CIS Named Consultant Membership Agreement

This Named Consulting Membership Agreement (the "Agreement") is made as of the date of acceptance between the Center for Internet Security, Inc. ("CIS"), a Maryland nonprofit corporation and Consultant (CIS and Consultant, each a “Party”).


Whereas, CIS provides consensus-oriented information security products, services, controls, tools, metrics, suggestions, and recommendations as a public service to Internet users worldwide; and

Whereas, Consultant wishes to obtain a Named Consultant membership from CIS and CIS desires to grant such a membership to Consultant.


Now Therefore, in consideration of the mutual promises set forth herein and other good and valuable consideration, the receipt and sufficiency of which is hereby acknowledged, the parties agree as follows:

I. Definitions

CIS Benchmarks means consensus based secure configuration guidelines applicable to a variety of operating systems, middleware and software applications, and network devices.

CIS Controls means the CIS Critical Security Controls for Effective Cyber Defense, v. 6.0 and later.

CIS SecureSuite means the cybersecurity configuration and remediation membership offerings provided by CIS, as set forth in this Agreement.

CIS SecureSuite Products includes any or all of the following:  CIS Benchmarks and CIS Controls in any format provided, CIS-CAT Pro (including CIS-CAT Pro Assessor and CIS-CAT Pro Dashboard as described below), CIS Workbench community site, product guides, remediation content and other products offered by CIS from time to time.

II. Membership Benefits.

Under the terms and conditions set forth in this Agreement, CIS grants to the Named Consultant(s) (as defined in Section III(c) below) a one (1) year CIS Named Consultant membership that entitles the Consultant and Named Consultant(s) to the following benefits:

A. Named Consultant Use 

  1. For onsite consulting engagements, the right for the Named Consultant(s) to download, install, and use the CIS SecureSuite Products on Consultant Clients’ computer network or environment, including any third party network or cloud environment hosting Consultant Clients’ data, for the sole purpose of providing information security consulting and auditing services to those Consultant Clients, provided that, at the end of each consulting/auditing engagement, the Named Consultant must remove all copies of any CIS SecureSuite Products from the Consultant Clients’ computers, networks, systems, and organizational environments that have been installed or provided to those Consultant Clients; and
  2. For remote consulting engagements, the right for Named Consultant(s) to be given direct access to a time-limited version of CIS-CAT Pro, for the sole purpose of providing information security consulting and auditing services to those Consultant Clients, provided that Consultant Client agrees to use CIS-CAT time-limited version only to assess Consultant Client’s internal system.
  3. Notwithstanding any license terms for the CIS Controls to the contrary, CIS hereby provides the Named Consultant(s) a non-exclusive, non-transferable worldwide license to use the CIS Controls in the context of any consulting engagement, including developing Customized Policies as defined below, for as long as this Agreement is in effect.
  4. The right for the Named Consultant(s) to assist the Consultant Clients in developing security configuration and/or security metrics policies that are specifically customized to meet the Consultant Clients’ information security needs (“Customized Policies”), provided that the Consultant Clients agree to:
    a. use any Customized Policies only for securing Consultant Clients’ internal systems or Consultant Clients’ data hosted in a third-party network or cloud environment; and
    b. not distribute any Customized Policies beyond the Consultant Clients’ organizations.
    Once a Customized Policy is created by Named Consultant, Named Consultant may represent to Consultant Clients that such Customized Policy leverages one or more CIS SecureSuite Products but not that it incorporates any CIS SecureSuite Product(s); and
  5. The right for the Named Consultant to use the CIS SecureSuite Logo on reports and related materials prepared for Consultant Clients, in accordance with the terms and conditions of the CIS Logos and Trademark Use Policy, a copy of which can be found at, as such Policy may be amended from time to time.
    The Named Consultant is not required to remove Customized Policies from the Consultant Clients’ computers, networks, systems, and organizational environments at the end of consulting/auditing engagements.
  6. Consultant Use Restrictions
    a. The Consultant agrees that the Consultant Clients cannot be charged directly for the CIS SecureSuite Products and that neither the Consultant, the Named Consultant(s) nor any of the Consultant Clients may sell, resell, or distribute the CIS SecureSuite Products.
    b. CIS agrees that the Consultant Clients may be charged for training, installation, programming and other services, even if those services relate to the CIS SecureSuite Products.
    c. Only those persons designated as the Named Consultants, in accordance with Section III.C of this Agreement, are entitled to use the rights provided under the Membership, and no other person within Consultant’s organization will be so authorized.

