CIS Logo
tagline: Confidence in the Connected World


This spreadsheet is a reference document to quickly see the specific changes from Version 7 to Version 7.1 of the CIS Controls.


Discover the Sub-Controls in Implementation Groups that help organizations of different classes focus their security resources.


Here are six reasons cloud infrastructure makes sense for organizations interested in leveraging modern security solutions and flexible computing power.


Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for arbitrary code execution.



Discover ways to leverage the newly released CIS Controls Self Assessment Tool to assist in tracking & managing implementation of the CIS Controls.


Standards in SCAP 2.0 can help achieve true security automation and improved security business practices by integrating support into products.


Multiple vulnerabilities have been identified in Magento CMS, the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in the WordPress Social Warfare Plugin, the most severe of which could allow for remote code execution.



LockerGoga is a ransomware that creates disruptive effects on industrial and manufacturing firms' networks, resulting in costly production downtime


Apache Cassandra
March 29, 2019

Securing Apache Cassandra An objective, consensus-driven security guideline for the Apache Cassandra Server Software



3/6/19 Forbes “Extending to the public cloud, the CSF may be used in conjunction with the new CIS Controls Cloud Companion Guide that



CIS has strengthened its Board of Directors with several key appointments of cybersecurity industry leaders


Learn how UMass Lowell’s cybersecurity training has helped students implement the NIST Framework and the CIS Controls.


Multiple vulnerabilities have been discovered in iCloud, iTunes, Safari, Mojave, High Sierra, Sierra, tvOS, Xcode, and iOS.



Multiple vulnerabilities have been identified in Mozilla Thunderbird, the most severe of which could allow for arbitrary code execution.



1 2 3 4 5 6 93