Election Security Tools & Resources
The Center for Internet Security (CIS) and the Elections Infrastructure Information Sharing and Analysis Center® (EI-ISAC®) provides many resources to support the cybersecurity needs of the election community. The resources below include guidance on security best practices developed by a global community of cybersecurity experts that are tailored to the unique nature of election security.
There is no cost to join the EI-ISAC. Election offices and associations can join the EI-ISAC as members. Election vendors who support an EI-ISAC member can join as Supporting Members. All can access the no-cost services discussed below.
Securing Election Systems and Data
Resources to help the election community protect systems and data.
Are you Ready for the Next Election?
Learn how to add layers of security to your election networks and devices at no cost to you.
Incident Response Checklist
Learn how to identify, respond to, and communicate information about a breach.
Real-Time Indicator Feeds
We leverage both internal and external sources to create the only intelligence feed tailored for SLTTs. Members can use carefully-vetted and verified indicators, including malicious domains and file hashes, to automate defenses across their local network, without additional equipment in most cases. They also have the option to choose from multiple collections of indicators derived from a range of resources.
More About Albert
Albert Network Monitoring and Management is an Intrusion Detection System supporting the cyber defense of many State, Local, Tribal, and Territorial (SLTT) organizations. Albert sensors passively monitor network traffic data, providing security alerts for known cyber threats that are detected. Albert sensors, in combination with a layered defense-in-depth approach to cybersecurity, are proven to be highly effective in protecting against cyber threats, including known ransomware.
Technology Recommendations for Federal Election Security Funding
Identifies tools that can improve an election office’s cybersecurity posture in accordance with funding provided to states through the Election Assistance Commission.
Educating Election Offices
Resources that help educate the EI-ISAC community and take the cybersecurity of their election-related systems into their own hands.
Election Security Spotlights
A short non-technical explanation of a common cybersecurity term or practice, and its application to elections infrastructure.
View all cybersecurity spotlights
ISAC webinars examine critical and timely cybersecurity issues to provide participants with quality information in an interactive format. Attendees receive practical advice that can be applied immediately.
The EI-ISAC supports national and local cyber exercises through CISA.
Contact us for more information
Cybersecurity terms and definitions
A glossary of common cybersecurity-related terms and definitions.
Multiple guides to help election agencies secure infrastructure, procurements, and more.
The EI-ISAC’s Essential Guide to Election Security
The Center for Internet Security (CIS) has developed the Essential Guide to Election Security to serve as a first-stop resource for election officials to learn about best practices in election security. This can aid the process of building a program designed to meet the individual needs and abilities of any given election office.
VIEW THE ESSENTIAL GUIDE TO ELECTION SECURITY
The Rapid Architecture-Based Election Technology Verification (RABET-V) is an election technology verification process that supports rapid product changes by design. These documents give an overview of the process and a thorough review of the first pilot testing e-pollbook and election night reporting technologies.
Download RABET-V Overview White Paper
Download RABET-V Pilot Final Report
Managing Cybersecurity Supply Chain Risks in Election Technology
This guide for election technology providers continues our approach of providing best practices for specific problem areas identified to CIS by the election community. It contains recommendations and best practices to address the need for cybersecurity risks and refers to these other CIS documents to describe a holistic, consistent approach to risk management.
Contact us for more information
Election Technology Procurements Guide
CIS developed this procurement guide to help with this challenge. CIS worked with a group of election stakeholders from federal, state, and local governments, community associations, and election technology vendors to develop a set of best practices tailored to improving security in election procurements.
Resources from partners to help secure elections agencies.
CISA: Election Infrastructure Security
CISA offers election-related information and resources to help secure election infrastructure.
EAC: Election Security Preparedness
EAC offers resources to help election officials.
Google: Protect Your Election
Google offers tools to help defend information when it matters most.
Cloudflare: Athenian Project
Cloudfare offers free DDoS attack protection for at-risk public interest websites.
Global Cyber Alliance: Cybersecurity Toolkit for Elections
GCA offers free tools for election officials to take immediate action to improve the cybersecurity and integrity of our elections.