Navigating Reasonable Cybersecurity: Insights from the CIS Guide
In an era where cyber threats are omnipresent, defining what constitutes "reasonable cybersecurity" has become a pressing challenge for organizations, regulators, and legal systems alike. The Center for Internet Security's (CIS) "A Guide to Defining Reasonable Cybersecurity" offers a comprehensive framework to address this ambiguity, providing actionable insights into what organizations can do to safeguard data effectively.
The Legal Landscape of Cybersecurity
The United States lacks a unified, cross-sector statutory standard for information security, resulting in a complex patchwork of federal and state laws. While nearly all states mandate breach notification laws, only a few, such as Ohio and Connecticut, have implemented "safe harbor" statutes that incentivize adherence to specific cybersecurity frameworks. These statutes often rely on established guidelines like the CIS Critical Security Controls (CIS Controls), NIST frameworks, and ISO standards to define reasonable cybersecurity practices.
What is Reasonable Cybersecurity?
Reasonable cybersecurity, as described in the guide, involves measures proportional to an organization's size, complexity, and the sensitivity of the data it handles. Factors influencing reasonableness include:
Recommended by LinkedIn
CIS Critical Security Controls: A Pragmatic Framework
The guide highlights the CIS Controls as an emerging global de facto standard for operational cybersecurity. These controls, designed to prioritize practical and prescriptive actions, mitigate approximately 86% of the attack techniques identified in the MITRE ATT&CK framework. The CIS Controls are grouped into six categories:
Safe Harbor Laws and Industry Frameworks
Certain states have pioneered the adoption of safe harbor laws, offering legal protection to organizations that implement best practices. For example, Ohio’s Data Protection Act recognizes compliance with frameworks like NIST, CIS Controls, and PCI DSS as evidence of reasonable cybersecurity. This approach provides a clear roadmap for organizations, reducing ambiguity and potential litigation risks.
Implementation Strategies
Organizations aiming to establish reasonable cybersecurity should focus on: