{"id":105524,"date":"2025-03-12T12:33:18","date_gmt":"2025-03-12T04:33:18","guid":{"rendered":"https:\/\/version-2.com\/?p=105524"},"modified":"2025-03-12T12:42:01","modified_gmt":"2025-03-12T04:42:01","slug":"cis-critical-security-control-3-v8-improving-organizations-data-protection-strategy","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2025\/03\/cis-critical-security-control-3-v8-improving-organizations-data-protection-strategy\/","title":{"rendered":"CIS Critical Security Control 3 v8: Improving organizations data protection strategy"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"105524\" class=\"elementor elementor-105524\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/www.sealpath.com\/wp-content\/webp-express\/webp-images\/uploads\/2022\/12\/sealpath-cis-controls-title-980x579.png.webp\" width=\"980\" height=\"579\" \/><\/p><div class=\"entry-content\"><blockquote><p><em>Know in depth the CIS Security Control 3 v8, a set of security safeguards to help organizations on <strong>data protection<\/strong>, the new changes compared to v7, all the safeguards and how to <strong>implement CIS Control 3 effectively<\/strong>.<\/em><\/p><\/blockquote><h2 id=\"id_1\" style=\"color: #0086d9;\"><strong>A brief background about data breaches<\/strong><\/h2><p>IBM and the Ponemon institute released a <a href=\"https:\/\/www.ibm.com\/es-es\/security\/data-breach\" target=\"_blank\" rel=\"noopener\">report on the cost of a data breach<\/a> in 2022, surveying 550 breaches with data gathered from over 3,600 interviews across 17 countries, and the result was mind-blowing. The results show that the average data breach cost US$4.35 million in 2022, indicating that the figures have further risen from the $4.24 million recorded in 2021.<\/p><p>Every year, IBM statistics for the cost of data breaches indicates that the figures keep rising by at least 2.6 per cent, and numbers are expected to shoot up in the coming years.<br \/>However, in the US, the figures and drastically different, as the average cost of a data breach was found to be $9.44M, more than double the global average. <a href=\"https:\/\/www.sealpath.com\/blog\/how-to-quantify-the-cost-of-a-data-breach-a-case-study\/\" target=\"_blank\" rel=\"noopener\">Know how is the Data Breach loss cost estimate obtained?<\/a><\/p><p>The IBM report also showed the causes of most breaches, with stolen or compromised credentials accounting for 19% of breaches, phishing being responsible for 16%, and Cloud misconfiguration causing 15% of breaches.<\/p><p>It\u2019s essential for organizations to deploy a robust data protection strategy to reduce the possibility of a data breach or data leakage, which often leads to financial loss. The CIS Controls is a collection of the best data and computer security practices to mitigate attacks on cyber systems and networks.<\/p><h2 id=\"id_2\" style=\"color: #0086d9;\"><strong>CIS Security Controls v8, Data Protection<\/strong><\/h2><p>The <a href=\"https:\/\/www.cisecurity.org\/controls\" target=\"_blank\" rel=\"noopener\">CIS Critical Security Controls<\/a> (CIS Controls) is a set of security Safeguards to help organizations mitigate the most prevalent cyber-attacks against computer systems and networks. These Controls are improved from time to time to address constantly evolving cyber threats and keep up with modern systems and technologies.<\/p><p><picture><source srcset=\"https:\/\/www.sealpath.com\/wp-content\/webp-express\/webp-images\/uploads\/2022\/12\/cis-controls-list.png.webp 800w, https:\/\/www.sealpath.com\/wp-content\/webp-express\/webp-images\/uploads\/2022\/12\/cis-controls-list-480x370.png.webp 480w\" type=\"image\/webp\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw\" \/><img decoding=\"async\" class=\"aligncenter size-full wp-image-20102 webpexpress-processed lazyloaded\" src=\"https:\/\/www.sealpath.com\/wp-content\/uploads\/2022\/12\/cis-controls-list.png\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw\" srcset=\"https:\/\/www.sealpath.com\/wp-content\/uploads\/2022\/12\/cis-controls-list.png 800w, https:\/\/www.sealpath.com\/wp-content\/uploads\/2022\/12\/cis-controls-list-480x370.png 480w\" alt=\"\" width=\"800\" height=\"617\" data-ll-status=\"loaded\" \/><\/picture><noscript><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter size-full wp-image-20102 webpexpress-processed\" src=\"https:\/\/www.sealpath.com\/wp-content\/uploads\/2022\/12\/cis-controls-list.png\" alt=\"\" width=\"800\" height=\"617\" srcset=\"https:\/\/www.sealpath.com\/wp-content\/uploads\/2022\/12\/cis-controls-list.png 800w, https:\/\/www.sealpath.com\/wp-content\/uploads\/2022\/12\/cis-controls-list-480x370.