White Papers
Download guides, security framework mappings, and other documents
Filter by Topic
241 Results Found
161 - 170 of 241 results
Published on 09.23.2019
Fall 2019 Threat of the Quarter: Ryuk RansomwareThroughout 2019, state, local, tribal, and territorial (SLTT) government entities increasingly encounter ransomware attacks resulting in signific...
Published on 09.18.2019
Security Primer – IcedIDOverview IcedID, also known as BokBot, is a modular banking trojan that targets user financial information and is capable of acting as a dropper ...
Published on 09.09.2019
NIST OLIR Submission V1This document is a mapping of the CIS Controls to the NIST Cybersecurity Framework using the NIST Online Informative References (OLIR) format.
Published on 09.06.2019
Security Event Primer – MalwareOverview This white paper provides information on general malware operations, IDS event types, requirements, recommendations, and references. Tec...
Published on 08.27.2019
CIS Critical Security Controls v7.1 Telework and Small Office Network Security GuideRouters, modems, and other network devices act as the on-ramp for private networks to access the internet. Although these network devices are dev...
Published on 08.18.2019
Public Sector Cyber Defense GuideOrganizations rely on different cybersecurity products and services to help bolster their defenses. By comparing available services with best pra...
Published on 07.16.2019
CIS Critical Security Controls v7.1 and Sub-Controls Mapping to ISO 27001This document provides a detailed mapping of the relationships between CIS Critical Security Controls v7.1 and ISO 27001.
Published on 07.10.2019
CIS Hardware and Software Asset Tracking SpreadsheetThis document contains examples of methods for tracking hardware, software, and sensitive information in an organization.
Published on 07.10.2019
CIS Critical Security Controls v7.1 Microsoft Windows 10 Cyber Hygiene GuideThis guide provides detailed information on how to accomplish each of the CIS Sub-Controls within Implementation Group 1 (IG1). This guide builds...
Published on 06.27.2019
CIS Controls Internet of Things Companion Guide Mapping ApplicabilityUse this spreadsheet of the CIS Controls Internet of Things Companion Guide as a checklist to track your progress of securing IoT devices.
Explore Related Cybersecurity Solutions
![CIS Benchmarks](/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2022/11/cis-benchmarks-2x.png?h=92&iar=0&w=506&rev=d6647217d71d4c48a48d56a45310ab1d&hash=0188A344D72FBBCACB47442769D2A4F0)
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More![CIS Controls](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-controls-2x.png?h=92&iar=0&w=506&rev=ca698aae52114f09addebb2abe7ece68&hash=9A1D0EB75EC8086F47DBA4F26F17CD81)
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More![CIS CyberMarket](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-cybermarket-2x.png?h=92&iar=0&w=506&rev=ea7a40c6f3e54c499bbd4f944534be4e&hash=4761DB162EF55588ACADEAC005D87800)
CIS CyberMarket
Learn More![CIS Hardened Images](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-hardened-image-2x.png?h=92&iar=0&w=506&rev=8dcca1f1565944e68c9419e97226e635&hash=78C8AC09F2ECAEFF06AFBB8A7A678C5B)
CIS Hardened Images
Learn More![CIS SecureSuite](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-securesuite-2x.png?h=92&iar=0&w=506&rev=557d7a3960a74b40a1b48f89d355a48c&hash=480170679111A9C965586D085C24FA7B)
CIS SecureSuite
Learn More![CIS Services](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-services-2x.png?h=92&iar=0&w=506&rev=77ef3596fa0d4b0896dc8d9ed417cf2e&hash=4E8C8506E1656DAA9F002AD9F169A536)
CIS Services
Learn More![EI-ISAC](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ei-isac-2x.png?h=92&iar=0&w=506&rev=8abad6f86568423fb38760487a34344d&hash=5BE5437319134F62E3271E5C09EF446F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More![MS-ISAC](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ms-isac-2x.png?h=92&iar=0&w=506&rev=cd31677319d8426abd68004db480917b&hash=8D769323AB0B0D5156805F29FCC5C25F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More