CIS Controls
The latest update to the CIS Controls, Version 8.1, aims to address the evolving cybersecurity landscape, offering improved guidance and more relevant practices to protect against today’s cyber threats.
A Brief History of the CIS Controls:
CIS Control's Journey to 8.1
-
Early 2008 - 2014
CIS Controls Version 1.0 - 5.0
- The "SANS Top 20" or “SANS Critical Security Controls” (now known as the CIS Critical Security Controls) was developed by a group of cybersecurity experts to establish a set of actionable best practices for securing IT systems. The first version was designed to be practical and concise, focusing on reducing the most critical risks.
- Version 5.0 included expanded coverage and refined practices, emphasizing a stronger framework for improving an organization’s overall cybersecurity posture.
-
October 15, 2015
CIS Controls Version 6.0
- In 2015, CIS officially took charge of the CIS Controls with the release of Version 6. The aim of the CIS Controls was to offer organizations practical guidance to significantly enhance their cybersecurity defenses.
- Version 6.0 is aligned with other prominent cybersecurity frameworks, such as NIST Cybersecurity Framework, ISO, and PCI.
-
May 19, 2018
CIS Controls Version 7.0
- The major update added more details to the controls, better alignment with emerging threats, and the introduction of a "critical controls" approach, further prioritizing actions based on their effectiveness in mitigating risk.
-
May 18, 2021
CIS Controls Version 8.0
- Version 8.0 moved towards a more holistic, industry-standard approach, focusing on the integration of security, privacy, and operational resilience. The structure and recommendations were refined to be more applicable across diverse organizational environments.
-
June 25, 2025
CIS Controls Version 8.1
- Version 8.1 introduces fine-tuned improvements and addresses emerging threats, vulnerabilities, and technologies, making it the most relevant version yet for organizations of all sizes. It realigned its security function mappings to better match NIST CSF 2.0, ensuring a more cohesive and updated approach to securing mobile devices and aligning with the latest NIST cybersecurity framework. This adjustment strengthens the integration of mobile device management practices with broader organizational security strategies.
What Are the Differences Between CIS V 7.0 and 8.0?
Structure Changes
Version 7.0 introduced the concept of “Implementation Groups” to help organizations prioritize controls based on their size and resources. In Version 8.0, these groups were further refined and expanded to address current technologies such as cloud environments and advanced threat landscapes.
Broader Scope in V8.0
Version 8.0 introduced 18 controls (compared to 20 in v7.0) and emphasized critical areas such as data security and continuous monitoring. Version 8.0 also includes specific recommendations for managing the security of supply chains, something not explicitly covered in previous versions.
Updated Prioritization
The prioritization in Version 8.0 focused on the most impactful areas, adjusting for cloud, IoT, and remote workforce considerations that were growing concerns in Version 7.0 but were less detailed.
Why CIS Controls are Updating to 8.1
What’s new in CIS Controls v8.1?
CIS Controls v8.1 builds on the strong foundation of Version 8, refining and expanding on key areas to address the evolving cybersecurity landscape. With the rise of new technologies, increasingly sophisticated cyber attacks, and more complex organizational structures, the updates in v8.1 ensure that organizations of all sizes have a modern, actionable framework to secure their systems effectively.
The key updates to Version 8.1 focus on refining practices related to cloud security, supply chain risk, and the growing need for automated monitoring and response capabilities.
Cloud Security Enhancements
Strengthened Supply Chain Risk Management
Cyber attacks targeting supply chains have become increasingly prevalent, with attackers often using third-party vendors as a backdoor into larger organizations. Version 8.1 enhances the focus on securing the supply chain by advising organizations to verify vendor cybersecurity postures, assess risks related to third-party access, and continuously monitor the security of external partnerships. This approach aligns closely with new emerging best practices, including those seen in the NIST CSF 2.0 framework, which places increased emphasis on the need for cybersecurity across supply chains.
Automated Monitoring and Response
IoT and Device Security
Enhanced Focus on Cybersecurity Governance
Legal Disclaimer:
Cyber JumpStart
CIS Top 18 Controls – What's New with V8.1
Ready to Get Started?
We’re here to help. Reach out to schedule an introductory call with one of our team members and learn more about how Arctic Wolf can benefit your organization.
1-888-272-8429
On-Demand Webinar