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw\"><\/noscript><\/p><p>More specifically, CIS Control 3 focuses on ensuring data protection both in storage and when transmitted through data management for mobile devices and computers. The Controls map out processes and techniques to identify, classify, safely handle, retain, and dispose of data in a way that minimizes the risks of a data breach.<\/p><p>It\u2019s no news that an organization\u2019s data is no longer restricted to its borders. Some data are now stored in the cloud, shared with partners, transferred over portable end-user devices, and so on. This diverse handling of data opens it to more risks of attack, making data protection a great concern for organizations.<\/p><p>Although <a href=\"https:\/\/www.sealpath.com\/blog\/data-encryption-for-enterprises\/\" target=\"_blank\" rel=\"noopener\">encryption offers a lot of protection to data<\/a>, it doesn\u2019t offer much help in the face of malicious actors with deep-rooted knowledge of bypassing encrypted data. As a result, organizations need to incorporate a holistic data protection strategy outlined by CIS Control 3 to strengthen their security and mitigate cyber-attacks.<\/p><h2 id=\"id_3\" style=\"color: #0086d9;\"><strong>Changes compared to v7 where Data Protection is now the Control 3<\/strong><\/h2><p>CIS Control 3v8 is a comprehensive revision of the 3v7 and contains safeguard updates to improve data security and reduce the risks of a breach. Some of the changes include:<\/p><p>\u2013 the addition of Service Provider Management Control: a new control that tackles the sensitivity of data in SaaS platforms, including their storage and processing.<\/p><p>\u2013 moving Data Protection from the number 13 spot to number 3 and adding five new Safeguards to this Control. These five new Safeguards are focused on managing and identifying data in a more secure approach to minimize vulnerabilities.<\/p><p>Other changes involved Controls, such as Controls 4,5,6,14, and so on.<\/p><p><picture><source srcset=\"https:\/\/www.sealpath.com\/wp-content\/webp-express\/webp-images\/uploads\/2022\/12\/cis-controls-v7-v8.png.webp 800w, https:\/\/www.sealpath.com\/wp-content\/webp-express\/webp-images\/uploads\/2022\/12\/cis-controls-v7-v8-480x407.png.webp 480w\" type=\"image\/webp\" sizes=\"auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw\" \/><img class=\"aligncenter size-full wp-image-20108 webpexpress-processed\" alt=\"\" width=\"800\" height=\"679\" data-lazy-srcset=\"https:\/\/www.sealpath.com\/wp-content\/uploads\/2022\/12\/cis-controls-v7-v8.png 800w, https:\/\/www.sealpath.com\/wp-content\/uploads\/2022\/12\/cis-controls-v7-v8-480x407.png 480w\" data-lazy-sizes=\"auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw\" data-lazy-src=\"https:\/\/www.sealpath.com\/wp-content\/uploads\/2022\/12\/cis-controls-v7-v8.png\" \/><\/picture><noscript><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-20108 webpexpress-processed\" src=\"https:\/\/www.sealpath.com\/wp-content\/uploads\/2022\/12\/cis-controls-v7-v8.png\" alt=\"\" width=\"800\" height=\"679\" srcset=\"https:\/\/www.sealpath.com\/wp-content\/uploads\/2022\/12\/cis-controls-v7-v8.png 800w, https:\/\/www.sealpath.com\/wp-content\/uploads\/2022\/12\/cis-controls-v7-v8-480x407.png 480w\" sizes=\"auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw\"><\/noscript><\/p><h2 id=\"id_4\" style=\"color: #0086d9;\"><strong>What data protection safeguards does CIS Control 3 include?