CIS Logo
tagline: Confidence in the Connected World
Pencil Blog Post: 3 Hurdles CISOs Face Securing Virtual Office Environments Arrow See all the latest Arrow

Consensus-developed secure configuration guidelines for hardening.

Develop and update secure configuration guidelines for 14 technology groups.

Prescriptive, prioritized, and simplified set of cybersecurity best practices.

Refine and verify best practices, related guidance, and mappings.

Start Secure. Stay Secure.®

Membership combines and automates the CIS Benchmarks, CIS Controls, and CIS-CAT Pro into a powerful and time-saving cybersecurity resource.


CIS-CAT Pro enables users to assess conformance to best practices and improve compliance scores over time.

“It is the most important membership for the compliance review of information security available in the market today.”
— Senior Manager, Information Security & Compliance International Public Service & Communications Agency

Consensus-based Guidelines

CIS Benchmarks and CIS Controls are consensus-based guides curated by security practitioners focused on performance, not profit.

Objective Standards

Our security best practices are referenced global standards verified by an objective, volunteer community of cyber experts.

Secure Online Experience

CIS is an independent, non-profit organization with a mission to provide a secure online experience for all.

Information Hub

What's New
CONTROL: 1 --- ADVISORY CONTROL: 0
CONTROL: 2 --- ADVISORY CONTROL: 0
CONTROL: 3 --- ADVISORY CONTROL: 0

Blog post 06 Jul 2020
CONTROL: 4 --- ADVISORY CONTROL: 0
CONTROL: 5 --- ADVISORY CONTROL: 1
CONTROL: 6 --- ADVISORY CONTROL: 2
CONTROL: 6 --- ADVISORY CONTROL: 3
CONTROL: 6 --- ADVISORY CONTROL: 3
Daily tip

Safely Dispose of Old Computers

It's important to erase all personal information from old computers before disposing of them. Simply reformatting a hard drive or reinstalling the operating system does not guarantee the old data is unreadable. Physically destroy the hard drive or use a special "wipe" program. These programs, such as Active@KillDisk and Dban, are free and meet governmental security standards.