle East. From Saudi Arabia’s Vision 2030 to the...