B. Organizational Use 

  1. Access to and use of the CIS configuration assessment tool (“CIS-CAT Pro”), including use of the following:
    a. CIS CAT Pro Assessor, allowing Consultant to analyze and score the configuration of Consultant’s internal information technology systems and obtain a score between 1-100 for conformity against CIS Benchmarks including CIS Benchmark recommendations annotated with one of more of the CIS Controls and subcontrols; and
    b. CIS-CAT Pro Dashboard, allowing Consultant to: analyze multiple CIS Benchmarks in a single view for comparison, multiple device reviews; access a CIS Controls view for any annotated CIS Benchmark content; view individual CIS-CAT Pro assessment results, including the ability to create exceptions and recalculate the CIS-CAT Pro assessment; and create individual reporting in multiple formats.
  2. The right to use and distribute the CIS SecureSuite Products within and throughout Consultant’s organization;
  3. Unlimited access to and use of the CIS Workbench (a community site where SecureSuite resources are developed) for access to CIS SecureSuite Products, including forums for information sharing, user support, and discussions among members, developers, and CIS staff;
  4. Timely electronic notification of updates to the CIS SecureSuite Products;
  5. CIS SecureSuite Products support from CIS staff and developers;
  6. At Consultant’s option, listing of Consultant on the dedicated CIS SecureSuite Member pages of the CIS public website and in other promotional materials;
  7. The right to use the CIS SecureSuite membership mark (as set forth on Exhibit A) on Consultant’s websites and documents in accordance with the terms and conditions of the CIS Logos and Trademark Use Policy, a copy of which can be found at, as such Policy may be amended from time to time;
  8. Updates or improvements of existing CIS SecureSuite Products that are made in the ordinary course of business and provided pursuant to this Agreement; and
  9. The ability to edit/modify CIS Benchmarks for use within the Consultant’s organization based upon the Consultant’s unique internal specifications and requirements (a “Customized Benchmark”). Once a Customized Benchmark is created, Consultant is prohibited from labeling or identifying such Customized Benchmark as a “CIS Benchmark.”  Such Customized Benchmark shall not be considered a “derivative work” pursuant to section VII(E) of this Agreement.

Organizational Use Restrictions

  1. The Consultant agrees that the Consultant may not sell or resell any CIS SecureSuite Product or distribute any CIS SecureSuite Product outside of Consultant’s organization.
  2. Except as permitted in section II(A), the Consultant agrees that the Consultant use of CIS SecureSuite Products is limited to internal use to secure the organization’s owned system/network(s) and data (including Consultant’s data stored in a third party network or cloud environment), and not that of any third party.
  3. Consultant may engage a third party contractor or consultant (“Third Party”) to assist in the installation, downloading and use of the CIS SecureSuite Products; provided that such Third Party shall access the CIS SecureSuite Products solely in connection with its contractual performance of duties for Consultant and shall not retain any of the CIS SecureSuite Products for use other than for assisting the Consultant named herein. Consultant shall take reasonable steps to ensure that such Third Party’s use of the CIS SecureSuite Products is limited as described herein.  Such Third Party shall access the CIS SecureSuite Products in the same manner and method as Consultant.

III. Membership Fees; Named Consultant Designation.

A. Named Consultant Membership Fee. In exchange for the rights granted by CIS to Named Consultant(s) in Section II of this Agreement, Consultant agrees to pay CIS the applicable membership fee (“Membership Fee”) in  S. Dollars (USD) plus any applicable US sales tax, which shall be due and payable within thirty (30) days of the Effective Date. Membership Fee payment may be made by: (i) EFT transfer; (ii) check made payable to Center for Internet Security and mailed to CIS Accounts Receivable, 31 Tech Valley Drive, East Greenbush, NY 12061; or (iii) credit card transaction according to the instructions provided to Consultant by CIS. The amount of the Membership Fee to be paid by Customer to CIS pursuant to this section shall not be reduced by any amount of any taxes or fees to be collected by a taxing jurisdiction, financial institution or payment processor incidental to the payment of Membership Fee by Customer to CIS.

