×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu

The Beginner’s Guide to Secure Cloud Configurations

 

Over the past decade, organizations around the world rapidly shifted how they use IT platforms, networks, and devices to support their missions. Technological advances in the cloud made it possible to outsource data storage to cloud service providers (CSPs) so seamlessly that most end users never even noticed the transition.

The ongoing improvements to the speed, capabilities, and reliability of cloud computing provides efficiencies of scale that enable rapid deployment of cloud products and services. This transformation has not been without its challenges, however. Chief among them is the need to ensure security and the protection of data in a cloud environment.

This micro e-book from the Center for Internet Security, Inc. (CIS®) includes the following topics:

  • Understanding shared cloud security responsibility
  • Begin at the beginning: What are CIS Benchmarks™?
  • New resource: CIS Cloud Product Benchmarks
  • The specifics of CIS Cloud Product and Services Benchmarks
  • An evolution of secure cloud configurations
  • A faster way to VM security: CIS Hardened Images®
  • Contribute: Get involved with CIS communities
  • Learn more: Access these cloud security resources