Products & Solutions

The Security Configuration Benchmarks are distributed free of charge in PDF format to propagate their worldwide use and adoption as user-originated, de facto standards. The CIS Benchmarks are the only consensus-based, best-practice security configuration guides both developed and accepted by government, business, industry, and academia.

The Benchmarks are:

  • Recommended technical control rules/values for hardening operating systems, middleware and software applications, and network devices;
  • Unique, because the recommendations are defined via consensus among hundreds of security professionals worldwide;
  • Used by thousands of enterprises as the basis for security configuration policies and the de facto standard for IT configuration best practices.

Available to CIS Security Benchmarks Members


In the Downloads section of the CIS Security Benchmarks Member Web site (registered account information required), members will find:

  • CIS-CAT. CIS’s Configuration Assessment Tool (CIS-CAT) reports a target systems conformance with the recommended settings in the CIS Benchmarks. CIS-CAT offers enterprises a powerful tool for analyzing and monitoring the security status of information systems and the effectiveness of internal security controls and processes.
  • Word/Excel Versions of the CIS Benchmarks
  • Automated remediation kits for implementing and assessing Benchmark guidance. The content allows you to automatically apply the recommended settings for a particular benchmark.

Learn about CIS Security Benchmarks Membership

 

Available Free of Charge

On this web site, you'll find:

  • 28 Security Metric Definitions in PDF can be used across organizations to collect and analyze data on security outcomes and process performance.
  • CIS Controls are especially relevant because they are based on actual attack data pulled from a variety of public and private threat sources.
  • Crosswalk- CIS maps its Benchmarks to two leading security guidelines: the Critical Security Controls for Effective Cyber Defense and the Australian Signals Directorate's (ASD) Strategies to Mitigate Targeted Cyber Intrusions. The CIS mapping provides a "crosswalk" - a comprehensive and prioritized blueprint of>CIS Benchmarksfor organizations to leverage to help accomplish the corresponding security guidelines' recommendations.
  • Webcasts


 

Benchmarks

 


The Security Configuration Benchmarks are distributed free of charge to propagate their worldwide use and adoption as user-originated, de facto standards.

Assessment Tools

 


CIS Security Benchmarks offers a variety of tools for assessing compliance with CIS Benchmarks.

Remediation Content

 

CIS offers automated remediation content for implementing and assessing benchmark guidance.

 

CIS-CAT Trial

 


Learn how CIS-CAT provides IT and security professionals with a fast, detailed assessment of target systems' conformance with CIS Benchmarks. CIS-CAT offers enterprises a powerful tool for analyzing and monitoring the security status of information systems and the effectiveness of internal security controls and processes.

Membership Benefits

 


Learn about the benefits of CIS Security Benchmarks Membership.