controls/frameworks/cis-controls-v8.json
|
{
"frameworkId": "cis-controls-v8", "label": "CIS Controls v8.1", "version": "8.1", "css": "fw-cis-ctrl", "totalControls": 153, "registryKey": "cis-controls-v8", "csvColumn": "CisControlsV8", "displayOrder": 12, "scoring": { "method": "profile-compliance", "profiles": { "IG1": { "label": "Implementation Group 1", "css": "fw-cis-ctrl", "profileKey": "IG1", "controlCount": 56 }, "IG2": { "label": "Implementation Group 2", "css": "fw-cis-ctrl", "profileKey": "IG2", "controlCount": 130 }, "IG3": { "label": "Implementation Group 3", "css": "fw-cis-ctrl-ig3", "profileKey": "IG3", "controlCount": 153 } } }, "colors": { "light": { "background": "#dbeafe", "color": "#1e40af" }, "dark": { "background": "#1E3A5F", "color": "#60A5FA" } }, "controls": { "1": "Inventory and Control of Enterprise Assets", "2": "Inventory and Control of Software Assets", "3": "Data Protection", "4": "Secure Configuration of Enterprise Assets and Software", "5": "Account Management", "6": "Access Control Management", "7": "Continuous Vulnerability Management", "8": "Audit Log Management", "9": "Email and Web Browser Protections", "10": "Malware Defenses", "11": "Data Recovery", "12": "Network Infrastructure Management", "13": "Network Monitoring and Defense", "14": "Security Awareness and Skills Training", "15": "Service Provider Management", "16": "Application Software Security", "17": "Incident Response Management", "18": "Penetration Testing" } } |