CIS RAM Brochure v2.1 2022
CIS RAM Brochure v2.1 2022
1
Reasonable Risk
For Reasonable
Implementation of the
CIS Critical Security Controls
An Industry with Many Interested Parties – Each with a Unique Set of Challenges
Information security professionals need to satisfy many interested parties, all of which have vastly different concerns. Addressing the
concerns of these interested parties creates a set of unique challenges.
THE PROBLEM
Interested Party Their Concerns Your Challenges
CIOs / Executives / Board j How does our investment in the CIS Controls tie to Justifying security investments requires a
what is important to the business? defendable risk calculation, translating risks into
initiatives and executive-level dashboards.
Attorneys / Judges j Did you implement reasonable controls that could Demonstrating to a judge that the CIS Controls
have prevented a breach? you implemented are reasonable.
Regulators j Is your use of the CIS Controls reasonable and Showing regulators that your implemented CIS
appropriate to achieve their version of compliance? Controls achieves their version of compliance.
Customers j Are you appropriately protecting our information Assuring customers that their information is
from harm? appropriately protected.
IT and Security Professionals j How can we get this done? Prioritizing CIS Controls implementation, and
accepting risks at a reasonable level.
Example data only. Individual risk assessment results will vary.
CIS RAM is the Solution New in CIS RAM 2.1
CIS RAM addresses these challenges in the following ways:
• Workbooks automate much of your risk analysis for faster
• CIS RAM provides a method for evaluating risk by calculating results.
the expectancy of an impact to customers, business
• CIS RAM 2.1 estimates expectancy by comparing the
objectives, and external entities (regulators, vendors, etc.). commonality of reported threats to the strength of CIS
• CIS RAM provides a method to “draw a line” at an enterprise’s Safeguards that prevent them.
Acceptable Risk Definition, with risks below the line adhering • Using the Veris Community Database (VCDB), CIS RAM
to due care and risks above the line requiring risk treatment. introduces an evidence-based heuristic for estimating
• Together these principles provide enterprises with a concise expectancy.
and defendable process to accept or address risk.
THE SOLUTION
Interested Party CIS RAM Solution
CIOs / Executives / Board j Risks are concisely calculated and prioritized against the needs of customers, business objectives, and
external entities. This helps justify investments, create defendable rise calculations, and translate risks into
prioritized initiatives.
Attorneys / Judges j CIS RAM allows you to achieve a reasonable implementation of the CIS Controls by evaluating your risks in
a manner that aligns with judicial reasoning.
Regulators j CIS RAM balances risks with burdens to match regulators’ expectations for reasonable and appropriate
compliance.
Customers j The Acceptable Risk Definition is stated in plain language allowing you to explain to Customers how their
information is appropriately protected.
IT and Security Professionals j CIS RAM allows you to prioritize what matters to interested parties, and to accept risks at a level the
enterprise agreed to.
CIS RAM risk assessments help you determine
what is reasonable to implement.
Example data only. Individual risk assessment results will vary.
Duty of Care in Action
In the case of a security breach and litigation, or regulatory audit, your enterprise’s security certifications (PCI DSS, ISO 27001,
etc.) may help, but your ability to prove due care through a strong Risk Assessment will matter even more.
About HALOCK
HALOCK is a U.S.-based risk management and information security consultancy
that is privately owned and operated out of its headquarters in Schaumburg, IL.
From mid-sized to the Fortune 100, HALOCK’S clients span a variety of industries
including financial services, healthcare, legal, education, energy, SaaS/cloud,
enterprise retail, and many others. HALOCK strives to be your security partner,
providing both strategic and technical security offerings. HALOCK combines
strong thought leadership, diagnostic capabilities, and deep technical expertise
with a proven ability to get things done. HALOCK helps clients prioritize and
optimize their security investments by applying just the right amount of security
to protect critical business assets while satisfying compliance requirements and
corporate goals.
HALOCK Security Labs
1834 Walden Office Square, Suite 200 About CIS
Schaumburg, IL 60173 The Center for Internet Security, Inc. (CIS®) makes the connected world a safer
847-221-0200 place for people, businesses, and governments through our core competencies of
collaboration and innovation. We are a community-driven nonprofit, responsible
halock.com for the CIS Critical Security Controls® and CIS Benchmarks™, globally recognized
best practices for securing IT systems and data. We lead a global community of IT
professionals to continuously evolve these standards and provide products and
services to proactively safeguard against emerging threats. Our CIS Hardened
Images® provide secure, on-demand, scalable computing environments in the
cloud. CIS is home to the Multi-State Information Sharing and Analysis Center®
CIS (MS-ISAC®), the trusted resource for cyber threat prevention, protection, response,
31 Tech Valley Drive and recovery for U.S. State, Local, Tribal, and Territorial government entities, and
East Greenbush, NY 12061 the Elections Infrastructure Information Sharing and Analysis Center® (EI-ISAC®),
518-266-3460 which supports the rapidly changing cybersecurity needs of U.S. election offices.
To learn more, visit cisecurity.org or follow us on Twitter: @CISecurity.
cisecurity.org