White Papers
Download guides, security framework mappings, and other documents
Filter
274 Results Found
Solutions
Industry
151 - 160 of 274 results
Published on 08.31.2021
This page describes the methodology used to map the CIS Critical Security Controls to Health Insurance Portability and Accountability Act of 1996...
CIS ControlsHealthcare
Published on 08.31.2021
This mapping document demonstrates connections between AICPA Trust Services Criteria (SOC2) and the CIS Critical Security Controls v8.
CIS ControlsFinance
Published on 07.01.2021
In this summer edition of Cybersecurity Quarterly, read about the latest enhancements to cybersecurity best practices with CIS Controls v8, prote...
CIS CyberMarket
Published on 06.28.2021
This publication was created by the National Association of State Procurement Officials (NASPO) and the NASCIO, representing Chief Information Of...
Published on 06.24.2021
Every October during Cyber Security Awareness Month (CSAM), the MS-ISAC conducts a national K-12 “Kids Safe Online” poster contest to encourage y...
MS-ISAC
Published on 06.09.2021
The CIS Critical Security Controls® are a prioritized set of actions which collectively form a defense-in-depth set of best practices that mitiga...
CIS Controls
Published on 05.20.2021
The Center for Internet Security’s 2020 Year in Review highlights all the efforts the cybersecurity nonprofit accomplished in its 20th year in bu...
CIS BenchmarksCIS ControlsCIS CyberMarketCIS Hardened ImagesCIS Services
Published on 05.18.2021
This document provides a detailed mapping of the relationships between CIS Critical Security Controls v8 and NIST SP 800-171 Rev 2.
CIS Controls
Published on 05.18.2021
CIS Critical Security Controls (CIS Controls) v8 offers prescriptive, prioritized, and simplified cybersecurity best practices that provide a cle...
CIS Controls
Published on 05.18.2021
This document provides a detailed mapping of the relationships between CIS Critical Security Controls v8 and NIST SP 800-53 Rev. 5.
CIS Controls
Explore Related Cybersecurity Solutions

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
Learn More
CIS Hardened Images
Learn More
CIS SecureSuite
Learn More
CIS Services
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More