CIS Benchmarks are security control sets to ensure a “best practices” configuration approach which maximizes an organization’s security posture.
The CIS Benchmarks are created collaboratively by Subject Matter Experts (SME’s), Security Community Members and Vendors of the technologies to which each control set applies.
There are multiple configuration profiles for each Benchmark. They are categorized into Level 1 and Level 2.
A Level 1 CIS security profile is the most rapidly implemented and may be considered the “Low Hanging Fruit” approach. Implementing a Level 1 CIS security profile results in an immediate improvement in security posture by minimizing attack surface with minimal impact to business operation and technology usability.
A Level 2 CIS security profile is a much more granular approach and while more complex to implement, results in a heightened security posture. The complexity of implementation lies in the possibility of adverse impact to the usability of the technology if improperly implemented.
TSCS’ CIS Benchmark Compliance Verification Service Offering will ensure your organization achieves the optimal security posture based on the criteria established by your business requirements.
Please review the complete, up-to-date list of CIS Benchmarks below:
Amazon Web Services
Apache HTTP Server
Check Point Firewall
Debian Family Linux
Distribution Independent Linux
Fedora Family Linux
Google Cloud Computing Platform
IBM Cloud Foundations
Microsoft Exchange Server
Microsoft Intune For Windows 10
Microsoft SQL Server
Microsoft Web Browser
Microsoft Windows Desktop
Microsoft Windows Server
Oracle Cloud Infrastructure
Palo Alto Networks
Red Hat Enterprise Linux
Robot Operating System (ROS)
SUSE Linux Enterprise Server