Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world

About Us Leadership Principles Testimonials


secure your organization
Secure Your Organization

secure specific platforms
Secure Specific Platforms

cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments

View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers




filter by topic
Filter by Topic

View All Resources  
CIS Logo Show Search Expand Menu

The Beginner’s Guide to Secure Cloud Configurations


Over the past decade, organizations around the world rapidly shifted how they use IT platforms, networks, and devices to support their missions. Technological advances in the cloud made it possible to outsource data storage to cloud service providers (CSPs) so seamlessly that most end users never even noticed the transition.

The ongoing improvements to the speed, capabilities, and reliability of cloud computing provides efficiencies of scale that enable rapid deployment of cloud products and services. This transformation has not been without its challenges, however. Chief among them is the need to ensure security and the protection of data in a cloud environment.

This micro e-book from the Center for Internet Security, Inc. (CIS®) includes the following topics:

  • Understanding shared cloud security responsibility
  • Begin at the beginning: What are CIS Benchmarks™?
  • New resource: CIS Cloud Product Benchmarks
  • The specifics of CIS Cloud Product and Services Benchmarks
  • An evolution of secure cloud configurations
  • A faster way to VM security: CIS Hardened Images®
  • Contribute: Get involved with CIS communities
  • Learn more: Access these cloud security resources