White Papers
Download guides, security framework mappings, and other documents
Filter by Topic
241 Results Found
131 - 140 of 241 results
Published on 10.06.2020
Activity Alert: Emotet MalwareThis Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise frameworks for...
Published on 09.29.2020
Cybersecurity Quarterly Fall 2020The Fall 2021 issue of Cybersecurity Quarterly focuses our new offering for U.S. State, Local, Tribal, and Territorial (SLTT) entities, security ...
Published on 09.22.2020
LokiBot MalwareSummary This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framew...
Published on 09.18.2020
CIS Critical Security Controls v7.1 and Sub-Controls Mapping to PCI DSSThis document maps CIS Critical Security Controls v7.1 to the Payment Card Industry Data Security Standard (PCI DSS).
Published on 08.07.2020
2019 Center for Internet Security Year in Review2019 was a fast-paced and highly-productive year for the Center for Internet Security, Inc. (CIS). We continued to experience remarkable growth i...
Published on 07.31.2020
CIS Community Defense Model for CIS Controls v7.1This paper presents the CIS Community Defense Model (CDM)—our way to bring more rigor, analytics, and transparency to the security recommendation...
Published on 07.29.2020
CIS Password Policy GuidePasswords are ubiquitous in modern society. If you have an account on a computer system, there will likely be at least one password that will nee...
Published on 07.20.2020
CIS SecureSuite Membership Digital OverviewCIS SecureSuite Membership provides integrated cybersecurity tools and resources to organizations of every size. Your team can automate configura...
Published on 07.20.2020
CIS Hardened Images Digital OverviewCIS Hardened Images bring the globally recognized security configuration recommendations of the CIS Benchmarks to the cloud. These securely pre-c...
Published on 07.20.2020
CIS Digital OverviewThe Center for Internet Security (CIS) makes the connected world a safer place for people, businesses, and governments through our core competenc...
Explore Related Cybersecurity Solutions
![CIS Benchmarks](/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2022/11/cis-benchmarks-2x.png?h=92&iar=0&w=506&rev=d6647217d71d4c48a48d56a45310ab1d&hash=0188A344D72FBBCACB47442769D2A4F0)
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More![CIS Controls](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-controls-2x.png?h=92&iar=0&w=506&rev=ca698aae52114f09addebb2abe7ece68&hash=9A1D0EB75EC8086F47DBA4F26F17CD81)
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More![CIS CyberMarket](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-cybermarket-2x.png?h=92&iar=0&w=506&rev=ea7a40c6f3e54c499bbd4f944534be4e&hash=4761DB162EF55588ACADEAC005D87800)
CIS CyberMarket
Learn More![CIS Hardened Images](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-hardened-image-2x.png?h=92&iar=0&w=506&rev=8dcca1f1565944e68c9419e97226e635&hash=78C8AC09F2ECAEFF06AFBB8A7A678C5B)
CIS Hardened Images
Learn More![CIS SecureSuite](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-securesuite-2x.png?h=92&iar=0&w=506&rev=557d7a3960a74b40a1b48f89d355a48c&hash=480170679111A9C965586D085C24FA7B)
CIS SecureSuite
Learn More![CIS Services](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-services-2x.png?h=92&iar=0&w=506&rev=77ef3596fa0d4b0896dc8d9ed417cf2e&hash=4E8C8506E1656DAA9F002AD9F169A536)
CIS Services
Learn More![EI-ISAC](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ei-isac-2x.png?h=92&iar=0&w=506&rev=8abad6f86568423fb38760487a34344d&hash=5BE5437319134F62E3271E5C09EF446F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More![MS-ISAC](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ms-isac-2x.png?h=92&iar=0&w=506&rev=cd31677319d8426abd68004db480917b&hash=8D769323AB0B0D5156805F29FCC5C25F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More