×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



Updated CIS Benchmarks including Cisco IOS, Linux 6, Apple macOS, Redhat open shift container and more. All created with the help of our volunteer community.


The CIS network of volunteers expanded guidance for the public cloud and offer CIS Benchmarks specific to cloud CSP products and services.


Securely configure your Microsoft Azure account with the consensus-based CIS Foundations Benchmarks mapped to Azure Security Benchmark.


CIS is excited to announce the release of the following CIS Benchmarks and updates with the help of our community contributors.


When customers ask for data protection in the cloud, they might mean data security, or data privacy, or both. Both overlap considerably.


Join CIS Benchmarks Communities and work with a global community of IT professionals to continually create, refine, & secure configurations.


The cloud benchmarks vary depending on the provider. But there are a few shared elements between them to enhance your cloud security.


CIS Benchmarks community members enjoy collaborating and networking with thousands of cybersecurity experts from around the globe.


The key to maintaining security in a modern cloud environment is to implement continuous discovery and interrogation, which requires automation.


CIS's differentiator is trust in our controls and benchmarks that provide assurance that systems and applications are as expected.


Identfying the five trends of internet security, discussing evidence of change, examples of architectural patterns that scale, and a possible future state.


Tony Sager highlights some of the accomplishments CIS has made over the past 20 years for creating confidence in the connected world.


CIS Build Kits are customizable, automated, and efficient, resources applied via Windows and Linux (Unix,*nix) environments.


The Winter 2020 issue of Cybersecurity Quarterly focuses on the 20th Anniversary of CIS, working together to fight cybercrime, and much more.


Updated prescriptive guidance for establishing a secure configuration posture for Amazon, Oracle, Apple iOS, Oracle, as well as new CIS Build Kits.


1 2 3 4 5 13