<\/strong><\/h2><p>Below are the safeguards of CIS Control 3<\/p><p><picture><source srcset=\"https:\/\/www.sealpath.com\/wp-content\/webp-express\/webp-images\/uploads\/2022\/12\/cis-control-3-data-protection.png.webp 377w, https:\/\/www.sealpath.com\/wp-content\/webp-express\/webp-images\/uploads\/2022\/12\/cis-control-3-data-protection-300x107.png.webp 300w\" type=\"image\/webp\" sizes=\"auto, (max-width: 377px) 100vw, 377px\" \/><img loading=\"lazy\" data-attachment-id=\"20114\" data-permalink=\"https:\/\/version-2.com\/en\/home\/v2esetbanner\/\" data-orig-file=\"https:\/\/version-2.com\/wp-content\/uploads\/2020\/10\/V2ESETbanner.jpg\" data-orig-size=\"275,96\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"V2ESETbanner\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/version-2.com\/wp-content\/uploads\/2020\/10\/V2ESETbanner.jpg\" class=\"alignleft size-full wp-image-20114 webpexpress-processed\" alt=\"\" width=\"377\" height=\"134\" data-lazy-srcset=\"https:\/\/www.sealpath.com\/wp-content\/uploads\/2022\/12\/cis-control-3-data-protection.png 377w, https:\/\/www.sealpath.com\/wp-content\/uploads\/2022\/12\/cis-control-3-data-protection-300x107.png 300w\" data-lazy-sizes=\"auto, (max-width: 377px) 100vw, 377px\" data-lazy-src=\"https:\/\/www.sealpath.com\/wp-content\/uploads\/2022\/12\/cis-control-3-data-protection.png\" \/><\/picture><noscript><img loading=\"lazy\" data-attachment-id=\"20114\" data-permalink=\"https:\/\/version-2.com\/en\/home\/v2esetbanner\/\" data-orig-file=\"https:\/\/version-2.com\/wp-content\/uploads\/2020\/10\/V2ESETbanner.jpg\" data-orig-size=\"275,96\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"V2ESETbanner\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/version-2.com\/wp-content\/uploads\/2020\/10\/V2ESETbanner.jpg\" decoding=\"async\" class=\"alignleft size-full wp-image-20114 webpexpress-processed\" src=\"https:\/\/www.sealpath.com\/wp-content\/uploads\/2022\/12\/cis-control-3-data-protection.png\" alt=\"\" width=\"377\" height=\"134\" srcset=\"https:\/\/www.sealpath.com\/wp-content\/uploads\/2022\/12\/cis-control-3-data-protection.png 377w, https:\/\/www.sealpath.com\/wp-content\/uploads\/2022\/12\/cis-control-3-data-protection-300x107.png 300w\" sizes=\"auto, (max-width: 377px) 100vw, 377px\"><\/noscript><\/p><h3 style=\"color: #0086d9;\"><strong>3.1: Establish and Maintain a Data Management Process<\/strong><\/h3><p>Organizations should put in place an effective data management process that handles data sensitivity, ownership, storage, retention, backup, and disposal. The data management process should align with the regulations of your specific organization and be reviewed annually or wherever there\u2019s a major policy change.<\/p><h3 style=\"color: #0086d9;\"><strong>3.2: Establish and Maintain a Data Inventory<\/strong><\/h3><p>Your inventory outlines the type of data your organization produces, the degree of sensitivity, and how they\u2019re retained and consumed. Typically, your inventory should reflect both structured data (e.g., data stored in databases) and unstructured data (e.g., documents and photos) to ensure a comprehensive data protection policy.<\/p><h3 style=\"color: #0086d9;\"><strong>3.3: Configure Data Access Control Lists<\/strong><\/h3><p>Restricting each user\u2019s access is a crucial part of data security, and each user should only have access to the data, applications, and systems on the organization\u2019s network that they require to do their job. Having access to other than what they need (especially sensitive data) increases the risk of a data breach and security compromise, either deliberately or accidentally.<\/p><p>Regular review of access control lists should be done to detect and swiftly remove any unauthorized permissions that a user has, such as when they move to a new department, branch, or role.<\/p><h3 style=\"color: #0086d9;\"><strong>3.4: Enforce Data Retention<\/strong><\/h3><p>Data should have minimum and maximum timeframes to control the extent to which different types of data should be retained. To ensure full compliance, you should consider automating the data retention process so that certain types of data do not stay beyond their expiry period due to forgetfulness.