Foundational Controls
- CIS Control 8: Malware Defenses
-
CIS Control 9: Limitation and Control of Network Ports, Protocols, and Services
- CIS Control 11: Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches
- CIS Control 14: Controlled Access Based on the Need to Know
- CIS Control 15: Wireless Access Control
- CIS Control 16: Account Monitoring and Control