controls/frameworks/cis-controls-v8.json

{"frameworkId":"cis-controls-v8","label":"CIS Controls v8.1","version":"8.1","css":"fw-cis-ctrl","totalControls":153,"registryKey":"cis-controls-v8","csvColumn":"CisControlsV8","displayOrder":12,"scoring":{"method":"profile-compliance","profiles":{"IG1":{"label":"Implementation Group 1","css":"fw-cis-ctrl","profileKey":"IG1","controlCount":56},"IG2":{"label":"Implementation Group 2","css":"fw-cis-ctrl","profileKey":"IG2","controlCount":130},"IG3":{"label":"Implementation Group 3","css":"fw-cis-ctrl-ig3","profileKey":"IG3","controlCount":153}}},"colors":{"light":{"background":"#dbeafe","color":"#1e40af"},"dark":{"background":"#1E3A5F","color":"#60A5FA"}},"controls":{"1":"Inventory and Control of Enterprise Assets","2":"Inventory and Control of Software Assets","3":"Data Protection","4":"Secure Configuration of Enterprise Assets and Software","5":"Account Management","6":"Access Control Management","7":"Continuous Vulnerability Management","8":"Audit Log Management","9":"Email and Web Browser Protections","10":"Malware Defenses","11":"Data Recovery","12":"Network Infrastructure Management","13":"Network Monitoring and Defense","14":"Security Awareness and Skills Training","15":"Service Provider Management","16":"Application Software Security","17":"Incident Response Management","18":"Penetration Testing"}}