CIS Control

The CIS Control (aka Critical Security Control) object describes a prioritized set of actions to protect your organization and data from cyber-attack vectors. The CIS Controls are defined by the Center for Internet Security.

Attributes

CaptionNameTypeDescription
Description desc String The CIS Control description. For example: Uninstall or disable unnecessary services on enterprise assets and software, such as an unused file sharing service, web application module, or service function.
Name name String The CIS Control name. For example: 4.8 Uninstall or Disable Unnecessary Services on Enterprise Assets and Software.
Raw Data raw_data JSON The event data as received from the event source.
Record ID record_id String Unique identifier for the object
Unmapped Data unmapped Unmapped[] The attributes that are not mapped to the event schema. The names and values of those attributes are specific to the event source.
Version version String The CIS Control version. For example: v8.

Relationships

CIS Control shown in context

Inbound Relationships

These objects and events reference CIS Control in their attributes:

Outbound Relationships

CIS Control references the following objects and events in its attributes:

This page describes qdm-1.3.2+ocsf-1.3.0