top of page

Your security tools are working against an incomplete picture of your environment.

CIS Controls v8 covers 18 controls and 153 safeguards. 12 of those controls depend directly on the quality of your asset data. If that data is incomplete, the tools built on top of it produce incomplete results. We build the foundation that changes that.

DOES THIS SOUND FAMILIAR?

Four situations. One root cause.

CIS Controls problems show up in different ways depending on where the organisation is in its security programme. The situation is different every time. The cause is almost always the same.

THE SCOPE MOST ORGANISATIONS MISS

It's not just Controls 1 and 2.

Controls 1 and 2 are where ITAM starts in the CIS framework. They're not where it ends. The asset data those controls produce feeds into 10 more controls across every layer of the framework. In other words, the organisation's ITAM foundation isn't just a security housekeeping task. It's the input that determines whether most of the framework works at all.

The most common pattern: the organisation has invested in vulnerability scanning, malware defenses, and patch management. Those tools produce results. But the results have predictable gaps, because the tools are running against a CMDB that covers 60 to 80 percent of the environment. The remaining 20 to 40 percent is where the unpatched assets and unmanaged devices live.

IMPLEMENTATION GROUPS

It's not just Controls 1 and 2.

CIS Controls v8 organises its 153 safeguards into three Implementation Groups. Most organisations that believe they are at IG1 have asset data that doesn't meet IG1 requirements. They have started from the middle of the framework without building the foundation underneath it.

THE MATURITY GAP

Five levels. Most organisations are sitting at level 2.

The CIS Controls framework uses a five-level maturity scale for each safeguard. IG1 requires maturity level 3. IG2 requires level 4. Most organisations that come to Chloris are at level 2. They have some activity, but it's manual, inconsistent, and incomplete. The question below each level is taken directly from the assessment tool used at the start of every Chloris engagement.

WHERE ITAM DRIVES EACH CONTROL

What breaks when the asset data is incomplete.

The table below maps the key controls to the specific ITAM dependency and names the business consequence when that dependency isn't met. This is not a reference list. It's the mechanism that explains why the organisation's security programme is underperforming.

COMMON QUESTIONS

What we hear when organisations get in touch.

The questions below are the ones that come up in the first conversation, almost every time.

Let's Connect

Feel free to contact us and get to know us.

Address

A.P. Møllers Allé 55

DK-2791 Dragør

Denmark

Email

Phone

+45 60 15 01 70

© 2025 by Chloris Group

Contact Us

Thank you We'll be in touch

bottom of page