ISO 27001

CIS Controls vs ISO 27001: Which Path Suits Your Organisation?

CIS Controls and ISO 27001 are two leading cybersecurity frameworks. Learn the differences, when to choose which, and how they can be combined.

  1. 18
    critical controls in CIS Controls v8
    CIS
  2. 93
    controls in ISO 27001:2022 Annex A
    ISO
  3. CIS
    CIS IG1 covers 56 safeguards for basic cyber hygiene
    CIS

Two frameworks — different focus

When organisations need to structure their security work, two names often emerge: CIS Controls and ISO 27001. Both are well-regarded, but they have different origins, focus areas, and use cases.

Short version: CIS Controls answers “what should we do technically?”. ISO 27001 answers “how should we govern and manage information security?”.

CIS Controls in brief

What are CIS Controls? Center for Internet Security (CIS) Controls is a list of 18 prioritised security measures, developed by security experts based on real-world attack patterns.

Key characteristics:

  • Technical focus — concrete actions
  • Priority order — most important first
  • Implementation Groups (IG1-IG3) — tailored to maturity
  • Free to use
  • No certification — best practice

The 18 controls:

  1. Inventory and Control of Enterprise Assets
  2. Inventory and Control of Software Assets
  3. Data Protection
  4. Secure Configuration of Enterprise Assets and Software
  5. Account Management
  6. Access Control Management
  7. Continuous Vulnerability Management
  8. Audit Log Management
  9. Email and Web Browser Protections
  10. Malware Defences
  11. Data Recovery
  12. Network Infrastructure Management
  13. Network Monitoring and Defence
  14. Security Awareness and Skills Training
  15. Service Provider Management
  16. Application Software Security
  17. Incident Response Management
  18. Penetration Testing

ISO 27001 in brief

What is ISO 27001? ISO/IEC 27001 is an international standard for information security management systems (ISMS). It specifies requirements for establishing, implementing, maintaining and continually improving an ISMS.

Key characteristics:

  • Management system focus — processes and governance
  • Risk-based approach
  • Certifiable — third-party audit
  • Requires documentation and policies
  • Annex A with 93 controls (ISO 27001:2022)

Structure:

  • Clauses 4-10: Management system requirements (shall requirements)
  • Annex A: 93 controls across 4 themes:
    • Organisational controls (37)
    • People controls (8)
    • Physical controls (14)
    • Technological controls (34)

Comparison

AspectCIS ControlsISO 27001
FocusTechnical implementationManagement system
ApproachPrioritised listRisk-based
CertificationNoYes
CostFree frameworkCertification costs
DocumentationMinimalExtensive
Target audienceIT/security teamsEntire organisation
Updatesv8 (2021)2022 version
Controls18 + 153 safeguards93 Annex A controls

Implementation Groups (CIS)

IG1 — Basic cyber hygiene

56 safeguards. For smaller organisations with limited IT resources. Protects against common, uncomplicated attacks.

IG2 — Medium-sized organisations

74 safeguards (incl. IG1). For organisations with IT staff and more complex environments. Protects against more sophisticated threats.

IG3 — Mature organisations

All 153 safeguards. For organisations with dedicated security teams and high requirements. Protects against advanced threats.

When does CIS Controls fit?

Choose CIS Controls when:

  • You want concrete, technical measures
  • You need to prioritise — what first?
  • You have limited resources
  • Certification is not a requirement
  • You want to complement ISO 27001 with practical guidance

Typical users:

  • Startups building security from the ground up
  • SMEs wanting to raise the level quickly
  • IT departments needing actionable steps
  • Organisations complementing ISO 27001

When does ISO 27001 fit?

Choose ISO 27001 when:

  • Customers or partners require certification
  • You need structured governance of information security
  • Management needs to be involved
  • You want internationally recognised standard
  • NIS2 Directive is relevant (ISO 27001 covers much)

Typical users:

  • B2B companies with certification requirements
  • Organisations handling sensitive data
  • Companies wanting to demonstrate serious security work
  • Organisations under NIS2 Directive

Mapping between frameworks

CIS Controls and ISO 27001 Annex A have significant overlap. Here are examples of how they map:

CIS ControlISO 27001 Annex A
1. Inventory and Control of Enterprise AssetsA.5.9 Inventory of assets
3. Data ProtectionA.5.12-A.5.14 Data classification
5. Account ManagementA.5.16-A.5.18 Identity management
7. Continuous Vulnerability ManagementA.8.8 Vulnerability management
8. Audit Log ManagementA.8.15-A.8.16 Logging
14. Security Awareness and Skills TrainingA.6.3 Awareness training
17. Incident Response ManagementA.5.24-A.5.28 Incident management

Combining both frameworks

  1. Start with CIS IG1 for quick wins Implement the 56 basic safeguards to establish baseline security. This provides immediate risk reduction.
  2. Build ISMS structure in parallel Establish policies, processes and documentation according to ISO 27001. CIS implementation becomes evidence for many Annex A controls.
  3. Map CIS to Annex A Document how your CIS implementations satisfy ISO 27001 controls. Avoid duplication of effort.
  4. Fill the gaps ISO 27001 requires more than technical controls — management system, risk management, internal audit. Complement with what CIS doesn't cover.
  5. Certify when needed When ISMS is mature, undergo certification audit. CIS implementation provides strong technical foundation.

Common pitfalls

Technical vs management

CIS without management support becomes isolated IT project. ISO 27001 without technical implementation becomes paper exercise. Balance both.

Certification as goal

ISO 27001 certification is means, not end. Focus on actual security, not just compliance.

Everything at once

Don't try to implement all CIS controls or entire ISO 27001 simultaneously. Prioritise based on risk.

Forgetting maintenance

Both frameworks require continuous work. CIS gets updated, ISO 27001 requires annual review.

Summary

QuestionCIS ControlsISO 27001
What should we do technically?✓ StrongGeneral
How do we prioritise?✓ Clear orderRisk-based
Do we need certification?No✓ Yes
Does management want involvement?Optional✓ Required
Do we have limited resources?✓ IG1More demanding

How Securapilot can help

Securapilot supports both CIS Controls and ISO 27001:

  • Multi-framework support — Manage both frameworks in the same system
  • Control mapping — See how your controls satisfy multiple frameworks
  • GAP analysis — Identify what’s missing
  • Evidence management — Collect proof for audits
  • Dashboard — Overview of compliance status

Book a demo and see how we can support your framework choice.


Frequently asked questions

Can you become CIS-certified?

No, CIS Controls has no formal certification. It's a best practice framework. ISO 27001, however, offers third-party certification through accredited certification bodies.

Which is easiest to implement?

CIS Controls, particularly Implementation Group 1 (IG1), is designed to be practical and quickly implementable. ISO 27001 requires more documentation and processes but provides certifiability.

Do they work together?

Yes, they complement each other excellently. CIS Controls provides concrete technical measures that can map to ISO 27001 Annex A controls. Many organisations use CIS for technical implementation and ISO 27001 for the management system.

Which do customers usually require?

ISO 27001 certification is most common as a customer requirement, particularly in B2B. CIS Controls are used more internally to prioritise security measures and as a complement to ISO 27001.


#CIS Controls#ISO 27001#frameworks#cybersecurity#controls#certification

We use anonymous statistics without cookies to improve the website. Read more