How secure configurations meet consensus

0
182

Have you ever wondered how technology hardening guidelines are developed? Some are determined by a particular vendor or driven by a bottom-line perspective. But that’s not the case with CIS Benchmarks. They’re developed by the Center for Internet Security (CIS) and the only consensus-developed security configuration recommendations both created and trusted by a global community of IT security professionals from academia, government, and industry.

There are currently more than 100 configuration guidelines for 25+ vendor product families. Some of the most used include web browsers, videoconferencing, operating systems, and cloud infrastructure.

The CIS Benchmarks are used by companies from around the world to secure technologies from configuration vulnerabilities such as:

  • Open system ports
  • Unauthorized root or admin access
  • User account control (UAC)
  • Unnecessary/unused system services
  • Server Message Block (SMB v1.0)

These vulnerabilities are often open doors for malware that can cause serious damage.

Meet the experts

There are over 12,000 professionals in the CIS Benchmarks communities. These volunteers collaborate on CIS WorkBench, an online platform used…

Read More…