Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world

About Us Leadership Principles Testimonials


secure your organization
Secure Your Organization

secure specific platforms
Secure Specific Platforms

cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments

View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers




filter by topic
Filter by Topic

View All Resources  
CIS Logo Show Search Expand Menu

Download this document containing mappings of the CIS Critical Security Controls and Safeguards to COBIT 19.

The Fall 2021 issue of Cybersecurity Quarterly focuses our new offering for US State, Local, Tribal, and Territorial (SLTT) entities, security best

Download the Community Defense Model (CDM) v2.0 to design, prioritize, implement, and improve your cybersecurity program against the most prevalent types of attacks.

The CIS Controls Internet of Things Companion Guide provides best practices and guidance for implementing the CIS Critical Security Controls v8 to IoT devices.

This document contains mappings of the CIS Controls and Safeguards to Payment Card Industry (PCI) Data Security Standard, v3.2.1.

This page describes the methodology used to map the CIS Critical Security Controls to Health Insurance Portability and Accountability Act of 1996

This mapping document demonstrates connections between AICPA Trust Services Criteria (SOC2) and the CIS Critical Security Controls v8.

In this edition, read about the new CIS Controls v8, protecting remote work environments, and a sneak peek at the new Community Defense Model v2.0.

This whitepaper download will address steps state governments should take to ensure cybersecurity is an integral part of the acquisition process.

The 2021 Kids Safe Online Activity Book showcases the winning artwork of students from around the country and offers educational games and resources.

Download this guide for direct mitigations for SMB, as well as which best practices an enterprise can put in place to reduce the risk of an SMB-related attack. 

The Center for Internet Security's 2020 Year in Review highlights all the efforts the cybersecurity nonprofit accomplished in its 20th year in business.

This document provides a detailed mapping of the relationships between CIS Controls v8 and NIST SP 800-171 Rev 2.

CIS Controls v8 are mapped to the Cybersecurity Maturity Model Certification (CMMC) levels to help organizations required to meet CMMC requirements.

CIS Controls v8
May 18, 2021

CIS Critical Security Controls v8 offers prescriptive, prioritized, and simplified cybersecurity best practices that provide a clear path to improve

1 2 3 11