CIS Controls v8 IG1 in 90 days for a 50-person company
You'll learn
- The 56 IG1 safeguards grouped into 12 weekly work packages.
- Which safeguards need your MSP, which need HR, and which need you.
- The evidence trail that turns a finished IG1 into an underwriter-ready attestation.
Cyber insurance underwriters moved the bar in 2024-2026. "We have antivirus" no longer reads as a control posture. The Center for Internet Security\u2019s Controls v8, Implementation Group 1 (56 safeguards across 18 controls) has become the de facto SMB baseline β underwriters reference it in questionnaires, SOC 2 auditors accept it as technical evidence, and NIST CSF subcategories map to it cleanly.
The good news: IG1 is intentionally scoped for SMBs with limited resources. No one expects you to run a purple-team exercise. But 56 items is still 56 items. Most 50-person companies start at 30-40% coverage (they have the easy ones β asset inventory, antivirus, some MFA) and without a plan stall there for a year.
This is the 90-day plan we\u2019ve run with four clients in the last 18 months. It assumes a cooperative MSP and a weekly working session with a named internal sponsor. If your environment is especially complex (multi-tenant M365, hybrid infrastructure, 10+ lines of business apps), stretch weeks to 8-10 days each β don\u2019t compress.
The 18 CIS Controls grouped by theme:
- Asset + configuration (Controls 1-4): know what you have, know what\u2019s on it.
- Access + data (Controls 5-7, 13): who can reach what, with what authentication.
- Defense + monitoring (Controls 8-10, 13-14): detecting when something\u2019s wrong.
- Response + operations (Controls 11, 17): being ready for incidents.
- Training + supply chain (Controls 14, 15): people and vendors.
Weeks 1-2: Asset inventory (Controls 1, 2, 5)
If you don\u2019t know what you have, you can\u2019t secure it. First two weeks are documentation-heavy.
- Endpoint inventory (1.1, 1.2). Full list of laptops + desktops, who\u2019s assigned to them, operating system, last patch date. Typically pulled from your RMM (NinjaOne, Intune, JAMF).
- Software inventory (2.1, 2.2). Catalog of approved software + process to detect unapproved. M365 Defender or comparable EDR usually produces this as a byproduct.
- User inventory (5.1, 5.2). All user accounts across M365, Google Workspace, all major SaaS tools. Critical: shared/orphaned accounts identified and remediated.
Evidence artifacts: exported inventories dated week 2.
Weeks 3-4: Secure configuration + patching (Controls 3, 4, 7)
- Secure endpoint configuration (4.1-4.6). Baseline policies via Intune / JAMF: disable legacy protocols, enforce encryption, configure browser hardening.
- Patch management (7.1, 7.3, 7.4). 14-day SLA for critical patches + 30-day SLA for high/medium. Evidence: patching reports from your RMM.
- Data classification + protection (3.1-3.6). Identify where sensitive data lives (PHI, PII, financial). Tag it in DLP policies. If you handle healthcare, see Vol 5.
Evidence artifacts: configuration baseline documents, patch compliance report, data classification spreadsheet.
Weeks 5-6: Access control + MFA (Controls 5, 6)
If you\u2019ve already run Vol 1 this is a quick block of work.
- MFA on all user accounts (6.3, 6.4, 6.5). No exceptions beyond break-glass. See Vol 1 for the Conditional Access structure.
- Role-based access (6.8). Users have the permissions they need, nothing more. The M365 admin-role review is the painful one; usually finds 2-5 over-permissioned accounts per 50-person tenant.
- Privileged account management (5.4, 6.2). Separate admin accounts for admin work. Naming convention like "tjones-admin@tenant".
- Account lifecycle (5.3, 5.5, 5.6). Documented onboarding + offboarding checklists. Access revoked within 24 hours of termination.
Evidence artifacts: MFA coverage report (target 100%), admin-role audit, onboarding/offboarding checklists.
Weeks 7-8: Malware + data protection (Controls 10, 11, 13)
- EDR deployed everywhere (10.1-10.7). Managed EDR (SentinelOne, Defender for Business, Sophos). Policy tuned, alerts going somewhere a human will see them.
- Data recovery capability (11.1-11.5). Backups configured, tested, immutable. See Vol 3.
- Data loss prevention (13.1-13.6). Basic DLP policies (M365 DLP or similar) to flag PHI/PII in email + cloud storage.
