CIS Critical Security Controls

The Sepio Hardware Access Control Platform is aimed to help you implement the CIS Critical Security Controls

cis controls logo

CIS Critical Security Controls

The CIS Critical Security Controls (CIS Controls) were originally developed by the SANS Institute in order to identify crucial real-world cyber-attacks and share valuable information on how to take action.
Today, the Controls are led by the Center for Internet Security (CIS) and are updated by an international community of cybersecurity experts. The Controls reflect the combined knowledge of experts across various sectors, in every role and from every part of the ecosystem.

CIS Implementation Groups

CIS Implementation Groups

The CIS Controls IGs are three self-assessed categories for enterprises. Each IG identifies a subset of the CIS Controls recommended and prioritized for a given type of enterprise with a certain risk profile and available resources for such CIS Controls implementation.
Our HAC-1 solution is well aligned with the CIS Critical Security Control framework and its proposed best practices, making sure it fits industry and government security requirements.

Mapping HAC-1 to CIS Controls

Learn how HAC-1 can help you follow specific safeguards on the various implementation groups in the CIS Critical Security Control framework.

Learn more about Cybersecurity Asset Management

Resource

Managing Hardware Related Risks in Healthcare

The healthcare industry is a vital component of a nation’s critical infrastructure. The various entities that make up the healthcare sector perform tasks ranging from day-to-day activities to life-saving operations. But while the majority of us depend on the industry for our well-being, malicious cyber actors view healthcare delivery organizations (HDOs) as attractive targets. From…

Resource

Understanding Zero Trust Hardware Access: An Introduction to the Sepio Platform

This report explains hardware security for zero trust and illustrates the concept using the Sepio commercial solution.

Resource

Mission Possible – Printer Hacked

Did you think that this only happens in the movies? Think again.

We would love to show you how HAC-1 actually works.

The HAC-1 generates a physical layer fingerprint vector for every connected device, based on multiple L1 parameters, which is then analyzed by our ML-based algorithm resulting in a new visibility level never available before.