PROACTIVERISK
  • ๐Ÿ‘ฅ About
    • Mission | People
    • Capabilities Statement
    • Blog
    • 800 lb Gorilla
    • Press & Events
    • Videos
    • Careers
    • Books & Tools
    • Referral Program
    • Portals > >
      • Client Portal
      • Staff Portal
  • ๐Ÿ” Assess
    • Compliance Oversight
    • AI Investigate
    • RED/BLUE TEAM
    • Continuous Testing
    • 365 Assess
    • Industrial Controls
    • Digital Evidence
    • Threat Modeling
  • ๐Ÿง Train
    • KaliGPT
    • Instructor Led Training
    • Generative AI
    • Table Top Exercises
    • Talent Acquisition
    • Security Awareness as a Service
  • ๐Ÿ› ๏ธ Manage
    • Cybersecurity Leadership
    • IT Services
    • Integrated Security
    • 365 Protect
    • ContinuityXpert
    • Domains | DNS
    • InboxSafe
    • Supply Chain Risk Management
    • CYBER TRAFFIC FILTER
    • Custom Software?
  • ๐Ÿญ Industry
    • State and Local Gov.
    • Legal and Accounting Firms:
    • Financial Technology
    • Healthcare

GRAY BEARD BLOG

SHARING RANDOM THOUGHTS ON TECH

Mapping CISA CPG to CIS V8 Controls to measurerisk

1/31/2024

0 Comments

 
The CISA (Cybersecurity & Infrastructure Security Agency) Critical Product Guidance (CPG) provides specific advice on securing various critical infrastructure products, while the CIS (Center for Internet Security) Controls V8 is a set of best practices designed to help organizations protect themselves from security threats.

The CISA CPG's mapping to the CIS V8 framework is not a one-to-one correlation because the two are designed with different purposes in mind. However, the CISA CPG's recommendations can often be seen as supporting the implementation of certain CIS Controls.

Here's how we map it in our MeasureRISK service offering 

Inventory and Control of Enterprise Assets and Software Assets (CIS Controls 1 & 2):

  • CISA CPGs often include recommendations for understanding and managing the assets in your environment, which corresponds to these CIS Controls.

Data Protection (CIS Control 3):

  • CPGs might have specific guidelines for ensuring that data is encrypted and stored securely, mapping to the data protection control.

Secure Configuration of Enterprise Assets and Software (CIS Control 4):

  • CISA's guidance on securing specific products often aligns with the secure configuration principles outlined in CIS Control 4.

Account Management (CIS Control 5):

  • Recommendations on managing user accounts and privileges in CPGs would be relevant to this CIS Control.

Access Control Management (CIS Control 6):
  • CISA's guidance on ensuring appropriate access controls could support the principles in CIS Control 6.

Continuous Vulnerability Management (CIS Control 7):
  • CPGs often include recommendations on regular patching and vulnerability scanning, aligning with this CIS Control.

Audit Log Management (CIS Control 8):
  • CISA's recommendations for proper logging and monitoring practices can be mapped to this control.

Email and Web Browser Protections (CIS Control 9):
  • Specific CPGs might offer advice on securing email systems and web browsers, aligning with this control.

Malware Defenses (CIS Control 10):
  • CISA's guidance on anti-malware practices and defenses would support this control.

Data Recovery (CIS Control 11):
  • CPGs that discuss backup solutions and data recovery processes would map to this control.

Network Infrastructure Management (CIS Control 12):
  • CISA's advice on securing network devices and infrastructure aligns with this control.

Security Awareness and Skills Training (CIS Control 13):
  • Any CPGs focusing on training and security awareness would support this control.

Service Provider Management (CIS Control 14):
  • CPGs may include guidance on managing third-party risks, mapping to this CIS Control.

Application Software Security (CIS Control 15):
  • Recommendations on securing application software in CPGs would be relevant here.

Incident Response and Management (CIS Control 16):
  • CISA's guidance on preparing for and responding to incidents supports this control.

Penetration Testing (CIS Control 17):
  • If CPGs include recommendations on conducting security assessments and penetration testing, it would map to this control.
​
Control Systems (CIS Control 18):
  • For CPGs that specifically address industrial control systems or other operational technologies, there would be a strong alignment with this control.

The mapping can be more specific and nuanced based on the detailed recommendations in CISA's CPGs and the specific sub-controls and implementation groups within CIS Controls V8. Organizations looking to align these two sets of guidance should review the specific recommendations and controls in detail and consider how the advice in CPGs supports the implementation of CIS Controls in their specific environment. 

CISA has many resources available to help you be proactive about risk

LEARN MORE ABOUT PROACTIVERISK MEASURERISK
0 Comments

Your comment will be posted after it is approved.


Leave a Reply.

    Categories

    All
    CMMC
    COMMUNITY
    TECHTIP

    Tom Brennan

    This is my blog, there are many like it but this one is mine. Enjoy.

    View my profile on LinkedIn

    BLOG Archives

    June 2025
    May 2025
    February 2025
    January 2025
    November 2024
    August 2024
    June 2024
    May 2024
    April 2024
    February 2024
    January 2024
    December 2023
    November 2023
    September 2023
    August 2023
    March 2023
    February 2023
    January 2023
    December 2022
    November 2022
    August 2022
    April 2022
    August 2021
    March 2021
    January 2021
    August 2020

    RSS Feed

Contact Us
Proactive Risk
Adversaries Plan. We Preempt.
​​ 
290 W Mt. Pleasant Ave, Suite 11309
Livingston, NJ 07039

☎️ 973-298-1160 | GPS Map
Client Portal
ManageIT Remote

​© COPYRIGHT 2025. ALL RIGHTS RESERVED.
  • ๐Ÿ‘ฅ About
    • Mission | People
    • Capabilities Statement
    • Blog
    • 800 lb Gorilla
    • Press & Events
    • Videos
    • Careers
    • Books & Tools
    • Referral Program
    • Portals > >
      • Client Portal
      • Staff Portal
  • ๐Ÿ” Assess
    • Compliance Oversight
    • AI Investigate
    • RED/BLUE TEAM
    • Continuous Testing
    • 365 Assess
    • Industrial Controls
    • Digital Evidence
    • Threat Modeling
  • ๐Ÿง Train
    • KaliGPT
    • Instructor Led Training
    • Generative AI
    • Table Top Exercises
    • Talent Acquisition
    • Security Awareness as a Service
  • ๐Ÿ› ๏ธ Manage
    • Cybersecurity Leadership
    • IT Services
    • Integrated Security
    • 365 Protect
    • ContinuityXpert
    • Domains | DNS
    • InboxSafe
    • Supply Chain Risk Management
    • CYBER TRAFFIC FILTER
    • Custom Software?
  • ๐Ÿญ Industry
    • State and Local Gov.
    • Legal and Accounting Firms:
    • Financial Technology
    • Healthcare