CISA Cyber Essentials
Best for: Leaders and IT staff at small businesses, local governments, tribal nations, and territorial agencies without dedicated cybersecurity teams. CISA Cyber Essentials gives resource-constrained organizations a starting point for basic cyber hygiene. No regulatory mandate exists, but federal grant programs such as the State and Local Cybersecurity Grant Program under the Infrastructure Investment and Jobs Act frequently treat CISA guidance as a baseline expectation.
| Mandatory? | Voluntary โ recommended for small organizations and critical infrastructure |
| Who validates? | Self-assessment; no formal certification |
| Renewal | No fixed cycle |
| Scope | Small businesses and SLTT governments; six essential elements |
๐ Cybersecurity and Infrastructure Security Agency (CISA), U.S. Department of Homeland Security ยท CISA Cyber Essentials (2019) Official source โ
Get Started
module "..." {
source = "cisacyberessentials.compliance.tf/terraform-aws-modules/<module>/aws"
version = "<version>"
}What Compliance.tf Covers vs. What You Handle
What Compliance.tf automates
- Audit Logging and Trail Integrity: Runs 9 controls validating CloudTrail multi-region enablement, S3 data event logging (read and write), CloudWatch integration, log file validation, and KMS encryption of trail logs. Also checks API Gateway stage logging.
- Encryption at Rest: Covers API Gateway cache encryption, backup recovery point encryption, and CloudTrail log encryption with KMS CMK. Validates that encryption is configured at the resource level.
- Encryption in Transit: Validates that API Gateway REST API stages use SSL certificates for backend authentication.
- Backup and Disaster Recovery: Three controls check backup plan minimum retention (35 days), recovery point retention enforcement, and manual deletion protection on recovery points.
- Network Exposure Reduction: Flags Auto Scaling launch configurations that assign public IPs and API Gateway stages not associated with a WAF web ACL.
- Credential and Certificate Management: Flags ACM certificates within 30 days of expiration and CodeBuild projects with plaintext sensitive AWS values in environment variables.
What you handle
- Audit Logging and Trail Integrity: Log review procedures, alerting thresholds in CloudWatch or a SIEM, and an incident escalation process tied to log findings.
- Encryption at Rest: KMS key rotation schedules, key access policies, and documenting which teams are authorized to manage or use each CMK.
- Encryption in Transit: Enforcing TLS 1.2+ across all endpoints, configuring custom domain names with appropriate security policies, and testing cipher suites.
- Backup and Disaster Recovery: Periodic restore testing, RPO/RTO targets documented per workload, and maintaining an offline or immutable backup copy outside AWS for critical assets.
- Network Exposure Reduction: WAF rule tuning, security group reviews for resources outside these specific controls, and keeping a network diagram current showing all internet-facing entry points.
- Credential and Certificate Management: Setting up ACM auto-renewal where possible, rotating credentials stored in Secrets Manager, and establishing a process for tracking certificate ownership across teams.
Controls by Category
Your Data: Backup and Recovery (1 control)
Essential Element 5 ('Your Data') requires more than just having backups. Assessors confirm that backup plans enforce a minimum 35-day retention, that recovery points cannot be manually deleted (a real concern when a ransomware actor gains console access), and that recovery points persist through the full retention window. Pull AWS Backup plan JSON exports and vault access policies to show this.
Your Data: Encryption and Data Protection (3 controls)
The first question is whether encryption is configured at the resource level, both at rest and in transit. That means KMS CMK for CloudTrail logs, encrypted backup recovery points, SSL certificates on API Gateway stages, and API Gateway cache encryption. That last item is a frequent miss because it is disabled by default, and teams often discover the gap only when reviewing API Gateway stage settings directly. Bring KMS key policies, API Gateway stage configurations, and AWS Backup vault encryption settings to the review.
Your Systems: Audit Logging and Monitoring (4 controls)
A common gap here is enabling CloudTrail at the account level but missing S3 object-level data events, which leaves a blind spot on actual data access patterns. Reviewers will want CloudTrail configuration exports and CloudWatch log group retention settings, and they will confirm that no trails are disabled. Log integrity through file validation and centralized forwarding to CloudWatch Logs is expected, not optional.
Additional Controls (78)
AWS Database Migration Service (1)
AWS IAM (7)
AWS Lambda (1)
Amazon CloudWatch Logs (1)
Amazon DynamoDB (3)
Amazon DynamoDB Accelerator (1)
Amazon EBS (2)
Amazon EC2 (3)
Amazon EFS (2)
Amazon ElastiCache (1)
Amazon OpenSearch Service (3)
Amazon RDS (16)
Amazon Redshift (8)
Amazon S3 (13)
Amazon SageMaker (4)
Elastic Load Balancing (5)
Related Frameworks
NIST CSF โ ๐ข High overlap (65%)
CISA Cyber Essentials was designed as a simplified on-ramp to the NIST Cybersecurity Framework. Most Cyber Essentials recommendations map to NIST CSF Identify, Protect, and Detect functions, but Cyber Essentials omits the depth of subcategories and implementation tiers that CSF provides.
NIST 800-53 Rev 5 โ ๐ก Medium overlap (35%)
NIST 800-53 Rev 5 is far more granular, with over 1,000 controls. The Cyber Essentials controls mapped here partially overlap with the AU (Audit and Accountability), CP (Contingency Planning), and SC (System and Communications Protection) families, but cover only a fraction of 800-53's scope.
CIS AWS Benchmark v3.0.0 โ ๐ก Medium overlap (45%)
CIS Benchmarks for AWS share many of the same technical checks (CloudTrail configuration, encryption, network exposure). CIS is more prescriptive at the resource configuration level, while Cyber Essentials provides broader organizational guidance that extends beyond cloud infrastructure.