The CIS Controls are a recommended set of actions for cyber defense that provide specific and actionable ways to thwart the most pervasive attacks. The CIS Controls are a relatively short list of high-priority, highly effective defensive actions that provide a "must-do, do-first" starting point for every enterprise seeking to improve their cyber defense.
The CIS Controls were developed in 2008 by an international, grass-roots consortium bringing together companies, government agencies, institutions, and individuals from every part of the ecosystem (cyber analysts, vulnerability-finders, solution providers, users, consultants, policy-makers, executives, academia, auditors, etc.) who banded together to create, adopt, and support the CIS Controls. The expert volunteers who develop the Controls apply their first-hand experience to develop the most effective actions for cyber defense.
This content is available in English only.
Mappings for the Center for Internet Security (CIS) - Critical Security Controls Authoritative Source Content to the RSA Archer Control Standard Library are available in the authoritative source content pack.
The source of this content comes from the Center for Internet Security website.
This content requires a license and/or membership in good standing as required by the terms set forth by The Center for Internet Security (CIS). For more information about licensing, please contact The Center for Internet Security (CIS).
The Center for Internet Security (CIS) - Critical Security Controls authoritative source content
For Additional Support
To learn more about this content, please contact your Account Rep for additional details. For technical support questions, please open a support case or contact RSA Archer at firstname.lastname@example.org for more information.