White Papers
Download guides, security framework mappings, and other documents
Filter
254 Results Found
Solutions
Industry
1 - 10 of 254 results
Published on 02.07.2025
This document contains mappings of the CIS Critical Security Controls® (CIS Controls®) v8.1 and CIS Safeguards to MCSB v1. Download it today.
CIS Controls
Published on 02.05.2025
This document contains mappings of the CIS Critical Security Controls® (CIS Controls®) v8.1 to the NERC-CIP Standards. Download it now.
CIS Controls
Published on 02.05.2025
This document contains mappings of the CIS Critical Security Controls® (CIS Controls®) v8.1 to the TSA SD Pipeline 2021-02. Download it now.
CIS Controls
Published on 02.05.2025
This document contains mappings of the CIS Critical Security Controls® (CIS Controls®) v8.1 and CIS Safeguards to SOC2. Download it today.
CIS Controls
Published on 02.04.2025
This document contains mappings of the CIS Critical Security Controls® (CIS Controls®) v8.1 to ISACA COBIT 19. Download it now.
CIS Controls
Published on 02.04.2025
This document contains mappings of CIS Critical Security Controls (CIS Controls) v8.1 to the Regulation Text (2013) of HIPAA. Download it now.
CIS ControlsHealthcare
Published on 01.15.2025
The Winter 2024 issue of Cybersecurity Quarterly looks back on 2024 and explores indications of what is to come in 2025. Check out our articles!
CIS CyberMarket
Published on 01.07.2025
Cybersecurity begins with knowing what hardware and software assets you must protect. Download our tracking spreadsheet translated into Arabic!
Published on 12.09.2024
Interested in applying CIS Controls v8.1 to your cloud environment? Download our guide for practical tips and unique considerations to keep in mi...
CIS Controls
Published on 12.09.2024
Need help maintaining an Active Directory environment and implementing Group Policy Management best practices? Download our guide today.
CIS Controls
Explore Related Cybersecurity Solutions
![CIS Benchmarks](/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2022/11/cis-benchmarks-2x.png?h=92&iar=0&w=506&rev=d6647217d71d4c48a48d56a45310ab1d&hash=0188A344D72FBBCACB47442769D2A4F0)
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More![CIS Controls](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-controls-2x.png?h=92&iar=0&w=506&rev=ca698aae52114f09addebb2abe7ece68&hash=9A1D0EB75EC8086F47DBA4F26F17CD81)
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More![CIS CyberMarket](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-cybermarket-2x.png?h=92&iar=0&w=506&rev=ea7a40c6f3e54c499bbd4f944534be4e&hash=4761DB162EF55588ACADEAC005D87800)
CIS CyberMarket
Learn More![CIS Hardened Images](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-hardened-image-2x.png?h=92&iar=0&w=506&rev=8dcca1f1565944e68c9419e97226e635&hash=78C8AC09F2ECAEFF06AFBB8A7A678C5B)
CIS Hardened Images
Learn More![CIS SecureSuite](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-securesuite-2x.png?h=92&iar=0&w=506&rev=557d7a3960a74b40a1b48f89d355a48c&hash=480170679111A9C965586D085C24FA7B)
CIS SecureSuite
Learn More![CIS Services](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-services-2x.png?h=92&iar=0&w=506&rev=77ef3596fa0d4b0896dc8d9ed417cf2e&hash=4E8C8506E1656DAA9F002AD9F169A536)
CIS Services
Learn More![EI-ISAC](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ei-isac-2x.png?h=92&iar=0&w=506&rev=8abad6f86568423fb38760487a34344d&hash=5BE5437319134F62E3271E5C09EF446F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More![MS-ISAC](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ms-isac-2x.png?h=92&iar=0&w=506&rev=cd31677319d8426abd68004db480917b&hash=8D769323AB0B0D5156805F29FCC5C25F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More