What it is
A prescriptive, prioritized set of security practices that turns broad security goals into an ordered, implementable backlog.
Key points
- 18 Controls with 153 Safeguards in version 8.1, designed as a practical defensive baseline.
- Implementation Groups IG1 to IG3 help sequence work based on risk, resources, and operational complexity.
- Strong focus on asset inventory, secure configuration, vulnerability management, identity, logging, and recovery.
- Mapped to other frameworks, making it easier to translate between strategy and technical work.
Concrete example
A small organization starts with IG1: asset inventory, secure configuration standards, MFA for admin access, patching cadence, central logging, and tested backups. Once stable, it expands to deeper monitoring and hardening in IG2.