Evidence artifacts: EDR coverage report, quarterly restore-test log, DLP policy configuration export.
Weeks 9-10: Network + log monitoring (Controls 8, 9, 12, 13)
- Audit log management (8.1-8.12). Logs collected from endpoints, cloud services, firewall. Retained 90+ days. Reviewed weekly (minimum).
- Network monitoring (12.1-12.3, 13.1). Firewall logs + DNS logs + VPN logs into your SIEM (or MSSP equivalent). Alerting on known-bad indicators.
- Email + web defenses (9.1-9.7). M365 Defender or equivalent email security, DNS filtering (Cisco Umbrella, DNS Defender), browser isolation for high-risk roles.
Evidence artifacts: log retention configuration, weekly log review log, firewall rule audit.
Weeks 11-12: Response, training, documentation (Controls 14, 15, 17)
- Security awareness training (14.1-14.6). Annual baseline training + monthly phishing simulations. KnowBe4, Hoxhunt, or equivalent. Measure click-through rates.
- Service provider management (15.1-15.7). Vendor inventory with security attestation for each (SOC 2 report, BAA, etc.). See also Vol 2.
- Incident response plan (17.1-17.9). Written IR plan, named roles, escalation path, annual tabletop exercise.
Evidence artifacts: training completion report, vendor security inventory, written IR plan, tabletop exercise log.
The shortest path assumes M365 Business Premium + one of each:
- RMM: NinjaOne / Kaseya / Datto RMM / Intune β endpoint + software inventory, patching.
- EDR: Defender for Business (bundled with Business Premium) OR SentinelOne / CrowdStrike for higher-touch environments.
- SIEM / log aggregation: Sentinel (native M365) OR a small Datadog / Splunk deployment.
- M365 backup: see Vol 3.
- Email security: M365 Defender (bundled) OR Proofpoint / Abnormal / Mimecast.
- DNS filter: DNS Defender / Cisco Umbrella / Cloudflare Gateway.
- Training + phishing: KnowBe4 / Hoxhunt / Proofpoint Security Awareness.
- Vendor-risk tracking: spreadsheet is fine at 50-person scale; Vanta / Drata if you\u2019re also pursuing SOC 2.
Realistic tool budget for a 50-person firm: $30-45k/year all-in (assumes M365 Business Premium is already budgeted separately). This drops significantly if you\u2019re on a managed-IT engagement where the MSP absorbs some into their fee.
- Monday: 30-min sync between internal sponsor + MSP engineer. Review last week, confirm this week\u2019s safeguards.
- Mid-week: engineering work. Most safeguards are configuration changes + documentation, not build projects.
- Friday: evidence collection. Screenshots, reports, policy docs filed in a shared folder.
At 12 weeks with a competent MSP, IG1 coverage typically moves from 35% β 95%+ with ~6-8 findings for the next quarter.
-
Skipping the inventory weeks. Everyone wants to start with the interesting controls (MFA, EDR). Without the inventory, you can\u2019t evidence the interesting ones. Two weeks of inventory saves two months of audit pain.
-
Training-as-checkbox. An annual "watch a 20-minute video" doesn\u2019t move phishing click-through. Monthly simulations + role-based content do. Budget accordingly.
-
IR plan that\u2019s never rehearsed. A plan nobody has seen in action is a document, not a capability. Annual tabletop exercise β minimum. Quarterly if you have real regulatory exposure.
-
Over-buying tools. IG1 doesn\u2019t require a $80k SIEM deployment. M365 Defender + one good EDR + M365 audit logs covers most of it. Add complexity only when IG2 or a specific compliance framework demands it.
-
Declaring victory too early. IG1 coverage at 95% is a starting point, not a finish. Annual re-assessment is the discipline that keeps it real.
IG1 in 90 days is a common engagement for us. We\u2019ve run the playbook across services firms, dental groups, fintechs, and manufacturing clients β the week-by-week structure holds with minor vertical adjustments. The free IT health check includes a starting IG1 coverage assessment so you know where you\u2019re starting from.
- Volume 1 β MFA rollout. The core of Controls 5 and 6.
- Volume 2 β SOC 2 Type II cost breakdown. Most SOC 2 clients use IG1 as the underlying technical control set.
- Volume 5 β HIPAA + PHIPA for Ontario clinics. Healthcare-specific overlay on IG1.
- Managed Cybersecurity β how we operate this as a monthly service.