Video

Achieving CIS Controls 1 & 2 with Cybersecurity Asset Management

The Center for Internet Security (CIS) lists a prioritized set of actions to protect organizations from known cyber attack vectors. Known as the CIS 20, the list is broken down into:

  • 6 Basic CIS Controls
  • 10 Foundational CIS Controls
  • 4 Organizational CIS Controls

The most basic controls, CIS 1 and 2 are covered in this short video. In it, we demonstrate how a cybersecurity asset management solution like Axonius can automatically provide what organizations need to achieve these controls.

You will learn:

  • The necessary steps to achieving CIS Control 1, including how to inventory, track, and correct all devices
  • How to achieve CIS Control 2 by identifying and documenting all software, and developing a whitelist of approved software