<\/p><h3 style=\"color: #0086d9;\"><strong>3.5: Securely Dispose of Data<\/strong><\/h3><p>Whether you need to dispose of data because it\u2019s old and irrelevant or due to standard regulations, ensuring secure disposal is crucial to preventing unauthorized access to the data. You should dispose of data according to their sensitivity, making sure that sensitive data are entirely eliminated in a way that no user can access.<\/p><h3 style=\"color: #0086d9;\"><strong>3.6: Encrypt Data on End-User Devices<\/strong><\/h3><p>In certain scenarios, company devices get compromised by internal or external threats. Encrypting data on end-user devices helps prevent data misuse when such scenarios arise, adding an extra layer of security to your organization. Typical examples of encryption tools are Windows BitLocker, Linux dm-crypt, and Apple FileVault.<\/p><h3 style=\"color: #0086d9;\"><strong>3.7: Establish and Maintain a Data Classification Scheme<\/strong><\/h3><p>Not all the data in your organization are on the same level. Some are sensitive, while others aren\u2019t. Establishing and maintaining a data classification scheme helps you to distinguish sensitive data from non-sensitive data, so you can provide more protection for sensitive ones. Even non-sensitive data can also be further classified as private or public to enhance data protection.<\/p><p>Organizations should review their data classification scheme annually or whenever there\u2019s a significant policy change.<\/p><h3 style=\"color: #0086d9;\"><strong>3.8: Document Data Flows<\/strong><\/h3><p>Organizations should keep tabs on the movement and flow of data in and out of the enterprise in order for timely detection of vulnerabilities that could weaken their cybersecurity. You should review documentation annually and apply necessary updates whenever a significant change that could potentially impact this safeguard occurs.<\/p><h3 style=\"color: #0086d9;\"><strong>3.9: Encrypt Data on Removable Media<\/strong><\/h3><p>Organizations should prepare for scenarios of device theft by encrypting the data on external hard drives, flash drives, and other removable media. These devices may also be misplaced and eventually land in the wrong hands, but with encryption, you can rest assured that the data will not be misused or exploited.<\/p><h3 style=\"color: #0086d9;\"><strong>3.10: Encrypt Sensitive Data in Transit<\/strong><\/h3><p>Organizations should encrypt critical data in transit to ensure optimal protection wherever the data goes. Popular encryption options for companies are Open Secure Shell (OpenSSH) and Transport Layer Security (TLS). All encryptions must also be adequately authenticated. For example, OpenSSH validates host keys and investigates any connection warnings, while TLS uses valid DNS identifiers with certificates signed by a trusted and valid certification authority.<\/p><h3 style=\"color: #0086d9;\"><strong>3.11: Encrypt Sensitive Data At Rest<\/strong><\/h3><p>Sensitive data at rest either on servers, databases, or applications, should be encrypted with at least Storage-layer encryption. Additional encryption methods can be deployed to ensure that only authorized users can view and use the data, even if the storage device gets into the wrong hands.<\/p><h3 style=\"color: #0086d9;\"><strong>3.12: Segment Data Processing and Storage Based on Sensitivity<\/strong><\/h3><p>Data processing and storage should be segmented based on data classification to ensure that sensitive data is treated with more caution than less sensitive data. Avoid processing sensitive data on enterprise assets that manage less sensitive data at the same time. Doing this will prevent a hacker from automatically accessing all company data once they gain access to some less sensitive data.<\/p><h3 style=\"color: #0086d9;\"><strong>3.13: Deploy a Data Loss Prevention Solution<\/strong><\/h3><p>Data loss protection (DLP) is a powerful automated system for protecting on-site and remote data from accidental loss and exfiltration. The tool identifies all sensitive data processed, stored, or transmitted through enterprise assets and updates the data inventory. <a href=\"https:\/\/www.sealpath.com\/blog\/dlp-irm-which-one-should-i-choose-to-protect-my-sensitive-data\/\" target=\"_blank\" rel=\"noopener\">Know more about DLP vs IRM here.