tagline: Confidence in the Connected World
CIS Logo
HomeCybersecurity Best Practices
Image of an woman on a computer

Cybersecurity Best Practices

CIS Controls and CIS Benchmarks are global industry best practices endorsed by leading IT security vendors and governing bodies.

CIS Controls and CIS Benchmarks are global industry best practices endorsed by leading IT security vendors and governing bodies.

Secure Your Organization

IT security leaders use CIS Controls to quickly establish the protections providing the highest payoff in their organizations. They guide you through a series of 20 foundational and advanced cybersecurity actions, where the most common attacks can be eliminated.

CIS Controls Example:

1. Inventory of Authorized and Unauthorized Devices

Secure Your Systems & Platforms

Proven guidelines will enable you to safeguard operating systems, software and networks that are most vulnerable to cyber attacks. They are continually verified by a volunteer IT community to combat evolving cybersecurity challenges.

CIS Benchmarks Examples:

Ubuntu Windows iOS