x
URGENT MESSAGE: Log4j Zero-Day Vulnerability Response| Learn more
×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



The Winter 2021 issue of Cybersecurity Quarterly focuses on sharing resources in the cybersecurity community, solving the challenge of security interoperability, and more.


Download this whitepaper for methodology used to map the CIS Controls to FS.31 GSMA Baseline Security Controls v2.0.


The CIS Controls v8 Mapping to Azure Security Benchmark offers high-impact guidance to mitigate threats on a cloud-based architecture.


Windows Management Instrumentation (WMI) Remote Protocol, and the Safeguards an enterprise can implement, in part or whole, to reduce their attack surface or detect anomalies associated with the exploitation of WMI.


Download this document containing mappings of the CIS Critical Security Controls and Safeguards to COBIT 19.


The Fall 2021 issue of Cybersecurity Quarterly focuses our new offering for U.S. SLTT entities, security best practices to mobile and IoT devices, and the importance of implementing a defense-in-depth strategy.


Download the Community Defense Model (CDM) v2.0 to design, prioritize, implement, and improve your cybersecurity program against the most prevalent types of attacks.


The CIS Controls Internet of Things Companion Guide provides best practices and guidance for implementing the CIS Critical Security Controls v8 to IoT devices.


This document contains mappings of the CIS Controls and Safeguards to Payment Card Industry (PCI) Data Security Standard, v3.2.1.


This page describes the methodology used to map the CIS Critical Security Controls to Health Insurance Portability and Accountability Act of 1996



This mapping document demonstrates connections between AICPA Trust Services Criteria (SOC2) and the CIS Critical Security Controls v8.


In this edition, read about the new CIS Controls v8, protecting remote work environments, and a sneak peek at the new Community Defense Model v2.0.


This whitepaper download will address steps state governments should take to ensure cybersecurity is an integral part of the acquisition process.


The 2021 Kids Safe Online Activity Book showcases the winning artwork of students from around the country and offers educational games and resources.


Download this guide for direct mitigations for SMB, as well as which best practices an enterprise can put in place to reduce the risk of an SMB-related attack. 


1 2 3 9