Go back to All Blog posts

CIS Control 15 Explained: Service Provider Management

Ohad Shushan
October 20th, 2022

CIS Control 15 involves service provider management. That means to establish a process to evaluate service providers who hold sensitive data or are responsible for critical IT operations and ensure that they are protecting the availability, confidentiality and integrity of your organization’s information appropriately.

The Importance of Control 15

Many businesses today rely on third-party service providers for essential functions, such as data processing, operations and cybersecurity management. Breaches at these providers can lead to significant consequences for enterprises. Such incidents can disrupt operations and, in some cases, allow attackers to compromise data on a business’s systems by exploiting access through these providers. Therefore, managing third-party risks is critical to maintaining a secure business environment.

Implementation Groups (IGs)

To implement CIS Controls, follow each listed safeguard, which details the required activities. Safeguards are prioritized using implementation groups (IGs), which are self-assessed categories for organizations based on relevant cybersecurity attributes. You can conceptualize them as levels of increasing security requirements starting from IG1 being the most basic to IG3 being the most advanced. The higher level groups are included in the lower ones.

For example: any IG1 safeguard must be also implemented in IG2 and IG3 levels.

The Safeguards of Control 15

There are seven safeguards in CIS Control 15. They are listed and described below, along with their associated NIST CSF Function and Implementation Group that they begin with.

Safeguard NumberSafeguard TitleNIST Security FunctionStartingImplementation Group
Safeguard 15.1Establish and Maintain an Inventory of Service ProvidersIdentifyIG1
Safeguard 15.2Establish and Maintain a Service Provider Management PolicyGovernIG2
Safeguard 15.3Classify Service ProvidersGovernIG2
Safeguard 15.4Ensure Service Provider Contracts Include Security RequirementsGovernIG2
Safeguard 15.5Assess Service ProvidersGovernIG3
Safeguard 15.6Monitor Service ProvidersGovernIG3
Safeguard 15.7Securely Decommission Service ProvidersProtectIG3

REQUEST A THREAT EXPOSURE REPORT TODAY

Discover the full extent of your online exposure so you can protect it.