CIS Controls are a set of 18 prioritized cybersecurity best practices developed by the Center for Internet Security (CIS). Designed to help organizations protect themselves from the most common cyber threats, CIS Controls provide a clear, actionable roadmap for improving security posture, managing risk, and supporting compliance efforts.
CIS Controls offer a practical framework for building a layered security strategy to defend systems, networks, and data against modern cyber threats. Organized into 18 top-level categories, each control provides specific safeguards that help organizations prioritize and implement defenses based on their size, resources, and risk profile.
To support scalability, CIS introduced Implementation Groups (IGs) that allow organizations to strategically build their security stack over time:
CIS Controls are widely recognized across industries and align with major compliance frameworks such as NIST, HIPAA, CMMC, and SOC 2. They offer a structured, resource-conscious path for organizations seeking to strengthen security posture without unnecessary complexity.
Organizations adopt CIS Controls to create a focused, prioritized security foundation that addresses real-world threats. The framework is built to be practical, scalable, and achievable—even for resource-constrained teams.
Implementing CIS Controls improves an organization's ability to anticipate, withstand, and respond to cyberattacks. They provide a strong foundation for internal security practices while also supporting organizations in navigating cloud compliance challenges and building trust with external stakeholders.
CIS Controls are organized into 18 core categories. Several areas are especially important for DNS security:
These controls highlight DNS filtering as a foundational defense against many forms of cyberattack.
CIS Controls are mapped to Implementation Groups (IG1–IG3) to help organizations prioritize actions:
Organizations can download our CIS Controls Checklist to assess current safeguards and prioritize next steps based on Implementation Groups (IG1–IG3).
CIS Controls are often used alongside other cybersecurity tools and frameworks. Understanding how they compare to CIS Benchmarks and the NIST Cybersecurity Framework can help clarify when and how to use each one effectively:
Framework |
Focus |
Example Use Case |
CIS Controls |
What to do (best practices) |
Prioritizing security investments |
CIS Benchmarks |
How to configure systems |
Hardening Windows, Linux, cloud platforms |
NIST CSF |
Broad risk management framework |
Mapping enterprise-wide security strategy |
While the CIS Controls focus on what actions to take and the CIS Benchmarks define how to securely configure systems, both complement the broader risk strategy offered by the NIST CSF. Together, they provide layered guidance that supports DNS filtering as a practical measure for reducing exposure to common threats and aligning with foundational security best practices.
Organizations across industries can strengthen their cybersecurity posture by adopting CIS Controls. Here are examples of who might benefit and how they apply these best practices in real-world scenarios.
Managed service providers (MSPs) and IT teams can learn how MSPs align with CIS Controls and broader compliance frameworks in our expert webinar.
DNSFilter supports organizations looking to align with CIS Controls by providing DNS filtering that protects users against phishing, malware, and unauthorized access. See how adding DNS security can help reinforce your cybersecurity strategy.
Learn more about DNSFilter’s role in a CIS Controls-based defense →