B. Named Consultant Renewal Membership Fee. Consultant’s renewal membership fee (“Renewal Membership Fee”) will equal the Named Consultant Membership Fee that is listed for Consultant’s membership category as specified on the CIS website,, thirty (30) days prior to the expiration of any Term of this Agreement.

C. Non-Payment of In the event of non-payment of the any Membership fee by Consultant, CIS reserves the right to restrict Consultant’s access to the CIS SecureSuite Products until such time as payment has been rendered.

D. Accounts Payable Contact Information. Consultant shall designate a point of contact regarding this Agreement.

E. Named Consultants. The Consultant shall identify up to four (4) person(s) who is/are identified by Consultant to be a Named Consultant, each of whom will be authorized to use the rights granted under this Agreement. Consultant may change the designation of a person as a Named Consultant at any time during the term of the Membership by submitting a written notice to CIS. Consultant may also add additional Named Consultants by written notice to CIS; any such request must be accompanied by a payment of an additional Membership Fee to become effective.

IV. Term and Termination.

A. Term. The term of this Agreement will commence on the Effective Date and, unless earlier terminated as provided for in Section IV.B, below, will continue for a period of one year from the Effective Date (the “Initial Term”).   Thereafter, this Agreement may be renewed for consecutive one (1) year renewal terms (each a “Renewal Term”) upon CIS’s receipt and acceptance of a Renewal Membership Fee from the Consultant at or before the beginning of each such Renewal Term.  CIS agrees to send Consultant a renewal invoice at least thirty (30) days prior to the expiration of the Initial Term of this Agreement.

B. Right to Terminate. Both CIS and Consultant shall have the right to terminate this Agreement: (1) if the other party fails to perform a material obligation under this Agreement and fails to cure such nonperformance within thirty (30) days following written notice thereof; or (2) for convenience by providing at least thirty (30) days written notice to the other party. Upon termination, Consultant will cease use of the CIS SecureSuite Products as of the date of such termination.

In the event of termination by CIS for nonperformance by Consultant, or for convenience by Consultant, Consultant will not be entitled to a refund of any Membership Fees or Renewal Membership Fees that have been paid by Consultant to CIS.  In the event of termination by Consultant for nonperformance by CIS or for convenience by CIS, Consultant will be entitled to a prorated refund of any unused Membership Fees or Renewal Membership Fees that have been paid by Consultant to CIS.

V. CIS SecureSuite Products Provided As Is.

CIS makes reasonable efforts to utilize and maintain the most current network security and antivirus protection programs available to screen and protect CIS’s computer programs, websites, and computer infrastructure from malware.  However, Consultant understands and agrees that CIS is providing the CIS SecureSuite Products “as is” and “as available” without any representations, warranties, or covenants of any kind whatsoever.

VI. Ownership Rights of Intellectual Property and SecureSuite Products Reserved.

Neither Consultant nor any Named Consultant is acquiring any title or ownership rights in or to any of the CIS SecureSuite Products or associated intellectual property, including the Trademark, and full title and all ownership rights to the CIS SecureSuite Products and associated intellectual property remain the exclusive property of CIS. The Consultant understands and agrees that the use of the Trademark in connection with this Agreement does not create any right, title or interest in or to the use of the Trademark and that all such use and goodwill associated with the Trademark will inure to the sole benefit of CIS.  Consultant further agrees that it will comply with the terms and conditions of the CIS Logos and Trademarks Use Policy, found at as such policy may be amended from time to time. All rights to the CIS SecureSuite Products not expressly granted in this Agreement are hereby reserved.

VII. Restrictions.

Consultant acknowledges and agrees, on its behalf and on behalf of the Named Consultant(s), that except as otherwise expressly permitted in this Agreement,  neither Consultant nor Named Consultant(s) may: (A) decompile, disassemble, alter, reverse engineer, or otherwise attempt to derive the source code for any CIS SecureSuite Product (except to the extent that such product is already in the form of source code); (B) distribute or redistribute, sell, rent, lease, sublicense or otherwise transfer or exploit any rights to any CIS SecureSuite Product in any way or for any purpose including, without limitation, creating an image incorporating any CIS Benchmark or derivative content (including without limitation remediation content) and offering or using that image as a product or service made available to a third party; (C) post any CIS SecureSuite Product on any website, bulletin board, ftp server, newsgroup, or other similar mechanism or device; (D) remove from or alter the terms of use or any proprietary notice placed on any CIS SecureSuite Product; (E) create any derivative work based directly on an CIS SecureSuite Product or any component thereof; (F) represent or claim a particular level of compliance or consistency with any CIS SecureSuite Product; or (G) facilitate or otherwise aid other individuals or entities in violating this Agreement.

