🛡️ Security Controls

Relevant security controls from major frameworks:

CIS Critical Security Controls® v8.0

1.110.111.114.214.6
Hide Control Details (5 controls)
1.1Establish and Maintain Detailed Enterprise Asset Inventory
DevicesIdentify
Establish and maintain an accurate, detailed, and up>to>date inventory of all enterprise assets with the potential to store or process data, to include: end>user devices (including portable and mobile), network devices, non>computing/IoT devices, and servers. Ensure the inventory records the network address (if static), hardware address, machine name, data asset owner, department for each asset, and whether the asset has been approved to connect to the network. For mobile end>user devices, MDM type tools can support this process, where appropriate. This inventory includes assets connected to the infrastructure physically, virtually, remotely, and those within cloud environments. Additionally, it includes assets that are regularly connected to the enterprise’s network infrastructure, even if they are not under control of the enterprise. Review and update the inventory of all enterprise assets bi>annually, or more frequently.
10.1Deploy and Maintain Anti-Malware Software
DevicesProtect
Deploy and maintain anti-malware software on all enterprise assets.
11.1Establish and Maintain a Data Recovery Process 
DataRecover
Establish and maintain a data recovery process. In the process, address the scope of data recovery activities, recovery prioritization, and the security of backup data. Review and update documentation annually, or when significant enterprise changes occur that could impact this Safeguard.
14.2Train Workforce Members to Recognize Social Engineering Attacks
N/AProtect
Train workforce members to recognize social engineering attacks, such as phishing, pre-texting, and tailgating. 
14.6Train Workforce Members on Recognizing and Reporting Security Incidents
N/AProtect
Train workforce members to be able to recognize a potential incident and be able to report such an incident. 
Attribution

Copyright Notice
© 2025 Center for Internet Security, Inc. ("CIS"). All rights reserved.

License
This product/service incorporates the CIS Critical Security Controls® with the express permission of the Center for Internet Security, Inc. Use of the CIS Controls in this commercial offering is authorized under a commercial license granted by CIS.

Trademark Notice
"CIS®" and "CIS Critical Security Controls®" are registered trademarks of the Center for Internet Security, Inc. and are used under license.

Source Reference
The original CIS Critical Security Controls are available, free of charge for non-commercial use, at: https://www.cisecurity.org/controls.

Disclaimer
CIS does not endorse, certify, or warrant this product/service. Any views or interpretations are those of Paranoid Cybersecurity, not CIS.