FrameworkMapper
Free Trial Available

CIS Controls Assessment

Evaluate your organization's cybersecurity posture against the industry-standard CIS Critical Security Controls framework.

Center for Internet Security

What are the CIS Controls?

The CIS Critical Security Controls are a prioritized set of actions developed by the Center for Internet Security that collectively form a defense-in-depth set of best practices to mitigate the most common cyber attacks.

18 Control Areas

Organized into 18 critical security control areas covering everything from inventory management to incident response and penetration testing.

153 Safeguards

Each control contains specific safeguards — actionable security measures that can be implemented and measured within your organization.

Prioritized by Risk

Controls are prioritized based on real-world attack data, focusing your efforts on the actions that provide the greatest security benefit.

Implementation Groups (IG)

CIS Controls are organized into three Implementation Groups based on organizational size, resources, and risk profile. This helps you prioritize which safeguards to implement first.

IG1

Essential Cyber Hygiene

The foundational set of cyber defense safeguards that every organization should implement. Designed for small organizations with limited IT resources.

56 Safeguards
IG2

Extended Hygiene

Additional safeguards for organizations with moderate resources that handle sensitive data and face more sophisticated threats.

+74 Safeguards
(130 total including IG1)
IG3

Advanced

The complete set of safeguards for organizations with significant security resources that must protect highly sensitive data.

+23 Safeguards
(153 total including IG1 & IG2)

Who Should Use This Assessment?

Organizations of Any Size

From small businesses to large enterprises looking to establish or improve their security baseline.

Compliance-Focused Teams

CIS Controls map to many regulatory frameworks including NIST, ISO 27001, PCI-DSS, and HIPAA.

Budget-Conscious Security Teams

The prioritized approach helps you focus limited resources on the most impactful security controls.

Security Program Benchmarking

Track your security maturity over time and demonstrate progress to leadership and stakeholders.

Assessment Dashboard Screenshot

How the Assessment Works

Our assessment tool guides you through all 153 safeguards with a simple, intuitive interface. Save your progress and return anytime.

1

Select Your Tier

Navigate through 10 progressive tiers, each building on the security foundations of the previous tier.

2

Rate Each Safeguard

For each safeguard, indicate your implementation level: Not Implemented, Partially, Mostly, or Fully Implemented.

3

Add Notes & Evidence

Document your implementation details, responsible parties, and any evidence for each safeguard.

4

Review & Generate Reports

Once complete, generate professional PDF reports and secure backups of your assessment data.

Time Estimate

A complete assessment typically takes 2-4 hours, depending on your organization's complexity and how thoroughly you document each safeguard.

What to Have Ready

  • Current IT asset inventory
  • List of security tools in use
  • Access to security policies
  • Knowledge of current processes
Safeguard Rating Interface

What You'll Receive

Upon completing your assessment, you'll have access to comprehensive reports that help you understand your security posture and plan improvements.

Executive Summary

A high-level overview designed for leadership and stakeholders. Includes overall maturity scores, Implementation Group progress, and visual charts showing your security posture at a glance.

  • Overall maturity score
  • IG1/IG2/IG3 breakdown
  • Visual progress charts
Download Sample PDF

Detailed Assessment

A comprehensive report listing every safeguard with your implementation rating, notes, and evidence. Perfect for technical teams and audit documentation.

  • All 153 safeguards
  • Your notes & evidence
  • Per-control scores
Download Sample PDF

Encrypted Backup

A password-protected JSON file containing all your assessment data. Use it to restore your assessment on any device or transfer between accounts.

  • AES-256 encryption
  • Complete data export
  • Easy restore process
Generated from your data
Executive Summary Report Preview
Detailed Assessment Report Preview


Every Assessment Includes

Beyond your core deliverables, every CIS Controls assessment unlocks a full suite of analytics, AI-powered reports, and remediation planning tools through the Analysis Dashboard.

Stakeholder-Ready Outputs

Communicate findings to executives, boards, and auditors with presentation-ready reports.

  • AI Executive Report (PDF) AI
  • Board Presentation (PDF) AI
  • Compliance Certificate (PDF)
  • Executive Dashboard

Remediation Planning

Prioritize and track remediation with actionable gap analysis and milestone planning.

  • Gap Analysis
  • POAM — Plan of Action & Milestones (PDF/CSV)
  • Tool Coverage & Recommendations
  • Risk Score Analysis

Visual Analytics

Explore your security posture through interactive dashboards and visualizations.

  • Safeguard Analysis
  • Heatmap View
  • Radar Chart
  • Tool Usage Analysis
  • Tool Effectiveness Analysis

Progressive 10-Tier Structure

Safeguards are organized into 10 progressive tiers, allowing you to build your security program incrementally. Each tier builds upon the previous, creating a natural implementation roadmap.

Tier 1
Foundation
Tier 2
Basic Controls
Tier 3
Core Security
Tier 4
Enhanced
Tier 5
Intermediate
Tier 6
Advanced Base
Tier 7
Advanced
Tier 8
Expert
Tier 9
Mature
Tier 10
Optimized

Ready to Assess Your Security Posture?

Try our CIS Controls assessment tool with a free trial. Create an account to save your progress and generate professional reports.