Election Security Tools & Resources

Overview

The Center for Internet Security (CIS) and the Elections Infrastructure Information Sharing and Analysis Center® (EI-ISAC®) provides many resources to support the cybersecurity needs of the election community. The resources below include guidance on security best practices developed by a global community of cybersecurity experts that are tailored to the unique nature of election security.

There is no cost to join the EI-ISAC. Election offices and associations can join the EI-ISAC as members. Election vendors who support an EI-ISAC member can join as Supporting Members. All can access the no-cost services discussed below.

Securing Election Systems and Data

Resources to help the election community protect systems and data.


Are you Ready for the Next Election?

Learn how to add layers of security to your election networks and devices at no cost to you.

Learn more


Incident Response Checklist

Learn how to identify, respond to, and communicate information about a breach.

Download Checklist


Real-Time Indicator Feeds

We leverage both internal and external sources to create the only intelligence feed tailored for SLTTs. Members can use carefully-vetted and verified indicators, including malicious domains and file hashes, to automate defenses across their local network, without additional equipment in most cases. They also have the option to choose from multiple collections of indicators derived from a range of resources.

Learn More


More About Albert

Albert Network Monitoring and Management is an Intrusion Detection System supporting the cyber defense of many State, Local, Tribal, and Territorial (SLTT) organizations. Albert sensors passively monitor network traffic data, providing security alerts for known cyber threats that are detected. Albert sensors, in combination with a layered defense-in-depth approach to cybersecurity, are proven to be highly effective in protecting against cyber threats, including known ransomware.

Learn More About Albert


Technology Recommendations for Federal Election Security Funding

Identifies tools that can improve an election office’s cybersecurity posture in accordance with funding provided to states through the Election Assistance Commission.

Download the Recommendations

Educating Election Offices

Resources that help educate the EI-ISAC community and take the cybersecurity of their election-related systems into their own hands.


Election Security Spotlights

A short non-technical explanation of a common cybersecurity term or practice, and its application to elections infrastructure.

View all spotlights


Webinars

ISAC webinars examine critical and timely cybersecurity issues to provide participants with quality information in an interactive format. Attendees receive practical advice that can be applied immediately.

View all webinars


Tabletop Exercises

The EI-ISAC supports national and local cyber exercises through CISA.

Contact us for more information


Cybersecurity terms and definitions

A glossary of common cybersecurity-related terms and definitions.

Explore Glossary

Guides

Multiple guides to help election agencies secure infrastructure, procurements, and more.


The EI-ISAC’s Essential Guide to Election Security

The Center for Internet Security (CIS) has developed the Essential Guide to Election Security to serve as a first-stop resource for election officials to learn about best practices in election security. This can aid the process of building a program designed to meet the individual needs and abilities of any given election office.

VIEW THE ESSENTIAL GUIDE TO ELECTION SECURITY


RABET-V

The Rapid Architecture-Based Election Technology Verification (RABET-V) is an election technology verification process that supports rapid product changes by design. These documents give an overview of the process and a thorough review of the first pilot testing e-pollbook and election night reporting technologies.

Download RABET-V Overview White Paper

Download RABET-V Pilot Final Report


Managing Cybersecurity Supply Chain Risks in Election Technology

This guide for election technology providers continues our approach of providing best practices for specific problem areas identified to CIS by the election community. It contains recommendations and best practices to address the need for cybersecurity risks and refers to these other CIS documents to describe a holistic, consistent approach to risk management.

Contact us for more information


Election Technology Procurements Guide

CIS developed this procurement guide to help with this challenge. CIS worked with a group of election stakeholders from federal, state, and local governments, community associations, and election technology vendors to develop a set of best practices tailored to improving security in election procurements.

Download the guide

Partner Resources

Resources from partners to help secure elections agencies.


CISA: Election Infrastructure Security

CISA offers election-related information and resources to help secure election infrastructure.

Learn More


EAC: Election Security Preparedness

EAC offers resources to help election officials.

Learn More


Google: Protect Your Election

Google offers tools to help defend information when it matters most.

Learn More


Cloudflare: Athenian Project

Cloudfare offers free DDoS attack protection for at-risk public interest websites.

Learn More


Global Cyber Alliance: Cybersecurity Toolkit for Elections

GCA offers free tools for election officials to take immediate action to improve the cybersecurity and integrity of our elections.

Learn More

Elections Infrastructure ISAC

Already a member?

Learn more about next steps and services

Explore EI-ISAC Services

EI-ISAC Member Guide

We value your questions and feedback

At CIS, we are committed to serving the greater IT security community.

Contact Us Today