Center for Internet Security

Photos: RSA Conference 2023, part 2
RSA Conference 2023 is taking place at the Moscone Center in San Francisco. Check out our microsite for the conference for all the most important news. Part 1 of the photos is …

CIS expands partnership with Akamai to protect state and local governments
Cyberattacks often begin with an unsuspecting user clicking on a link that redirects them to a harmful site containing malware. Even the best employee training won’t …

Security in the cloud with more automation
Hopefully, you’ve been working with the Center for Internet Security (CIS) on securing your cloud infrastructure for a while now. Initially, you might have used our CIS …

Visualize change with an out-of-the-box configuration report
Your technology is always changing, and you often end up playing catchup to secure it. This is difficult in the cloud when you share security responsibility with the cloud …

How to scale cybersecurity for your business
All businesses seek profitable growth. The issue is that growth adds complexity. Organizations need new systems and more employees to support this larger footprint, thus …

CIS SecureSuite Membership: Leverage proven best practices to improve cybersecurity
Whether you’re facing a security audit or interested in configuring systems securely, CIS SecureSuite Membership is here to help. CIS SecureSuite provides thousands of …

Whitepaper: Shared responsibility model for cloud security
With high chances of user error, limited security resources, and constantly evolving computing environments, commercial and public organizations need cybersecurity resources …

ARMO adds CIS benchmark to Kubescape to help users scan Kubernetes and CI/CD pipelines
ARMO announced that Kubescape now includes security and compliance scanning of Kuberneters based on the Center for Internet Security (CIS) Kubernetes benchmark. One of the …

CIS Benchmarks: Community driven security guidelines
CIS Benchmarks are the only consensus-developed security configuration recommendations both created and trusted by a global community of IT security professionals from …

CIS Hardened Images on AWS Marketplace
Does your organization spend countless resources hardening operating systems in the cloud? That’s why CIS pre-hardens virtual machine (VM) images to CIS Benchmark …

CIS Controls v8: Safeguards to mitigate the most prevalent cyber-attacks
The CIS Critical Security Controls (CIS Controls) are a prioritized set of safeguards to mitigate cyber-attacks against systems and networks. They are mapped to and referenced …

CIS Critical Security Controls v8
The CIS Critical Security Controls (CIS Controls) are a prioritized set of safeguards to mitigate the most prevalent cyber-attacks against systems and networks. They are …