CIS Controls v8
Prioritized set of actions to protect organizations from known cyber attack vectors.
Quick Facts
- Documents Included
- 14
- Category
- Information Security
- Regions
- Saudi Arabia / GCC European Union / UK United States
- Compliance Domains
- 5 domains
What's Included
SeedGovernance provides 14 ready-to-use templates for CIS Controls, covering 5 compliance domains. Each document is pre-filled with framework-specific guidance so you can start immediately.
Asset Management
Policies, processes, and evidence templates
Data Protection
Policies, processes, and evidence templates
Access Control
Policies, processes, and evidence templates
Vulnerability Management
Policies, processes, and evidence templates
Audit Logging
Policies, processes, and evidence templates
How SeedGovernance Helps with CIS Controls
Beyond templates, our platform guides you through every step of CIS Controls compliance.
Assessment Wizard
Answer guided questions to assess your CIS Controls readiness and identify gaps.
Gap Analysis
Automatically surface what's missing from your CIS Controls compliance programme.
Document Library
14 pre-built templates tailored to CIS Controls requirements.
Operations Modules
Track incidents, changes, risks, and vendors — all mapped to CIS Controls controls.
KPI Dashboard
Monitor your CIS Controls compliance score in real time with automated metrics.
Auditor Access
Share a read-only view of your CIS Controls compliance status with auditors.
Related Frameworks in Information Security
Organizations using CIS Controls often also need these frameworks.
Cybersecurity
45 documents
NIST CSF for managing cybersecurity risk through Identify, Protect, Detect, Respond, and Recover functions.
ISO 27001
18 documents
International standard for establishing, implementing, and maintaining an information security management system (ISMS).
NCA ECC
16 documents
Saudi Arabia's National Cybersecurity Authority essential controls for critical infrastructure protection.
PCI DSS
14 documents
Payment Card Industry Data Security Standard for organizations handling cardholder data.
CMMC
14 documents
Cybersecurity Maturity Model Certification for the US defense industrial base supply chain.
SOC 2
14 documents
AICPA framework for managing customer data based on trust service criteria: security, availability, processing integrity, confidentiality, privacy.
Start your free trial with CIS Controls
Get instant access to 14 CIS Controls templates, guided assessments, and a complete compliance management platform. No credit card required.
14-day free trial · No credit card required · Cancel anytime