Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    JetBrains security advisory (AV26-364) – Canadian Centre for Cyber Security

    April 17, 2026

    Delta Electronics ASDA-Soft | CISA

    April 17, 2026

    The Destroyed Remnants of a Lost World Are Falling to Earth, Scientists Discover

    April 17, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»Automating the CIS Controls with OSCAL
    News

    Automating the CIS Controls with OSCAL

    adminBy adminApril 13, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    In the face of complex and ever-changing cybersecurity threats and compliance demands, organizations often find themselves burdened by time-consuming, manual processes for documenting and assessing security controls. This manual approach can lead to inefficiencies, inconsistencies, and delays in demonstrating compliance and managing risk. NIST’s Open Security Controls Assessment Language (OSCAL) can help. 

    The Value of OSCAL

    OSCAL is a standardized, data-centric framework designed for documenting and assessing the security controls of information systems. Currently, security controls and their baselines are often in proprietary formats. This leads to laborious data conversion and manual efforts to describe their implementation. OSCAL aims to change this by moving toward machine-readable formats like XML, JSON, and YAML.OSCAL provides the platform to convert control catalogs, system security plans (SSPs), and assessments into machine-readable formats.

    OSCAL provides the platform to convert control catalogs, system security plans (SSPs), and assessments into these machine-readable formats. As a result, organizations can:

    • Easily access control information from catalogs and other security documentation.
    • Significantly reduce the administrative burden of maintaining manual documentation.
    • Focus on the critical aspects of security rather than tedious administrative tasks.

    OSCAL tackles the problem of manually creating documentation and can result in accelerating the Authority to Operate (ATO) process. FedRAMP has already started to accept authorization deliverables using OSCAL.

    OSCAL Automates Version Updates 

    OSCAL also helps to automate mappings and streamline the transition between different framework versions. This is particularly valuable for organizations grappling with compliance across multiple frameworks. Many organizations do not have the luxury of following just one or two frameworks in this diverse ecosystem of security and technology.

    The good news is that significant overlap exists between many of these frameworks. This is where the power of mappings becomes evident. The Center for Internet Security (CIS) provides mappings to over 25 different frameworks, offering assistance for managing a Governance, Risk, and Compliance (GRC) program. 

    As OSCAL gains adoption in the marketplace, it enables organizations to to navigate the complexities of multi-framework compliance with greater efficiency. For example, a GRC tool vendor could import mappings into their tooling automatically, then allow end-organizations to cross-reference those mappings easily within a platform, as compared to within a spreadsheet. 

    CIS Critical Security Controls + OSCAL

    CIS is actively embracing OSCAL. Our commitment centers on facilitating the automation of the CIS Controls catalog and the intricate mapping process for both our valued users and product vendors. Currently, the CIS Controls OSCAL Repository provides OSCAL serializations for both v8 and v8.1 of the CIS Critical Security Controls. This means that the prescriptive, prioritized cybersecurity best practices outlined in the CIS Controls are now available in a standardized, machine-readable format that can be integrated into your end-users and product vendors’ own tooling.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous Article[Control systems] ABB security advisory (AV26-346)
    Next Article ZDI-26-175: Apple macOS ImageIO SGI File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
    admin
    • Website

    Related Posts

    News

    The Destroyed Remnants of a Lost World Are Falling to Earth, Scientists Discover

    April 17, 2026
    News

    Emails Reveal Space Force’s Hardest Mission Is Writing a Song

    April 17, 2026
    News

    I Almost Lost My Mind in the Bridal Algorithm

    April 17, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views
    Our Picks

    JetBrains security advisory (AV26-364) – Canadian Centre for Cyber Security

    April 17, 2026

    Delta Electronics ASDA-Soft | CISA

    April 17, 2026

    The Destroyed Remnants of a Lost World Are Falling to Earth, Scientists Discover

    April 17, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.