Content library
CIS 18

Requirements included in the framework

Policy
Linked frameworks
Framework
Tasks
Establish and Maintain Dedicated Computing Resources for All Administrative Work
12.8
CIS 18 controls
3
Centralize Security Event Alerting
13.1
CIS 18 controls
4
Perform Application Layer Filtering
13.10
CIS 18 controls
2
Tune Security Event Alerting Thresholds
13.11
CIS 18 controls
1
Deploy a Host-Based Intrusion Detection Solution
13.2
CIS 18 controls
1
Deploy a Network Intrusion Detection Solution
13.3
CIS 18 controls
1
Perform Traffic Filtering Between Network Segments
13.4
CIS 18 controls
3
Manage Access Control for Remote Assets
13.5
CIS 18 controls
5
Collect Network Traffic Flow Logs
13.6
CIS 18 controls
2
Deploy a Host-Based Intrusion Prevention Solution
13.7
CIS 18 controls
2
Deploy a Network Intrusion Prevention Solution
13.8
CIS 18 controls
1
Deploy Port-Level Access Control
13.9
CIS 18 controls
1
Establish and Maintain a Security Awareness Program
14.1
CIS 18 controls
3
Train Workforce Members to Recognize Social Engineering Attacks
14.2
CIS 18 controls
4
Train Workforce Members on Authentication Best Practices
14.3
CIS 18 controls
3
Train Workforce on Data Handling Best Practices
14.4
CIS 18 controls
4
Train Workforce Members on Causes of Unintentional Data Exposure
14.5
CIS 18 controls
2
Train Workforce Members on Recognizing and Reporting Security Incidents
14.6
CIS 18 controls
2
Train Workforce on How to Identify and Report if Their Enterprise Assets are Missing Security Updates
14.7
CIS 18 controls
1
Train Workforce on the Dangers of Connecting to and Transmitting Enterprise Data Over Insecure Networks
14.8
CIS 18 controls
2
Conduct Role-Specific Security Awareness and Skills Training
14.9
CIS 18 controls
3
Establish and Maintain an Inventory of Service Providers
15.1
CIS 18 controls
5
Establish and Maintain a Service Provider Management Policy
15.2
CIS 18 controls
3
Classify Service Providers
15.3
CIS 18 controls
4

Never duplicate effort. Do it once - improve compliance across frameworks.

Reach multi-framework compliance in the simplest possible way
Security frameworks tend to share the same core requirements - like risk management, backup, malware, personnel awareness or access management.
Cyberday maps all frameworks’ requirements into shared tasks - one single plan that improves all frameworks’ compliance.
Do it once - we automatically apply it to all current and future frameworks.
Get to know Cyberday
Start your free trial
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.