<\/a><\/p><h3 style=\"color: #0086d9;\"><strong>3.14: Log Sensitive Data Access<\/strong><\/h3><p>All sensitive data actions should be logged, including access, modification, and disposal, as this is essential for timely detection and response to malicious activity. Post-attack investigations and detection of breach culprits for appropriate accountability also require data access logs to be fully carried out.<\/p><h2 id=\"id_5\" style=\"color: #0086d9;\"><strong>How a data-centric security approach can help you to implement CIS Control 3<\/strong><\/h2><p><a href=\"https:\/\/www.sealpath.com\/blog\/deploy-enterprise-digital-rights-management\/\" target=\"_blank\" rel=\"noopener\">Organizations deploying data-centric security<\/a> can better implement CIS Control 3 because their technologies, processes, and policies are concerned with the lifecycle of data, including its location, collection, transfer, storage, and visibility.<\/p><h2 id=\"id_6\" style=\"color: #0086d9;\"><strong>Key Elements And Benefits of a Data-Centric Security Approach<\/strong><\/h2><p>The key elements of an effective data-centric security system include the following:<\/p><h3 style=\"color: #0086d9;\"><strong>1. Identification, discovery, and classification of sensitive information<\/strong><\/h3><p>An internal or external attacker\u2019s primary target is to access the most sensitive company information since they carry the highest benefits. They may as well go after other data, e.g., regulation data like EU-GDPR, PCI, or others. Often, these data are stored in specific repositories known to only the company\u2019s team; however, they can be shared, putting the data at risk. Organizations interested in implementing data-centric security controls need tools and technologies that help to identify where their data is at all times to prevent unauthorized access. <a href=\"https:\/\/www.sealpath.com\/blog\/advantages-data-classification-ia-ml\/\" target=\"_blank\" rel=\"noopener\">Know the Advantages of Data Classification boosted by AI and Machine Learning<\/a>.<\/p><h3 style=\"color: #0086d9;\"><strong>2. Data-centric protection<\/strong><\/h3><p>Data-centric security controls focus on monitoring and securing an organization\u2019s sensitive information to prevent unauthorized access due to cloud, network, or data leakage. You know where your data is and where it goes while having absolute control over it, regardless of how far it travels.<\/p><h3 style=\"color: #0086d9;\"><strong>3. Audit and monitoring of access to data<\/strong><\/h3><p>Organizations must analyze data use and determine if users\u2019 behavioural patterns are within the acceptable standard so as to know the level of risk associated with the data at any time.<\/p><h3 style=\"color: #0086d9;\"><strong>4. Administration and management of data policies<\/strong><\/h3><p>Employees come and go, but company data remain relevant at all times. A data-centric security approach allows organizations to determine who should or shouldn\u2019t have access to certain data, depending on their policies. So when you stop collaborating with someone or find out they\u2019re at risk, you immediately revoke access to the data, destroy it, or prevent it from leaving the corporate network.<\/p><p><picture><source srcset=\"https:\/\/www.sealpath.com\/wp-content\/webp-express\/webp-images\/uploads\/2022\/12\/cis_controls_sealpath.png.webp 800w, https:\/\/www.sealpath.com\/wp-content\/webp-express\/webp-images\/uploads\/2022\/12\/cis_controls_sealpath-480x260.png.webp 480w\" type=\"image\/webp\" sizes=\"auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw\" \/><img loading=\"lazy\" class=\"aligncenter size-full wp-image-20120 webpexpress-processed\" alt=\"\" width=\"800\" height=\"433\" data-lazy-srcset=\"https:\/\/www.sealpath.com\/wp-content\/uploads\/2022\/12\/cis_controls_sealpath.png 800w, https:\/\/www.sealpath.com\/wp-content\/uploads\/2022\/12\/cis_controls_sealpath-480x260.png 