x
Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



Microsoft 365
June 3, 2021

Securing Microsoft 365 An objective, consensus-driven security guideline for the Microsoft 365 Cloud Providers



Sophos
April 2, 2021

Securing Sophos An objective, consensus-driven security guideline for the Sophos Network Devices



Google Workspace
January 30, 2021

Securing Google Workspace An objective, consensus-driven security guideline for the Google Workspace Cloud Providers



Securing Microsoft Intune for Windows 10 An objective, consensus-driven security guideline for the Microsoft Intune for Windows



Alibaba Cloud
December 12, 2020

Securing Alibaba Cloud An objective, consensus-driven security guideline for the Alibaba Cloud Cloud Providers



IBM Cloud Foundations
November 13, 2020

Securing IBM Cloud Foundations An objective, consensus-driven security guideline for the IBM Cloud Foundations Cloud Providers



Zoom
October 27, 2020

Securing Zoom An objective, consensus-driven security guideline for the Zoom Desktop Software



LXD
October 3, 2020

Securing LXD An objective, consensus-driven security guideline for the LXD Operating Systems



Securing Robot Operating System (ROS) An objective, consensus-driven security guideline for the Robot Operating System (ROS)



Debian Family Linux
September 4, 2020

Securing Debian Family Linux An objective, consensus-driven security guideline for the Debian Family Linux Operating Systems



Securing Oracle Cloud Infrastructure An objective, consensus-driven security guideline for the Oracle Cloud Infrastructure Cloud



Securing Check Point Firewall An objective, consensus-driven security guideline for the Check Point Firewall Network Devices



IBM iSeries
April 7, 2020

Securing IBM i An objective, consensus-driven security guideline for the IBM i Operating Systems



Fedora Family Linux
January 4, 2020

Securing Fedora Family Linux An objective, consensus-driven security guideline for the Fedora Family Linux Operating Systems



Aliyun Linux
August 24, 2019

Securing Aliyun Linux An objective, consensus-driven security guideline for the Aliyun Linux Operating Systems



1 2 3 5