Skip to content

Latest commit

 

History

History
40 lines (25 loc) · 1.98 KB

File metadata and controls

40 lines (25 loc) · 1.98 KB
copyright
years
2020, 2025
lastupdated 2025-07-15
keywords IBM Cloud, observability
subcollection cis

{{site.data.keyword.attribute-definition-list}}

About custom lists

{: #custom-lists}

Custom lists in CIS allow you to group related data—such as IP addresses, hostnames, or Autonomous System Numbers (ASNs) into named collections that can be reused across multiple rule expressions. These lists simplify management, improve rule clarity, and provide a more scalable way to control access and filtering. {: shortdesc}

What are custom lists?

{: #about-custom-lists}

A custom list is a reusable set of similar data entries. Instead of hardcoding multiple values into every rule, you can define a custom list once and reference it by name in your custom security rules. This approach is ideal for managing dynamic threat intelligence feeds, trusted traffic sources, or internal network assets.

CIS supports the following types of custom lists:

Lists with hostnames and ASNs are available only to Enterprise customers. {: note}

Each list type has its own properties and CSV file format as shown in Custom list types.

Managed versus custom lists

{: #managed-vs-custom-lists}

In addition to custom lists that you define, CIS also provides managed lists, which are predefined and maintained by IBM. These lists include curated sets of known threat sources or commonly targeted IP ranges, and can be used similar to custom lists. For information on managed lists, see Using managed lists.