Center for Internet Security (CIS) Benchmarks for OS Security
The Center for Internet Security (CIS) is a non-profit organization whose mission is to “identify, develop, validate, promote, and sustain best practice solutions for cyber defense.” It is a collaborative effort by security and computing experts from governments, universities, and the private sector. The center develops security benchmarks and best practices with broad applicability, using a consensus model.
A CIS benchmark serves as a configuration baseline and also as the best practice for securely configuring systems. A benchmark consists of multiple recommendations, each consisting of one or more controls that can be implemented by organizations to improve security for a certain computing system. The recommendations and controls are mapped to compliance standards including ISO 27000, PCI DSS, HIPAA, NIST CSF, and NIST SP 800-53.
For operating systems, CIS provides a series of benchmarks that cover secure configuration, with a dedicated benchmark for all major versions of all popular operating systems – including Windows, Windows Server, OS X, and all common Linux distributions.
CIS also offers pre-configured and hardened OS images, which you can access via major cloud providers. Hardened Images are pre-configured with security best practices, and greatly limit security vulnerabilities that may lead to network attacks.
Automate OS Hardening with AutomateCIS
Safeguarding IT systems against cyber threats would take lots of time and required many meetings between IT and Security to debate which configuration settings.
Center For information security(CIS) has developed CIS Benchmarks for operating systems and cloud platforms. But applying them to individual systems and auditing their current state is impracticable.
AutomateCIS is a scalable platform to Audit your Servers against CIS Benchmarks, Remediate the failed audits, and rollback the remediation just in case the remediation is causing issues on your application
Try AutomateCIS Free here: (https://www.zippyops.com/automatecis)
Relevant Blogs:
System Hardening: An Easy-to-Understand Overview
What is some system hardening standards
OS Hardening: 10 Best Practices
Recent Comments
No comments
Leave a Comment
We will be happy to hear what you think about this post