White Papers
Download guides, security framework mappings, and other documents
Filter by Topic
258 Results Found
131 - 140 of 258 results
Published on 05.20.2021
The Center for Internet Security’s 2020 Year in Review highlights all the efforts the cybersecurity nonprofit accomplished in its 20th year in bu...
Published on 05.18.2021
This document provides a detailed mapping of the relationships between CIS Critical Security Controls v8 and NIST SP 800-171 Rev 2.
Published on 05.18.2021
CIS Critical Security Controls (CIS Controls) v8 offers prescriptive, prioritized, and simplified cybersecurity best practices that provide a cle...
Published on 05.18.2021
This document describes the methodology used to map the CIS Critical Security Controls to the Cloud Security Alliance Cloud Control Matrix. The m...
Published on 05.18.2021
This document provides a detailed mapping of the relationships between CIS Critical Security Controls v8 and NIST SP 800-53 Rev. 5.
Published on 05.18.2021
This spreadsheet provides an overview of the changes from CIS Critical Security Controls version 7.1 to version 8. Our goal is to provide a refer...
Published on 05.18.2021
This mapping document demonstrates connections between NIST Cybersecurity Framework (CSF) and the CIS Critical Security Controls (CIS Controls) v...
Published on 05.18.2021
The security challenges facing the usage of mobile devices in the enterprise warrant additional attention. While many of the core security concer...
Published on 04.27.2021
In the 2020 General Election, the Center for Internet Security’s (CIS) dedicated staff and our partners worked tirelessly to apply lessons learne...
Published on 03.30.2021
The Spring 2021 issue focuses on overall security using the CIS Controls, strengthening the healthcare industry’s cyber defenses, and protecting ...
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More