White Papers
Download guides, security framework mappings, and other documents
Filter by Topic
258 Results Found
111 - 120 of 258 results
Published on 03.07.2022
The methodology used to create the mapping can be useful to anyone attempting to understand the relationships between the CIS Controls and the CJ...
Published on 02.10.2022
Part 2 highlights how the Russian government's influence in cybercrime impacts the SLTT community.
Published on 02.10.2022
Part 1 highlights the history of Russian governmental influence in cybercrime up to the present day.
Published on 02.10.2022
This page describes the methodology used to map the CIS Controls to the North American Electric Reliability Corporation-Critical Infrastructure P...
Published on 02.04.2022
CIS RAM (Center for Internet Security® Risk Assessment Method) is an information security risk assessment method that helps organizations impleme...
Published on 01.27.2022
The purpose of the CIS Controls Privacy Guide is to develop best practices and guidance for implementing the CIS Critical Security Controls (CIS ...
Published on 12.22.2021
The Winter 2021 issue of Cybersecurity Quarterly focuses on sharing resources and knowledge in the cybersecurity community, solving the challenge...
Published on 12.21.2021
This white paper describes the methodology used to map the CIS Controls to FS.31 GSMA Baseline Security Controls v2.0.
Published on 12.17.2021
We are pleased to announce the release of the Azure Security Benchmark (ASB) v3 with mappings to the CIS Critical Security Controls (CIS Controls...
Published on 12.15.2021
This guide will focus on a commonly exploited protocol, Windows Management Instrumentation (WMI) Remote Protocol, and the Safeguards an enterpris...
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More