VIII. Consultant’s Responsibility to Evaluate Risks.

Consultant acknowledges and agrees that: (A) no network, system, device, hardware, software, or component can be made fully secure; and (B) Consultant has the sole responsibility to evaluate the risks and benefits of the CIS SecureSuite Products to Consultant’s particular circumstances and requirements including, without limitation, the decision to not implement one or more Benchmark configuration recommendations.

IX. Consultant Indemnification of CIS.

Consultant agrees to indemnify, defend, and hold CIS and all of CIS's employees, officers, directors, agents and other service providers harmless from and against any third party claim, suit or proceeding (including reasonable attorneys’ fees) brought against any of them in connection with Consultant’s material breach of this Agreement.

X. CIS Indemnification of Consultant.

CIS shall indemnify, defend, and hold Consultant harmless against any third party claim, suit or proceeding (including reasonable attorneys’ fees) brought against Consultant alleging that the CIS SecureSuite Products infringe any patent, copyright, or enforceable trade secret, provided that Consultant: (A) gives CIS prompt written notice of any such claim; (B) allows CIS to control the defense and settlement of such claim; (C) refrains from entering into any settlement or compromise of such claim without CIS’s prior written consent; and (D) provides all assistance reasonably requested by CIS in the defense or settlement of such claim, at CIS’s expense.  THIS SECTION SETS FORTH CIS’S SOLE AND EXCLUSIVE LIABILITY, AND CONSULTANT’S SOLE AND EXCLUSIVE REMEDY FOR CIS’S INFRINGEMENT OF THIRD PARTY RIGHTS OF ANY KIND.

XI. Limitation of Liability.

Except as otherwise specified in this Agreement, neither Party will be liable for any indirect, incidental, special, consequential or punitive damages, including without limitation, damages for lost profits, data or use, incurred under this Agreement, whether in an action in contract or tort, even if that Party has been advised of the possibility of such damages.                      

XII. Confidential Information.

A. Confidential Information. Each Party acknowledges that by reason of its relationship with the other Party hereunder, such Party (the “Receiving Party”) might receive access to certain confidential and proprietary information and materials concerning the other Party (the “Disclosing Party”). “Confidential Information" means oral or written non-public information that the Disclosing Party designates as being confidential or which, under the circumstances surrounding disclosure, ought to be treated as confidential, whether provided to the Receiving Party before, on or after the date "Confidential Information" includes, without limitation, information relating to the Disclosing Party’s software and hardware products, specifications, databases, networks, systems design, file layouts, tool combinations and development methods, and information relating to the Disclosing Party's business or financial affairs, such as business methods, marketing strategies, pricing, product development strategies and methods, Consultant lists and financial results. "Confidential Information" also includes information received from others that the Disclosing Party is obligated to treat as confidential. Confidential Information includes all tangible materials which contain Confidential Information, including, without limitation, written or printed documents, computer disks or tapes, and other magnetic or optical storage media, whether user- or machine-readable.

B. Exclusions. Confidential Information does not include any information that the Receiving Party can reasonably demonstrate: (i) was known to the Receiving Party prior to its disclosure hereunder by the Disclosing Party; (ii) was independently developed by the Receiving Party; (iii) is or becomes publicly known through no wrongful act of the Receiving Party; (iv) has been rightfully received from a third party whom the Receiving Party has reasonable grounds to believe is authorized to make such disclosure without restriction; or (v) has been approved for public release by the Disclosing Party's prior written authorization.  Confidential Information may be disclosed pursuant to applicable law, regulations or court order or similar proceeding, provided that the Receiving Party provides, where reasonably possible and legally permissible, prompt advance notice thereof to enable the Disclosing Party to seek a protective order or otherwise prevent such disclosure.

