Cybersecurity Best Practices
CIS Controls™ and CIS Benchmarks™ are global industry best practices endorsed by leading IT security vendors and governing bodies.
Secure Your Organization
![CIS Controls](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-controls-card.png?rev=cf57f90d9f8941d0b6fc80eda6a3098f&hash=95B8B4009FAE0F8936E2C4261F6D44F2)
IT security leaders use CIS Controls to quickly establish the protections providing the highest payoff in their organizations. They guide you through a series of 20 foundational and advanced cybersecurity actions, where the most common attacks can be eliminated.
CIS Controls Example:
1. Inventory of Authorized and Unauthorized Devices
Download:
All 20 CIS Controls
Secure Your Systems & Platforms
![CIS Benchmarks](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2022/11/cis-benchmarks-card.png?rev=16d3360d8b964603853cfe81b17e05b5&hash=2247967190ED3FFC9F08638E31E137F8)
Proven guidelines will enable you to safeguard operating systems, software and networks that are most vulnerable to cyber attacks. They are continuously verified by a volunteer IT community to combat evolving cybersecurity challenges.
CIS Benchmarks Examples:
Download Free CIS Benchmark PDFs:
All CIS Benchmarks