CIS Guide To Enterprise Assets and Software ONLINE 2022 0330 1
CIS Guide To Enterprise Assets and Software ONLINE 2022 0330 1
v8
Enterprise Assets
and Software
CIS Critical Security Controls v8
April 2022
Simplifying Security 1
Introduction The CIS Critical Security Controls® (CIS Controls®) are a set of best practices that are
designed to protect an enterprise from the most common cyber-attacks. In CIS Controls
v8, enhancements were made to keep up with evolving technology, evolving threats, and
the evolving workplace. A big part of v8’s development involved simplifying the language,
ensuring that practical guidance is given, and that each Safeguard is measurable.
At the very foundation of the CIS Controls are a few critical actions that should be taken before
any other Safeguards are implemented, which surround knowing your environment. In order to
protect what you have, you first must know what you have. When implementing and auditing
the CIS Controls, there are several references to terms such as enterprise assets, software,
end-user devices, and more. CIS simplified the language in v8 to provide enterprises guidance
on how enterprise assets and software are organized in the CIS Controls and to help explain
what we mean when we say things like “Establish and Maintain Detailed Enterprise Asset
Inventory.”
Adopters of the CIS Controls should use this guide as a reference during activities such as
implementation or auditing to verify that all in-scope assets are being accounted for and
are secured.
Simplifying Security 1
Portable end-user devices are transportable end-user devices that have the capability to
wirelessly connect to a network. Portable end-user devices can include laptops and mobile
devices such as smartphones and tablets, all of which are a subset of enterprise assets.
Mobile end-user devices are small, enterprise issued end-user devices with intrinsic wireless
capability, such as smartphones and tablets. Mobile end-user devices are a subset of portable
end-user devices, including laptops, which may require external hardware for connectivity.
Mobile end-user devices are a subset of end-user devices.
Simplifying Security 2
Software Assets What are software assets?
Also referred to as software in CIS Controls v8, these are the programs and other operating
information used within an enterprise asset. Software assets include operating systems and
applications. Enterprise assets contain software assets.
Software Assets
SUBSET SUBSET
For more information on CIS Controls v8, visit our website at www.cisecurity.org/controls.
Additionally, find out more here on how to join one of our Communities on CIS WorkBench.
Simplifying Security 3
The Center for Internet Security, Inc. (CIS®) makes the connected
world a safer place for people, businesses, and governments
through our core competencies of collaboration and innovation.
We are a community-driven nonprofit, responsible for the CIS Critical
Security Controls® and CIS Benchmarks™, globally recognized best
practices for securing IT systems and data. We lead a global community
of IT professionals to continuously evolve these standards and provide
products and services to proactively safeguard against emerging
threats. Our CIS Hardened Images® provide secure, on-demand,
scalable computing environments in the cloud.
cisecurity.org
[email protected]
518-266-3460
Center for Internet Security
@CISecurity
TheCISecurity
cisecurity
Simplifying Security 4