Content library
CIS 18

Requirements included in the framework

Policy
Linked frameworks
Framework
Tasks
Securely Dispose of Data
3.5
CIS 18 controls
7
Encrypt Data on End-User Devices
3.6
CIS 18 controls
2
Establish and Maintain a Data Classification Scheme
3.7
CIS 18 controls
5
Document Data Flows
3.8
CIS 18 controls
4
Encrypt Data on Removable Media
3.9
CIS 18 controls
1
Establish and Maintain a Secure Configuration Process
4.1
CIS 18 controls
3
Enforce Automatic Device Lockout on Portable End-User Devices
4.10
CIS 18 controls
2
Enforce Remote Wipe Capability on Portable End-User Devices
4.11
CIS 18 controls
2
Separate Enterprise Workspaces on Mobile End-User Devices
4.12
CIS 18 controls
2
Establish and Maintain a Secure Configuration Process for Network Infrastructure
4.2
CIS 18 controls
4
Configure Automatic Session Locking on Enterprise Assets
4.3
CIS 18 controls
1
Implement and Manage a Firewall on Servers
4.4
CIS 18 controls
3
Implement and Manage a Firewall on End-User Devices
4.5
CIS 18 controls
3
Securely Manage Enterprise Assets and Software
4.6
CIS 18 controls
1
Manage Default Accounts on Enterprise Assets and Software
4.7
CIS 18 controls
3
Uninstall or Disable Unnecessary Services on Enterprise Assets and Software
4.8
CIS 18 controls
1
Configure Trusted DNS Servers on Enterprise Assets
4.9
CIS 18 controls
2
Establish and Maintain an Inventory of Accounts
5.1
CIS 18 controls
3
Use Unique Passwords
5.2
CIS 18 controls
5
Disable Dormant Accounts
5.3
CIS 18 controls
2
Restrict Administrator Privileges to Dedicated Administrator Accounts
5.4
CIS 18 controls
2
Establish and Maintain an Inventory of Service Accounts
5.5
CIS 18 controls
1
Centralize Account Management
5.6
CIS 18 controls
2
Establish an Access Granting Process
6.1
CIS 18 controls
2

Never duplicate effort. Do it once - improve compliance across frameworks.

Reach multi-framework compliance in the simplest possible way
Security frameworks tend to share the same core requirements - like risk management, backup, malware, personnel awareness or access management.
Cyberday maps all frameworks’ requirements into shared tasks - one single plan that improves all frameworks’ compliance.
Do it once - we automatically apply it to all current and future frameworks.
Get to know Cyberday
Start your free trial
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.