CIS Logo
tagline: Confidence in the Connected World
Pencil Blog Post: Cybersecurity Challenges of a Sudden Remote Workforce Arrow See all the latest Arrow

Robust automated configuration assessment tool rapidly identifies vulnerabilities with coverage for 80+ CIS Benchmarks™.

Proven CIS Benchmarks™ guidelines to protect over 100 distinct systems & platforms.

Join the Community Arrow

20 prioritized actions to beat the vast majority of the most common attacks.

Start Secure, Stay Secure A CIS SecureSuite Membership combines and automates the CIS Benchmarks, CIS Controls, and CIS-CAT Pro into one powerful, time-saving cybersecurity resource for businesses, nonprofits, and governmental entities.

  • Leverage remediation content for rapid CIS Benchmark implementation
  • Connect with CIS staff and developers for technical support
“It is the most important membership for the compliance review of information security available in the market today.”
— Senior Manager, Information Security & Compliance International Public Service & Communications Agency

Consensus-based Guidelines

CIS Benchmarks and CIS Controls are consensus-based guides curated by security practitioners focused on performance, not profit.

Objective Standards

Our security best practices are referenced global standards verified by an objective, volunteer community of cyber experts.

Secure Online Experience

CIS is an independent, non-profit organization with a mission to provide a secure online experience for all.

Information Hub

What's New
CONTROL: 1 --- ADVISORY CONTROL: 0

CIS Benchmarks™ 07 Apr 2020
CONTROL: 2 --- ADVISORY CONTROL: 0
CONTROL: 3 --- ADVISORY CONTROL: 0
CONTROL: 4 --- ADVISORY CONTROL: 0

Media mention 03 Apr 2020
CONTROL: 5 --- ADVISORY CONTROL: 0
CONTROL: 6 --- ADVISORY CONTROL: 0
CONTROL: 6 --- ADVISORY CONTROL: 0
Daily tip

Know Your Peer-to-Peer (P2P) Partner

Peer-to-peer (P2P) networking is a popular method for sharing files, music, photographs, and other information. But this method can come with its share of major risks. It is better knowing who you are sharing data and files with versus browsing for a site that you believe meets your criteria. Data from unknown sites may be corrupted with malware or expose you to legal ramifications.