The CIS Critical Security Controls for Effective Cyber Defense explained

The CIS Controls (formerly called the Center for Internet Security Critical Security Controls for Effective Cyber Defense) is a publication of best practice guidelines for computer security. The project was initiated early in 2008 in response to extreme data losses experienced by organizations in the US defense industrial base.[1] The publication was initially developed by the SANS Institute and released as the "SANS Top 20." Ownership was then transferred to the Council on Cyber Security (CCS) in 2013, and then transferred to Center for Internet Security (CIS) in 2015. CIS released version 8 of the CIS Controls in 2021.[2]

Goals

The guidelines consist of 18 (originally 20) key actions, called critical security controls (CSC), that organizations should implement to block or mitigate known attacks. The controls are designed so that primarily automated means can be used to implement, enforce and monitor them.[3] The security controls give no-nonsense, actionable recommendations for cyber security, written in language that’s easily understood by IT personnel.[4] Goals of the Consensus Audit Guidelines include

Supported Platforms

CIS Benchmarks cover a wide range of technologies, including:

Notes and References

  1. http://www.gilligangroupinc.com/headlines/2009/feb-23-related/background-and-participants.html "Gilligan Group Inc., CAG Background and Participants"
  2. https://www.cisecurity.org/controls/v8?msclkid=363086a359ea1ff39cc0e30b509f6b8e “CIS Critical Security Controls Version 8, CIS webpage, January 17, 2024
  3. https://buildsecurityin.us-cert.gov/swa/presentations_1109/W3%20Final%20-%20Kass%20-%20Understanding%20Technology%20Stakeholders.pdf “Understanding Technology Stakeholders: Their Progress and Challenges” by John M. Gilligan, Software Assurance Forum, November 4, 2009
  4. https://web.archive.org/web/20120330220029/http://www.liebsoft.com/CAG_overview/ “Consensus Audit Guidelines: Overview” by Lieberman Software Corporation
  5. https://buildsecurityin.us-cert.gov/swa/presentations_09/Day%203%20-%20GILLIGAN%20-%20DoD-MITRE%20Software%20Assurance%20Conference%203-12-09.pdf “Consensus Audit Guidelines: Time to ‘Stop The Bleeding’” by John M. Gilligan, 10th Semi-Annual Software Assurance Forum, March 12, 2009
  6. Web site: Vanney . Ivan . 2024-07-02 . What are CIS Benchmarks? . 2024-07-03 . Linux.Lat . en-US.