480w\" data-lazy-sizes=\"auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw\" data-lazy-src=\"https:\/\/www.sealpath.com\/wp-content\/uploads\/2022\/12\/cis_controls_sealpath.png\" \/><\/picture><noscript><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-20120 webpexpress-processed\" src=\"https:\/\/www.sealpath.com\/wp-content\/uploads\/2022\/12\/cis_controls_sealpath.png\" alt=\"\" width=\"800\" height=\"433\" srcset=\"https:\/\/www.sealpath.com\/wp-content\/uploads\/2022\/12\/cis_controls_sealpath.png 800w, https:\/\/www.sealpath.com\/wp-content\/uploads\/2022\/12\/cis_controls_sealpath-480x260.png 480w\" sizes=\"auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw\"><\/noscript><\/p><h2 id=\"id_7\" style=\"color: #0086d9;\"><strong>How can SealPath help?<\/strong><\/h2><p>When it comes to improving your organization\u2019s data protection strategy, SealPath can offer a data-centric security system that effectively monitors your <a href=\"https:\/\/www.sealpath.com\/blog\/protecting-the-three-states-of-data\/\" target=\"_blank\" rel=\"noopener\">data at rest, in transit, and in use<\/a>. Thus, regardless of how far your data travels, you are not only aware of its journey, but you still have absolute control over it and can destroy it in case of a breach risk.<\/p><p>SealPath offers you Information Rights Management (IRM) \/ Enterprise Digital Rights Management (E-DRM) \/ Enterprise Information Protection and Control (IPC) over all your data, preventing a breach incident.<\/p><h2 style=\"color: #0086d9;\"><strong>Information Rights Management (IRM)\/Enterprise Digital Rights Management (E-DRM)\/Enterprise Information Protection and Control (IPC) solution<\/strong><\/h2><p>The IPC (Information Protection and Control), or IRM \/ E-DRM (Information Rights Management \/ Enterprise Digital Rights Management) technologies give you the power to control information wherever they are, even if it\u2019s outside the cloud. It combines identity control + encryption + auditing + remote control and takes them beyond the sphere of traditional encryption.<\/p><p>Some of the capabilities of this technology include the ability to:<br \/>\u2022 provide protection that travels with the information<br \/>\u2022 monitor access to information and limit the permissions on the documentation (Only View, Edit, Print, etc.).<br \/>\u2022 revoke access, no matter where the files are stored<\/p><p>A data-centric approach to security makes protection user-driven or managed by the administrator in order to secure certain folders. In the cloud, folders or documentation repositories are automatically protected by encrypting them in systems with O365, Box, etc.<\/p><p>These technologies can be integrated with classification tools so that classified data within or outside the corporate network or cloud are automatically protected, depending on their level of confidentiality, DLP, or CASB.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"85835\" class=\"elementor elementor-85835\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-28cd29c7 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"28cd29c7\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-63c11775\" data-id=\"63c11775\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1c79c5c3 elementor-widget elementor-widget-text-editor\" data-id=\"1c79c5c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About SealPath<\/strong><br>SealPath is the European leader in Data-Centric Security and Enterprise Digital Rights Management, working with significant companies in more than 25 countries. SealPath has been helping organizations from different business verticals such as Manufacturing, Oil and Gas, Retail, Finance, Health, and Public Administration, to protect their data for over a decade. SealPath\u2019s client portfolio includes organizations within the Fortune 500 and Eurostoxx 50 indices. SealPath facilitates the prevention of costly mistakes, reducing the risk of data leakage, ensuring the security of confidential information, and protecting data assets.