Skip to Main Content

CIS Controls GAP Analysis Service

Strengthening your security, one step at a time

Image of an IT security professional working on a laptop in a server room

Organisations of all sizes are constantly at high risk of breaches that could disrupt operations, compromise sensitive data, and tarnish reputations.

To address these challenges, cyber security practitioners worldwide turn to the CIS Critical Security Controls (CIS Controls) – a set of best practices designed to fortify cyber defences effectively.

What are the CIS Controls?

The CIS Critical Security Controls v.8 is a comprehensive security framework designed to help organisations of all sizes protect themselves against cyber threats. Composed of a collection of high priority must do actions, organisations can measure their current cyber security capability by using the controls and safeguards as a benchmark and baseline.

Cyber attacks often capitalise on vulnerabilities stemming from poor cyber security practices, such as unpatched software, misconfigured systems, and outdated solutions. The CIS Controls address these weak points by incorporating fundamental security measures that help establish strong cyber hygiene. By following these controls, your organisation will significantly reduce your cyber vulnerability.

Image of an IT security professional typing on a laptop

Introducing CIS Controls Gap Analysis service

Our comprehensive CIS Controls Gap Analysis service is tailored to assess and enhance your organisation’s cyber security capabilities The service centres around the top 18 CIS controls, which encompass critical areas that directly influence your ability to prevent breaches and minimise risks.

What are the offerings?

Customised assessment icon

Customised assessment

the review is personalised to your organisation’s unique needs. Our specialists delve into the specific aspects of your cyber security to identify potential gaps and vulnerabilities

Detailed output report icon

Detailed output report

you’ll receive an in-depth report that highlights gaps in each area and provides actionable insights. This report will help you understand where improvements are needed and how they align with your risk tolerance

Conformance analysis icon

Conformance analysis

optionally, we can map the CIS Controls to a standard or framework of your choice, such as but not limited to ISO27001, NCSC CAF or NIST

CIS Gap Analysis and CIS Lite Gap Analysis – which is right for you?

Both the CIS Gap Analysis and CIS Gap Lite Analysis are delivered as a series of workshops, in which our team of cyber security consultants will assess your organisation’s security posture against the top 18 CIS controls or six of the top 18 CIS controls (Lite).

This gives you a high-level overview of your risk profile by identifying areas which could have the most material impact on your organisation’s ability to protect against breaches and reduce risk. See what’s covered in each option below.

Our CIS Gap Analysis is an assessment of the following risk areas:

  • Control 01: Inventory and Control of Enterprise Assets
  • Control 02: Inventory and Control of Software Assets
  • Control 03: Data Protection
  • Control 04: Secure Configuration of Enterprise Assets and Software
  • Control 05: Account Management
  • Control 06: Access Control Management
  • Control 07: Continuous Vulnerability Management
  • Control 08: Audit Log Management
  • Control 09: Email and Web Browser Protection
  • Control 10: Malware Defences
  • Control 11: Data Recovery
  • Control 12: Network Infrastructure Management
  • Control 13: Network Monitoring and Defence
  • Control 14: Security Awareness and Skills Training
  • Control 15: Service Provider Management
  • Control 16: Applications Software Security
  • Control 17: Incident Response Management
  • Control 18: Penetration Testing

Our CIS Lite Gap Analysis is an assessment of the following risk areas:

  • Control 01: Inventory and Control of Enterprise Assets
  • Control 02: Inventory and Control of Software Assets
  • Control 04: Secure Configuration of Enterprise Assets and Software
  • Control 05: Account Management
  • Control 07: Continuous Vulnerability Management
  • Control 08: Audit Log Management
Image of two IT security professionals collaborating on a laptop
Image of an IT security professional working on a computer

Ready to find out more? Talk to us today

To discover more about our CIS Controls Gap Analysis services, book a one-to-one call with one of our GRC Specialists.

You can also email us at [email protected] or call 01904 562200 – whatever works best for you.