The CIS (Center for Internet Security) Critical Security Controls, referred to as CIS Controls, are a set of best practices any organization can use to strengthen their cybersecurity posture.
“The CIS 18 are prioritized, easy to understand, and extremely cost-effective for small to mid-size organizations looking to prove they are secure enough to do business in today’s marketplace. I highly recommend starting with CIS in building your cybersecurity program.”
– Jim Long, Managing Partner - The Long Law Firm, PLLC (Source: CIS)
Complying with the CIS Controls can help protect organizations against security risks. With Blumira, you can easily meet and exceed CIS Control requirements for audit log management (CIS 8), network monitoring and defense, and much more.
By regularly running and scheduling Blumira’s pre-built CIS Control reports, you can prove your compliance to an auditor for certain controls.
See which Blumira reports map to which CIS Controls so you can easily hand over pre-built reports to your auditor to prove your compliance. Please note that each report is available for certain integrations, which are listed under each report below:
CIS Critical Security Controls |
Blumira’s Global Reports |
CIS Control 3 – System Changes: Record critical configuration and policy changes |
CIS - Windows GPO Updates (Blumira) CIS - Azure Policy Changes (ERW Inc) CIS - Firewall Configuration Change |
CIS Control 4 – Privileged Access: Track access by administrators and power users |
CIS Controls - Administrator Access (Windows) |
CIS Control 4 – Logins by Location: Spot access from unfamiliar regions |
CIS - Logins from Outside the US |
CIS Control 5 – Failed Logins: Identify brute force and other credential attacks |
CIS Controls - Failed Logins |
CIS Control 5 – Account Lockouts: Find accounts locked due to excessive failed logins |
CIS - Account Lockouts |
CIS Control 6 – Log Tampering: Detect modifications or deletions of log data |
CIS Controls Log Tampering - Clearing of Windows Event Log |
CIS Control 9 – Firewall Traffic: Analyze allowed/blocked connections at perimeter |
CIS - Allowed Firewall Traffic |
CIS Control 12 – VPN Connections: Monitor remote access methods and users |
CIS Controls - VPN Connections |
CIS Control 16 – Password Resets: Track password changes for awareness of compromised accounts |
CIS - Password Change CIS - Azure Password Change |
CIS Control 18 – USB Device Usage: Detect unauthorized devices plugged into endpoints |
CIS - USB Device Attached CIS Controls - Mounted Device |
CIS Control 19 – IDS/IPS Alerts: Identify potential intrusion attempts and malware |
CIS – IDS/IPS Alerts |
Blumira customers can use global and saved reports to easily access CIS Control reports, as well as many other reports to analyze the logged events that you send Blumira.
To view a CIS global report or one of your saved reports, follow these easy steps:
Get more tips on how to use Blumira’s Report Builder in our documentation article, Using global and saved reports. Watch the video below to learn more about using Report Builder:
It’s easy to help meet or support multiple compliance controls using Blumira’s SIEM + XDR platform. Time-strapped IT teams can do more with one solution that combines SIEM, endpoint visibility and automated response. See our other posts on NIST compliance reports, ISO reports, and the different compliance frameworks we support.
There’s a few different ways you can get started with Blumira:
Are you an MSP? Check out our MSP Program with NFR licensing for partners.