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Know in depth the CIS Security Control 3 v8, a set of s [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1281,1305,61],"tags":[1077,1282],"class_list":["post-105524","post","type-post","status-publish","format-standard","hentry","category-sealpath","category-1305","category-press-release","tag-1077","tag-sealpath"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CIS Critical Security Control 3 v8: Improving organizations data protection strategy - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sealpath.com\/blog\/cis-critical-security-control-v8-data-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CIS Critical Security Control 3 v8: Improving organizations data protection strategy - Version 2\" \/>\n<meta property=\"og:description\" content=\"Know in depth the CIS Security Control 3 v8, a set of s [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sealpath.com\/blog\/cis-critical-security-control-v8-data-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-12T04:33:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-12T04:42:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sealpath.com\/wp-content\/webp-express\/webp-images\/uploads\/2022\/12\/sealpath-cis-controls-title-980x579.png.webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sealpath.com\\\/blog\\\/cis-critical-security-control-v8-data-protection\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/03\\\/cis-critical-security-control-3-v8-improving-organizations-data-protection-strategy\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"CIS Critical Security Control 3 v8: Improving organizations data protection strategy\",\"datePublished\":\"2025-03-12T04:33:18+00:00\",\"dateModified\":\"2025-03-12T04:42:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/03\\\/cis-critical-security-control-3-v8-improving-organizations-data-protection-strategy\\\/\"},\"wordCount\":2050,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sealpath.com\\\/blog\\\/cis-critical-security-control-v8-data-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.sealpath.com\\\/wp-content\\\/webp-express\\\/webp-images\\\/uploads\\\/2022\\\/12\\\/sealpath-cis-controls-title-980x579.png.webp\",\"keywords\":[\"2025\",\"Sealpath\"],\"articleSection\":[\"Sealpath\",\"2025\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/03\\\/cis-critical-security-control-3-v8-improving-organizations-data-protection-strategy\\\/\",\"url\":\"https:\\\/\\\/www.sealpath.com\\\/blog\\\/cis-critical-security-control-v8-data-protection\\\/\",\"name\":\"CIS Critical Security Control 3 v8: Improving organizations data protection strategy - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.sealpath.com\\\/blog\\\/cis-critical-security-control-v8-data-protection\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sealpath.com\\\/blog\\\/cis-critical-security-control-v8-data-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.sealpath.com\\\/wp-content\\\/webp-express\\\/webp-images\\\/uploads\\\/2022\\\/12\\\/sealpath-cis-controls-title-980x579.png.webp\",\"datePublished\":\"2025-03-12T04:33:18+00:00\",\"dateModified\":\"2025-03-12T04:42:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sealpath.com\\\/blog\\\/cis-critical-security-control-v8-data-protection\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sealpath.com\\\/blog\\\/cis-critical-security-control-v8-data-protection\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sealpath.com\\\/blog\\\/cis-critical-security-control-v8-data-protection\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.sealpath.com\\\/wp-content\\\/webp-express\\\/webp-images\\\/uploads\\\/2022\\\/12\\\/sealpath-cis-controls-title-980x579.png.webp\",\"contentUrl\":\"https:\\\/\\\/www.sealpath.com\\\/wp-content\\\/webp-express\\\/webp-images\\\/uploads\\\/2022\\\/12\\\/sealpath-cis-controls-title-980x579.png.