Center for Internet Security (CIS) - Critical Security Controls Authoritative Source Content

Document created by Gloria Higley Employee on Aug 13, 2020Last modified by Gloria Higley Employee on Aug 18, 2020
Version 5Show Document
  • View in full screen mode

The CIS Controls are a recommended set of actions for cyber defense that provide specific and actionable ways to thwart the most pervasive attacks. The CIS Controls are a relatively short list of high-priority, highly effective defensive actions that provide a "must-do, do-first" starting point for every enterprise seeking to improve their cyber defense.

 

The CIS Controls were developed in 2008 by an international, grass-roots consortium bringing together companies, government agencies, institutions, and individuals from every part of the ecosystem (cyber analysts, vulnerability-finders, solution providers, users, consultants, policy-makers, executives, academia, auditors, etc.) who banded together to create, adopt, and support the CIS Controls. The expert volunteers who develop the Controls apply their first-hand experience to develop the most effective actions for cyber defense.

 

Languages

This content is available in English only.

 

Mappings

Mappings for the Center for Internet Security (CIS) - Critical Security Controls Authoritative Source Content to the RSA Archer Control Standard Library are available in the authoritative source content pack.

 

Content Source

The source of this content comes from the Center for Internet Security website.

 

Licensing Restrictions

This content requires a license and/or membership in good standing as required by the terms set forth by The Center for Internet Security (CIS). For more information about licensing, please contact The Center for Internet Security (CIS).

 

The Center for Internet Security (CIS) - Critical Security Controls authoritative source content is available with the use of the RSA Archer Policy Program Management use case, the RSA Archer IT Policy Program Management use case, and/or the RSA Archer Assessment & Authorization use case. 

 

For Additional Support

To learn more about this content, please contact your Account Rep for additional details. For technical support questions, please open a support case or contact RSA Archer at archersupport@rsa.com for more information.

Attachments

    Outcomes