CIS Critical Security Controls v8

Prioritized set of cybersecurity best practices. Three implementation groups mapped to organization size. Widely used as a practical baseline independent of regulatory requirement.

All organizations, security teams, SMBs

10

control domains mapped

10

Nitrokey products applicable

6

other frameworks cross-mapped

Official doc

CIS Critical Security Controls v8

CIS-6.3 Require MFA for externally-exposed applications

Phishing-resistant MFA using hardware security keys. Software TOTP and SMS are explicitly excluded from "phishing-resistant" in NIST 800-63B and most modern framework guidance.

CIS-3.11 Encrypt sensitive data at rest

Hardware-bound key generation and storage. Private keys generated and stored inside a certified secure element (EAL 6+) and are non-exportable by design.

CIS-4.4 Use unique passwords and MFA for all admin access

Hardened mobile OS with per-app sensor controls, verified boot, and no background telemetry. Satisfies mobile device management and bring-your-own-device security requirements.

CIS-2.3 Address unauthorized software

Measured boot chain verified on every power-on. Any firmware modification — supply chain implant, evil-maid attack, or malicious update — fails attestation before the OS loads.

CIS-12.2 Establish and maintain a secure network architecture

VM-level compartmentalization means a compromise of one domain (e.g. browser) cannot reach another (e.g. keys, vault). No other consumer laptop provides this by default.

CIS-12.3 Securely manage network infrastructure

Stateful firewall with IPS at the network perimeter. All inbound/outbound traffic inspected with Suricata rule sets. VPN gateway replaces consumer VPN dependency.

Products that satisfy this control:

CIS-3.11 Encrypt sensitive data at rest

Hardware-encrypted storage and self-hosted file servers replace cloud storage with hardware you control. Encryption keys never leave your environment.

CIS-15.1 Establish and maintain an inventory of service providers

Open-source firmware is publicly auditable and reproducibly built. EU jurisdiction hardware is not subject to US National Security Letters. Directly addresses hardware supply chain risk in CMMC and NIS2.

CIS-11.5 Manage access control for remote assets

Rated safes and vaults protect physical assets, documents, and hardware backups. UL-certified fire and burglary ratings provide auditable physical security controls.

Products that satisfy this control:

CIS-3.10 Encrypt sensitive data in transit

Verified boot ensures the TLS stack is unmodified before communication. VPN gateway encrypts all remote access traffic. Hardware-backed keys prevent interception even if endpoints are observed.