CIS Controls v8.0 IG1
Best for: Small and medium enterprises without dedicated security staff, particularly those handling sensitive data where cyber insurance applications, vendor questionnaires, or SOC 2 readiness work has surfaced CIS benchmarks. IG1 is the minimum expectation in most of those contexts, and many underwriters now ask about it explicitly. No dedicated security team, limited budget: IG1 is where you start.
๐ Center for Internet Security (CIS) ยท CIS Controls v8.0 IG1 (May 2021) Official source โ
Get Started
module "..." {
source = "cisv80ig1.compliance.tf/terraform-aws-modules/<module>/aws"
version = "<version>"
}
What Compliance.tf Covers vs. What You Handle
What Compliance.tf automates
- Encryption at Rest: Runs controls checking EBS volume encryption, EBS default encryption settings, and KMS CMK usage for CloudTrail logs. Detects unencrypted attached volumes and publicly restorable snapshots.
- Logging and Monitoring: Validates CloudTrail multi-region trails, S3 data event logging, CloudWatch integration, log file validation, CloudFront access logs, and API Gateway stage logging. Checks CloudWatch log group retention against the 365-day threshold.
- Network Exposure: Checks that Auto Scaling launch configurations do not assign public IPs and that DMS replication instances are not publicly accessible. Identifies resources with unnecessary internet-facing configurations.
- Backup and Recovery: Validates AWS Backup plan existence with minimum 35-day retention, DynamoDB table inclusion in backup plans, and DynamoDB point-in-time recovery enablement.
- Account Governance: Checks that the AWS account is part of AWS Organizations, validating centralized governance capability.
What you handle
- Encryption at Rest: Defining and documenting your key management policy, configuring KMS key rotation schedules, and managing key access grants. Encryption coverage for services outside these checks (RDS, S3, EFS) is also on you.
- Logging and Monitoring: Alerting rules on critical log events, regular log reviews, and incident escalation procedures based on log findings all fall outside Terraform policy checks. So does SIEM integration and threat detection rule configuration.
- Network Exposure: Maintaining network architecture documentation, configuring VPC flow logs, managing security group rules beyond what these specific controls cover, and running periodic network access reviews.
- Backup and Recovery: Restore testing, RTO and RPO documentation, and ensuring backup plans cover all in-scope data stores beyond DynamoDB and EBS are your responsibility.
- Account Governance: Configuring service control policies, setting up cross-account access patterns, defining the OU structure, and managing member account lifecycle processes.
Controls by Category
Audit Log Management (CIS Control 8) (6 controls)
The most common finding here is CloudTrail trails that exist but lack log file validation (Safeguard 8.11) or are not integrated with a centralized log management solution like CloudWatch. Assessors also check that S3 data event logging captures object-level API activity, not just management events, and that log retention meets the 365-day threshold in Safeguard 8.10.
Data Protection (CIS Control 3) (2 controls)
Encryption at rest on all storage volumes and snapshots (Safeguard 3.11) is the primary check, along with whether sensitive data like audit logs uses customer-managed KMS keys rather than default AWS encryption. A frequent gap: EBS encryption by default is a regional setting, and organizations often enable it in their primary region but miss secondary regions. Public EBS snapshots are a high-severity finding every time.
Data Recovery (CIS Control 11) (2 controls)
DynamoDB point-in-time recovery is a consistent miss because it must be explicitly enabled per table. Assessors confirm that backup plans exist with defined retention periods (Safeguard 11.2), that the 35-day minimum retention threshold passes for all in-scope data stores, and may request evidence of a completed restore test.
Secure Configuration of Enterprise Assets and Software (CIS Control 4) (1 control)
Auditors check that compute resources follow least-privilege network exposure (Safeguards 4.6 and 4.7). Launch configurations that assign public IPs directly to instances bypass load balancer controls and widen the attack surface. DMS replication instances left publicly accessible after a migration project are a recurring finding, the kind of temporary configuration that never gets cleaned up.
Additional Controls (36)
AWS IAM (1)
AWS KMS (1)
AWS Lambda (1)
Amazon EC2 (5)
Amazon EKS (1)
Amazon EMR (1)
Amazon ElastiCache (1)
Amazon RDS (4)
Amazon Redshift (4)
Amazon S3 (11)
Amazon SageMaker (1)
Amazon VPC (2)
Elastic Load Balancing (1)
Other (2)
Related Frameworks
Frequently Asked Questions
Does CIS IG1 apply to my organization?
IG1 applies to any organization that wants a defensible cybersecurity baseline. No regulation mandates CIS adoption specifically, but IG1 shows up in cyber insurance applications, vendor security questionnaires, and SOC 2 readiness work. If you have fewer than 50 employees and no dedicated security team, CIS designed IG1 for you.
What is the difference between IG1, IG2, and IG3?
IG1 contains 56 safeguards covering essential cyber hygiene. IG2 adds 74 more (130 total) for organizations with moderate risk and some dedicated IT security staff. IG3 includes all 153 safeguards and targets organizations facing sophisticated adversaries. The groups are cumulative: IG2 includes all of IG1, and IG3 includes all of IG2.
Is there a formal CIS IG1 certification?
No. CIS Controls have no certification program; compliance is self-assessed. You can use CIS-CAT Pro (a licensed tool from CIS) or open-source tools like Steampipe and PowerPipe to generate assessment reports. Some organizations include CIS benchmark results in their SOC 2 evidence packages or share them with customers as proof of baseline controls.
How does CIS v8.0 differ from v8.1?
CIS v8.1 (June 2024) is a minor update. It clarified safeguard descriptions and added context to implementation guidance but did not change the control structure or numbering. The 18 control areas and the IG groupings are the same. If your tooling references v8.0, you are not materially behind.
How long does an initial CIS IG1 assessment take?
For a single AWS account, automated scanning with PowerPipe produces results in minutes. Remediation depends on your environment size. A typical small organization with 1 to 3 AWS accounts can reach IG1 compliance within 2 to 6 weeks, assuming no major architectural changes are needed. Most of that time goes to enabling encryption defaults, configuring CloudTrail correctly, and setting up backup plans.