CIS Critical Controls Compliance Assessment Services

Measure your organisation's compliance with CIS Critical Controls.

Trusted Cyber Security Controls

CIS Critical Controls is an internationally recognised set of prioritized actions to protect your organization and data from known cyber attack vectors.

...

Value highlights

Why this service matters.

Measure

Identify gaps in between your current security operations and CIS Critical Controls.

Align

Align your organisation's operations to an internationally respected framework.

Manage

Keep your security operations in check and robust to protect against cyber attacks.

Areas covered

Below are the areas covered by our assessment.

01. Inventory and Control of Hardware Assets

02. Inventory and Control of Software Assets

03. Continuous Vulnerability Management

04. Controlled Use of Administrative Privileges

05. Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers

06. Maintenance, Monitoring and Analysis of Audit Logs

07. Email and Web Browser Protections

08. Malware Defenses

09. Limitation and Control of Network Ports, Protocols, and Services

10. Data Recovery Capabilities

11. Secure Configuration for Network Devices, such as Firewalls, Routers and Switches

12. Boundary Defense

13. Data Protection

14 Controlled Access Based on the Need to Know

15. Wireless Access Control

16. Account Monitoring and Control

17. Implement a Security Awareness and Training Program

18. Application Software Security

19. Incident Response and Management

20. Penetration Tests and Red Team Exercises

Key benefits

Here's why this service will benefit your business operations.

Unlimited users. One price.

We don't charge per seat, just per service.

Guaranteed 100% uptime

Our server network never goes down.

Lifetime storage *

We store all your data forever. No extra charge.

256-bit encryption

Keep your communication and data safe.

Unlimited users. One price.

We don't charge per seat, just per service.

Guaranteed 100% uptime

Our server network never goes down.

Lifetime storage *

We store all your data forever. No extra charge.

256-bit encryption

Keep your communication and data safe.

Related Help Center Article(s)

If you don't find the answers you need, please contact us so we can help!

Getting started as a client

An intoductory guide to engaging us.

Click here

Case studies

Feedback from people like you, who have interacted with us.

Web Vulnerability Scan

Learn how we supported a client to identify security vulnerabilities in their web application.

Read more

Web Application Security Assessment

Learn how we supported a client to assess the functions of their web application.

Read more

Dark Web Scanning

Learn how we supported a client to identify compromised accounts on the dark web.

Read more

Penetration Test

Learn how we supported a client to simulate real-world cyber attacks against their network.

Read more

ISO 27001 Readiness Assessment

Learn how we supported our client to comply with ISO 27001.

Read more

GDPR Readiness Assessment

Learn how we supported our client to comply with GDPR.

Read more

Bug Bounty

Learn how we supported our client with a Bug Bounty Program.

Read more

Testimonials

Feedback from people like you, who have interacted with us.

"Unique service – G5 Cyber Security not only offers wonderful, intelligent and meaningful service, but their service is also exemplary. They guide you through making the service work for you, for both corporate and personal clients. Great company, great leader."

Soshana Shirley,
Risk & Compliance Officer, Jamaica.

"The Workshop was great, Very informative and to watch videos and then get some additional reading resources that you can revisit online whenever you need to reference cyber-security related news best practices. Definitely a good start - can't wait to finish the rest of the specialization courses."

Be first, not last, subscribe.

Get updates on news, giveaways, and updates, straight to your inbox weekly.

Subscribe

Seemless pricing.
Send us a message to get started.

Drop us a message below, we'll respond and set up a meeting to get you up and running. Even if you're not quite sure as yet what you might need.

Global remote support.

Protect against hacks.

Meet compliance requirements.

Dedicated support.

...
...

Request a proposal/quote.

Start seeing results in 24 hours.