Since the inception of the CIS Benchmarks over a decade ago, we’ve worked to automate the often daunting task of implementing secure system configurations. The primary way we help users automate is with CIS-CAT, our CIS Configuration Assessment Tool. CIS-CAT has helped organizations and independent IT consultants around the world assess system settings in minutes and quickly view remediation steps for achieving compliance with the CIS Benchmark recommendations.
Communities are at the heart of the CIS Benchmarks. For years, expert IT volunteers from around the world have helped us develop, review, edit and maintain the secure configuration recommendations contained in every CIS Benchmark. This collaborative consensus process is essential to the objective, vendor-agnostic nature of our resources.
CIS is proud to unveil CIS-CAT Pro, the newest iteration of the popular and globally-used CIS-CAT. The updated CIS-CAT Pro has two components: CIS-CAT Pro Assessor and CIS-CAT Pro Dashboard. But perhaps the most powerful new feature of CIS-CAT Pro is the ability to assess individual CIS Benchmarks as mapped to the CIS Controls. CIS Benchmarks annotated with CIS Controls mappings include all applicable controls and sub controls for the specific benchmark. CIS is in the first phase of mapping the CIS Benchmarks to the CIS Controls – many more are on the way. In this release, CIS Controls annotations have been completed for the following CIS Benchmarks:
Security-minded IT professionals can significantly improve their organization’s cybersecurity posture by investing in a CIS SecureSuite Membership. Previously known as CIS Security Benchmarks Membership, we have renamed this group of over 1,000 global businesses and government entities to better reflect the combined resources of the CIS Benchmarks and CIS Controls.
Week 4 of National Cyber Security Awareness Month focuses on our continuously connected lives in a rapidly developing digital world. Mobile security plays a big role in staying safe as more organizations than ever rely on cell phones, tablets, and laptops for business. Does your cybersecurity strategy keep mobile in mind? Here are four mobile security tips to help your organization stay secure in a connected and moving business environment.