CENTER FOR INTERNET SECURITY CIS

Student’s name

Professor

Course:

Date

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Today, several organizations have been created to ensure that better rules and protocols are put in place for a safer working environment due to increased security threats and controls. Some of these organizations are for-profit, not- for profit or even government organizations. One of these organizations is the center for internet security (CIS).  This organization is a non-profit organization that was formed in 2000. The organization’s primary mission is to develop, identify, promote, validate, and ensure that best practices and solutions for cyber defense are put in place. The organization’s headquarters are in New York in East Greenbush, where its members range from government agencies, large corporations, and renowned learning institutions (“CIS 2018 program committee,” 2018). This organization is best known for coming up with its benchmarks when it comes to policy configuration. These policy benchmarks act as a vital guideline that organizations can use to enhance and improve their cybersecurity and compliance programs.

This organization’s main objective is to come up with security configurations vital to IT and security programs that are common in most organizations. Also, CIS provides several protocols referred to as CIS controls that are basically reviewed and updated through the application of an informal community process.

CIS’s regulation’s primary goal is two-fold, whereby CIS controls involve sets of guidelines that are applied when it comes to securing a wide range of devices and systems. The CIS benchmarks involve certain procedures that are specific individual operating systems, software applications, middleware, and network-connected tools, whereby they emphasize the importance of proper configurations (“CIS 2018 program committee,” 2018). CIS controls come with several benefits whereby prioritization is one of the key advantages. Mostly CIS controls were designed to help organizations rapidly come up and define their starting points for defenses and direct their scarce resources to actions that have immediate payoffs and focus on resources and additional risks.

In conclusion, CIS benchmarks and controls are used to provide global internet security standards that are globally recognized and provide best practices that are meant for securing data and IT systems against any form of attacks (“CIS 2018 program committee,” 2018). It is also important to note that that CIS maps to NIST cybersecurity frameworks and ISO 27000 and regulations such as CIP, HIPAA, and FISMA, among others.

 

 

 

 

 

 

 

 

 

 

References

CIS 2018 program committee. (2018). 2018 14th International Conference on Computational Intelligence and Security (CIS)https://doi.org/10.1109/cis2018.2018.00007

What is the center of internet security controllers (CIS)? | Security Wiki. (n.d.). Secret Double Octopus. https://doubleoctopus.com/security-wiki/regulations/center-of-internet-security-controllers/

 

 

 

error: Content is protected !!