C. Use. The Receiving Party acknowledges and agrees that the Disclosing Party’s Confidential Information is of substantial value to the Disclosing Party, which value would be harmed if such information were disclosed to third parties.  The Parties agree that, commencing on the Effective Date and thereafter, they will not: (i) use the Disclosing Party's Confidential Information in any way, except in the performance of obligations under this Agreement; or (ii) disclose the Disclosing Party’s Confidential Information to any third party, except to the Receiving Party’s employees who need to know such information, provided such employees have a signed confidentiality agreement with terms no less restrictive than the terms in this Agreement. The Parties will not publish, in any form, the other Party's Confidential Information beyond any descriptions published by said other Party.

D. Ownership of Information. The parties expressly agree that the Disclosing Party shall retain all ownership in its Confidential Information.

E. Return of Information. In the event of any termination or expiration of this or any other agreement between the parties: (i) upon the written request of the Disclosing Party, the Receiving Party shall return or destroy all copies of Confidential Information to the Disclosing Party; and (ii) except to the extent the Receiving Party is advised in writing by counsel that there is a legal prohibition on so doing, the Receiving Party will also promptly destroy all written material, memoranda, notes and other writings or recordings whatsoever prepared by it or its representatives based upon, containing or otherwise reflecting any Confidential Information of the Disclosing Party.  Any Confidential Information that is not returned or destroyed including, without limitation, any oral Confidential Information, shall remain subject to the confidentiality obligations set forth in this Agreement.  The Receiving Party may return the Confidential Information, or any part thereof, to the Disclosing Party at any time.

F. Duration. All obligations to protect Confidential Information set forth in this Agreement shall apply during the time of the relationship between the parties and thereafter, for a period of five (5) years.

G. Data Privacy. Both Parties agree to comply with all applicable data privacy laws and regulations, including as applicable, the General Data Protection Regulation.  The Parties further acknowledge the Standard Contractual Terms found at, which are incorporated herein and are made a part hereof, and by signing this Agreement agree to abide by its terms, to the extent applicable.

XIII. Additional Terms

A. Jurisdiction.  Consultant acknowledges and agrees that: (A) this Agreement will be governed by and construed in accordance with the laws of the State of New York; and (B) any action at law or in equity arising out of or relating to this Agreement shall be filed only in the courts located in the State of New York.  Consultant hereby consents and submits to the personal jurisdiction of such courts for the purposes of litigating any such action.

B. Counterparts. This Agreement may be executed in separate counterparts each signed by a Party and such counterparts deemed an executed whole with the full force and effect.  Signatures may be exchanged by email or electronic signature and such signatures will be deemed original.

C. Entire Agreement. This Agreement, including any exhibits referenced herein, constitutes the entire agreement of the Parties with respect to the subject matter hereof, and supersedes all previous written, and all previous or contemporaneous oral negotiations, understandings, arrangements, and agreements.  This Agreement may be amended only by a written amendment signed by both Parties.

D. Advertising or Publicity. Except as provided for in Sections II(A)(6) and (7), neither party shall use the other Party’s name, service marks, or trademarks, or refer to or identify the other Party in any advertising, publicity releases (including references on any Consultant lists or posting on websites), or promotional or marketing correspondence to others without the prior written approval of the other Party.

E. Notices. All notices, requests, demands and determinations made under this Agreement (other than routine operational communications) shall be in writing and shall be deemed duly given (A) when delivered personally (against a signed receipt), (B) on the designated day of delivery (other than a weekend or Federal holiday) after being timely given to an express overnight courier with a reliable system for tracking delivery, or (C) six (6) days after the day of mailing, when sent by first class United States mail, postage prepaid and return receipt requested, to the address set forth below and to the attention of : for CIS:Attn: Chief Counsel, via email to; for Consultant, at an address to be identified by Consultant.

F. Order of Precedence. Except as otherwise agreed to between the Parties, in the event of a conflict between the terms of this Agreement and any other document executed between the Parties, the following order of precedence shall apply: (1) The terms and conditions contained in this CIS Named Consultant Membership Agreement; (2) A Purchase Order (PO) or similar document issued by Consultant to CIS containing terms and conditions therein; (3) Any other document between the Parties.




Rev. 05/13/2020