

Image credit: Center for Internet Securityįor each group, you have a set of recommended actions or “to-do’s.” Using the tool you can report on whether the control is implemented, whether there is a policy backing the control, and you may indicate whether you have this control automated and reported to the business. The workbook goes into good detail on each of the 20 critical controls laid out by CIS, in three separate “Implementation Groups” (IGs). It’s wonderful, and I encourage you to check it out.
CIS BENCHMARK SCRIPTS FREE
One extremely valuable resource that I like to use is a free “Initial Assessment” tool published by AuditScripts. The best way to do this is to perform an initial assessment against a standardized and reputable security control framework such as the NIST Cyber Security Framework (CSF) or the Center for Internet Security (CIS).

In other words, you want to be able to highlight the risks that they are choosing to accept by not spending that extra money. Besides being able to paint a picture of “what good looks like” for stakeholders on a conceptual level, you also need to clearly illustrate the risks that their business faces. Please see this post for more details.Įspecially in the small and mid-sized enterprise space, it can be very difficult to persuade customers to spend additional money on their technology investments “because security.” Therefore, education is an important part of your job as an advisor in this area. See User Agreement for details.Note: I have updated this workbook to reflect changes in v8 of the CIS Controls framework. Such communications and work product are private and confidential. Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. This IS includes security measures (e.g., authentication and access controls) to protect USG interests – not for your personal benefit or privacy.Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG authorized purpose.At any time, the USG may inspect and seize data stored on this IS.The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations.Government (USG) Information System (IS) that is provided for USG-authorized use only.īy using this IS (which includes any device attached to this IS), you consent to the following conditions: SUSE Linux Enterprise Server 12 STIG Benchmark – Ver 2, Rel 3.Oracle Linux 7 STIG Benchmark – Ver 2, Rel 4.MS Internet Explorer 11 STIG Benchmark – Ver 1, Rel 16.
CIS BENCHMARK SCRIPTS WINDOWS
CIS BENCHMARK SCRIPTS PROFESSIONAL
Adobe Acrobat Professional DC Continuous Track STIG – Ver 2, Rel 1.