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sealpath.com\\\/blog\\\/cis-critical-security-control-v8-data-protection\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CIS Critical Security Control 3 v8: Improving organizations data protection strategy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CIS Critical Security Control 3 v8: Improving organizations data protection strategy - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sealpath.com\/blog\/cis-critical-security-control-v8-data-protection\/","og_locale":"en_US","og_type":"article","og_title":"CIS Critical Security Control 3 v8: Improving organizations data protection strategy - Version 2","og_description":"Know in depth the CIS Security Control 3 v8, a set of s [&hellip;]","og_url":"https:\/\/www.sealpath.com\/blog\/cis-critical-security-control-v8-data-protection\/","og_site_name":"Version 2","article_published_time":"2025-03-12T04:33:18+00:00","article_modified_time":"2025-03-12T04:42:01+00:00","og_image":[{"url":"https:\/\/www.sealpath.com\/wp-content\/webp-express\/webp-images\/uploads\/2022\/12\/sealpath-cis-controls-title-980x579.png.webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sealpath.com\/blog\/cis-critical-security-control-v8-data-protection\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2025\/03\/cis-critical-security-control-3-v8-improving-organizations-data-protection-strategy\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"CIS Critical Security Control 3 v8: Improving organizations data protection strategy","datePublished":"2025-03-12T04:33:18+00:00","dateModified":"2025-03-12T04:42:01+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2025\/03\/cis-critical-security-control-3-v8-improving-organizations-data-protection-strategy\/"},"wordCount":2050,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.sealpath.com\/blog\/cis-critical-security-control-v8-data-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.sealpath.com\/wp-content\/webp-express\/webp-images\/uploads\/2022\/12\/sealpath-cis-controls-title-980x579.png.webp","keywords":["2025","Sealpath"],"articleSection":["Sealpath","2025","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2025\/03\/cis-critical-security-control-3-v8-improving-organizations-data-protection-strategy\/","url":"https:\/\/www.sealpath.com\/blog\/cis-critical-security-control-v8-data-protection\/","name":"CIS Critical Security Control 3 v8: Improving organizations data protection strategy - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sealpath.com\/blog\/cis-critical-security-control-v8-data-protection\/#primaryimage"},"image":{"@id":"https:\/\/www.sealpath.com\/blog\/cis-critical-security-control-v8-data-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.sealpath.com\/wp-content\/webp-express\/webp-images\/uploads\/2022\/12\/sealpath-cis-controls-title-980x579.png.webp","datePublished":"2025-03-12T04:33:18+00:00","dateModified":"2025-03-12T04:42:01+00:00","breadcrumb":{"@id":"https:\/\/www.sealpath.com\/blog\/cis-critical-security-control-v8-data-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sealpath.com\/blog\/cis-critical-security-control-v8-data-protection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sealpath.com\/blog\/cis-critical-security-control-v8-data-protection\/#primaryimage","url":"https:\/\/www.sealpath.com\/wp-content\/webp-express\/webp-images\/uploads\/2022\/12\/sealpath-cis-controls-title-980x579.png.webp","contentUrl":"https:\/\/www.sealpath.com\/wp-content\/webp-express\/webp-images\/uploads\/2022\/12\/sealpath-cis-controls-title-980x579.png.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.sealpath.com\/blog\/cis-critical-security-control-v8-data-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"CIS Critical Security Control 3 v8: Improving organizations data protection strategy"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-rs0","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/105524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=105524"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/105524\/revisions"}],"predecessor-version":[{"id":105531,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/105524\/revisions\/105531"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=105524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=105524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=105524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}