CIS Controls v8.0 IG1
Best for: Small and medium enterprises without dedicated security staff, particularly those handling sensitive data where cyber insurance applications, vendor questionnaires, or SOC 2 readiness work has surfaced CIS benchmarks. IG1 is the minimum expectation in most of those contexts, and many underwriters now ask about it explicitly. No dedicated security team, limited budget: IG1 is where you start.
| Mandatory? | Voluntary security baseline |
| Who validates? | Self-assessment or third-party |
| Renewal | No fixed cycle |
| Scope | All organizations; Implementation Group 1 (basic hygiene) |
๐ Center for Internet Security (CIS) ยท CIS Controls v8.0 IG1 (May 2021) Official source โ
Get Started
module "..." {
source = "cisv80ig1.compliance.tf/terraform-aws-modules/<module>/aws"
version = "<version>"
}What Compliance.tf Covers vs. What You Handle
What Compliance.tf automates
- Encryption at Rest: Runs controls checking EBS volume encryption, EBS default encryption settings, and KMS CMK usage for CloudTrail logs. Detects unencrypted attached volumes and publicly restorable snapshots.
- Logging and Monitoring: Validates CloudTrail multi-region trails, S3 data event logging, CloudWatch integration, log file validation, CloudFront access logs, and API Gateway stage logging. Checks CloudWatch log group retention against the 365-day threshold.
- Network Exposure: Checks that Auto Scaling launch configurations do not assign public IPs and that DMS replication instances are not publicly accessible. Identifies resources with unnecessary internet-facing configurations.
- Backup and Recovery: Validates AWS Backup plan existence with minimum 35-day retention, DynamoDB table inclusion in backup plans, and DynamoDB point-in-time recovery enablement.
- Account Governance: Checks that the AWS account is part of AWS Organizations, validating centralized governance capability.
What you handle
- Encryption at Rest: Defining and documenting your key management policy, configuring KMS key rotation schedules, and managing key access grants. Encryption coverage for services outside these checks (RDS, S3, EFS) is also on you.
- Logging and Monitoring: Alerting rules on critical log events, regular log reviews, and incident escalation procedures based on log findings all fall outside Terraform policy checks. So does SIEM integration and threat detection rule configuration.
- Network Exposure: Maintaining network architecture documentation, configuring VPC flow logs, managing security group rules beyond what these specific controls cover, and running periodic network access reviews.
- Backup and Recovery: Restore testing, RTO and RPO documentation, and ensuring backup plans cover all in-scope data stores beyond DynamoDB and EBS are your responsibility.
- Account Governance: Configuring service control policies, setting up cross-account access patterns, defining the OU structure, and managing member account lifecycle processes.
Controls by Category
Audit Log Management (CIS Control 8) (6 controls)
The most common finding here is CloudTrail trails that exist but lack log file validation (Safeguard 8.11) or are not integrated with a centralized log management solution like CloudWatch. Assessors also check that S3 data event logging captures object-level API activity, not just management events, and that log retention meets the 365-day threshold in Safeguard 8.10.
Data Protection (CIS Control 3) (2 controls)
Encryption at rest on all storage volumes and snapshots (Safeguard 3.11) is the primary check, along with whether sensitive data like audit logs uses customer-managed KMS keys rather than default AWS encryption. A frequent gap: EBS encryption by default is a regional setting, and organizations often enable it in their primary region but miss secondary regions. Public EBS snapshots are a high-severity finding every time.
Data Recovery (CIS Control 11) (2 controls)
DynamoDB point-in-time recovery is a consistent miss because it must be explicitly enabled per table. Assessors confirm that backup plans exist with defined retention periods (Safeguard 11.2), that the 35-day minimum retention threshold passes for all in-scope data stores, and may request evidence of a completed restore test.
Secure Configuration of Enterprise Assets and Software (CIS Control 4) (1 control)
Auditors check that compute resources follow least-privilege network exposure (Safeguards 4.6 and 4.7). Launch configurations that assign public IPs directly to instances bypass load balancer controls and widen the attack surface. DMS replication instances left publicly accessible after a migration project are a recurring finding, the kind of temporary configuration that never gets cleaned up.
Additional Controls (36)
AWS Lambda (1)
Amazon EC2 (5)
Amazon ElastiCache (1)
Amazon RDS (4)
Amazon Redshift (4)
Amazon S3 (11)
Amazon SageMaker (1)
Amazon VPC (2)
Elastic Load Balancing (1)
Related Frameworks
NIST CSF v1.0 โ ๐ข High overlap (65%)
CIS v8.0 maps directly to NIST CSF functions. CIS provides specific technical controls that implement NIST CSF's higher-level categories. CIS publishes an official mapping document between CIS Controls v8 and NIST CSF.
NIST 800-53 Rev 5 โ ๐ก Medium overlap (45%)
NIST 800-53 is far broader in scope with over 1,000 controls. CIS IG1's 56 safeguards map to a subset of 800-53 controls, primarily in the AC, AU, CM, CP, and SC families. Organizations subject to FedRAMP or FISMA use 800-53 as the authoritative source and treat CIS as an implementation accelerator.
SOC 2 โ ๐ก Medium overlap (40%)
SOC 2 Trust Services Criteria (especially CC6 and CC7) share requirements with CIS IG1's logging, access control, and configuration management safeguards. Many SOC 2 auditors accept CIS benchmark scan results as supporting evidence for common criteria points.