CIS Controls and ISO 27001 (Simple Mapping)
CIS Controls and ISO 27001 (Simple Mapping)
1.1, 06.03.2025
ISO 27001:2022 ISO/IEC 27001:2022 Information security, cybersecurity and privacy protection —
Information security management systems — Requirements
https://www.iso.org/standard/27001
ISO 27002:2022 ISO/IEC 27002:2022 Information security, cybersecurity and privacy protection —
Information security controls
https://www.iso.org/standard/75652.html
CIS Critical Security Controls, v.8.1 Related ISO 27001:2022 requirements and controls
Control 1: Inventory and Control of A.5.9 Inventory of information and other associated assets
Enterprise Assets A.5.10 Acceptable use of information and other associated assets
Actively manage (inventory, track, and correct) A.5.11 Return of assets
all enterprise assets (end-user devices,
including portable and mobile; network A.8.8 Management of technical vulnerabilities
devices; non-computing/Internet of Things
(IoT) devices; and servers) connected to the
infrastructure physically, virtually, remotely,
and those within cloud environments, to
accurately know the totality of assets that need
to be monitored and protected within the
enterprise. This will also support identifying
unauthorized and unmanaged assets to remove
or remediate.
Control 2: Inventory and Control of A.5.9 Inventory of information and other associated assets
Software Assets A.5.10 Acceptable use of information and other associated assets
Actively manage (inventory, track, and correct) A.5.32 Intellectual property rights
all software (operating systems and
applications) on the network so that only A.8.7 Protection against malware
authorized software is installed and can A.8.8 Management of technical vulnerabilities
execute, and that unauthorized and
A.8.19 Installation of software on operational systems
unmanaged software is found and prevented
from installation or execution.
Control 3: Data Protection A.5.1 Policies for information security
Develop processes and technical controls to A.5.9 Inventory of information and other associated assets
identify, classify, securely handle, retain, and
A.5.10 Acceptable use of information and other associated assets
dispose of data.
A.5.12 Classification of information
A.5.13 Labelling of information
A.5.14 Information transfer
A.5.15 Access control
A.5.18 Access rights
A.5.33 Protection of records
A.5.34 Privacy and protection of PII
A.5.37 Documented operating procedures
A.8.1 User endpoint devices
A.8.3 Information access restriction
CIS Critical Security Controls, v.8.1 Related ISO 27001:2022 requirements and controls
A.8.4 Access to source code
A.8.6 Capacity management
A.8.12 Data leakage prevention
A.8.20 Networks security
A.8.22 Segregation of networks
A.8.24 Use of cryptography
Control 4: Secure Configuration of A.6.7 Remote working
Enterprise Assets and Software A.8.1 User endpoint devices
Establish and maintain the secure configuration A.8.2 Privileged access rights
of enterprise assets (end-user devices,
including portable and mobile; network A.8.5 Secure authentication
devices; non-computing/IoT devices; and A.8.9 Configuration management
servers) and software (operating systems and
A.8.10 Information deletion
applications).
CIS Critical Security Controls, v.8.1 Related ISO 27001:2022 requirements and controls
Control 9: Email and Web Browser A.8.7 Protection against malware
Protections A.8.12 Data leakage prevention
Improve protections and detections of threats A.8.23 Web filtering
from email and web vectors, as these are
opportunities for attackers to manipulate
human behavior through direct engagement.
CIS Critical Security Controls, v.8.1 Related ISO 27001:2022 requirements and controls
A.5.22 Monitoring, review and change management of supplier
services
A.5.23 Information security for use of cloud services
Control 16: Application Software A.5.8 Information security in project
Security A.8.4 Access to source code
Manage the security life cycle of in-house A.8.8 Management of technical vulnerabilities
developed, hosted, or acquired software to
prevent, detect, and remediate security A.8.25 Secure development life cycle
weaknesses before they can impact the A.8.26 Application security requirements
enterprise.
A.8.27 Secure system architecture and engineering principles
A.8.28 Secure coding
A.8.29 Security testing in development and acceptance
A.8.30 Outsourced development
A.8.31 Separation of development, test and production
environments
Control 17: Incident Response 5.3 Organizational roles, responsibilities and authorities
Management 7.4 Communication
Establish a program to develop and maintain an A.5.2 Information security roles and responsibilities
incident response capability (e.g., policies,
plans, procedures, defined roles, training, and A.5.5 Contact with authorities
communications) to prepare, detect, and A.5.6 Contact with special interest groups
quickly respond to an attack.
A.5.20 Addressing information security within supplier agreements
A.5.24 Information security incident management planning and
preparation
A.5.25 Assessment and decision on information security events
A.5.26 Response to information security incidents
A.5.27 Learning from information security incidents
A.5.28 Collection of evidence
A.5.29 Information security during disruption
A.5.30 ICT readiness for business continuity
A.6.8 Information security event reporting
Control 18: Penetration Testing 10.2 Nonconformity and corrective action
Test the effectiveness and resiliency of A.5.35 Independent review of information security
enterprise assets through identifying and
A.8.8 Management of technical vulnerabilities
exploiting weaknesses in controls (people,
processes, and technology), and simulating the
objectives and actions of an attacker.