Sponsor of the Day:
Jerkmate
https://fast.wistia.com/embed/medias/s1abjx9h37/
Power Up Your Hardening Efforts with CIS Benchmarks
cis benchmarkspowerhardeningefforts
https://www.cisecurity.org/insights/blog/cis-benchmarks-community-volunteer-spotlight-bruce-bading
CIS Benchmarks Community Volunteer Spotlight: Bruce Bading
Learn about one of the CIS Benchmarks Community Volunteers who generously spends some of his time improving cybersecurity best practices for the community.
cis benchmarks communityvolunteer spotlightbrucebading
https://www.cisecurity.org/insights/blog/cis-benchmarks-communities-where-configurations-meet-consensus
CIS Benchmarks Communities: Where Configurations Meet Consensus
cis benchmarkscommunitiesconfigurationsmeetconsensus
https://www.cisecurity.org/insights/blog/cis-benchmarks-february-2026-update
CIS Benchmarks February 2026 Update
Here is an overview of the CIS Benchmarks that the Center for Internet Security (CIS) updated or released for February 2026.
february 2026 updatecis benchmarks
https://www.cisecurity.org/benchmark
CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
cis benchmarks
https://www.cisecurity.org/insights/case-study/saving-customers-time-money-in-hardening-to-cis-benchmarks
Saving Customers Time, Money in Hardening to CIS Benchmarks
Through the CIS OEM Partner Program, Sicura helped its customers harden their systems to the CIS Benchmarks and other standards. Read its story.
customers timecis benchmarkssavingmoneyhardening
https://www.cisecurity.org/unsupported-cis-benchmarks
Unsupported CIS Benchmarks
These CIS Benchmarks are no longer being reviewed and updated by our consensus communities, but you are still welcome to download them. AIX v1.0.1 – Version...
cis benchmarksunsupported
https://www.datadoghq.com/solutions/security/cis-benchmarks/aws/
AWS Compliance Using CIS Benchmarks | Datadog
Evaluate the compliance posture of your environment against AWS CIS benchmarks with Datadog. Prevent security attacks and catch threats earlier.
cis benchmarksawscomplianceusingdatadog
https://www.cisecurity.org/insights/blog/cis-benchmarks-community-volunteer-spotlight-jamie-scott
CIS Benchmarks Community Volunteer Spotlight: Jamie Scott
Jamie Scott has done a lot to support effective security controls for cyber defense as a volunteer of the CIS Benchmarks Community. Hear his story.
cis benchmarks communityvolunteer spotlightjamiescott
https://www.cisecurity.org/insights/blog/cis-benchmarks-community-volunteer-spotlight-daniel-jasiak
CIS Benchmarks Community Volunteer Spotlight: Daniel Jasiak
Daniel Jasiak has done a lot to support effective security controls for cyber defense as a volunteer of the CIS Benchmarks Community. Hear his story.
cis benchmarks communityvolunteer spotlightdaniel
https://www.cisecurity.org/insights/blog/cis-benchmarks-volunteer-spotlight-nancy-hidy-wilson
CIS Benchmarks Volunteer Spotlight: Nancy Hidy Wilson
More than 9,000 members of the CIS Benchmarks® Community have developed and updated CIS Benchmarks for over 150 technologies.
cis benchmarks volunteerspotlightnancywilson
https://help.zend.com/zendphp/current/content/installation/cis-docker-benchmarks.htm
CIS Benchmarks for Docker 1.6
cis benchmarks1 6docker
https://www.cisecurity.org/insights/webinar/effective-implementation-of-the-cis-benchmarks-and-cis-controls
Effective Implementation of the CIS Benchmarks and CIS Controls
effective implementationcis benchmarkscontrols
https://www.cisecurity.org/insights/blog/cis-benchmarks-volunteer-spotlight-paul-campbell
CIS Benchmarks Volunteer Spotlight: Paul Campbell
CIS values all of the volunteers who work hard so that the CIS Benchmarks and CIS Controls reflect global knowledge of the latest known cyber threats.
cis benchmarks volunteerspotlight paulcampbell
https://www.cisecurity.org/insights/webinar/effective-implementation-of-the-cis-benchmarks-and-cis-controls?topic=cis-securesuite
Effective Implementation of the CIS Benchmarks and CIS Controls
effective implementationcis benchmarkscontrols
https://www.cisecurity.org/insights/blog/cis-benchmarks-march-2026-update
CIS Benchmarks March 2026 Update
Here is an overview of the CIS Benchmarks that the Center for Internet Security (CIS) updated or released for March 2026.
march 2026 updatecis benchmarks
https://www.cisecurity.org/insights/blog/cis-benchmarks-community-volunteer-spotlight-phil-chatham
CIS Benchmarks Community Volunteer Spotlight: Phil Chatham
Phil Chatham has done a lot to support effective security controls for cyber defense as a volunteer of the CIS Benchmarks Community. Hear his story.
cis benchmarks communityvolunteer spotlightphilchatham
https://www.cisecurity.org/communities/benchmarks
CIS Benchmarks Community
CIS Benchmarks are consensus-developed security configuration recommendations both created and trusted by a global community of IT security professionals.
cis benchmarks community
https://www.cisecurity.org/cis-benchmarks-overview
CIS Benchmarks
CIS Benchmarks are secure configuration guidelines that help you safeguard systems, software, and networks against evolving cyber threats.
cis benchmarks
https://www.cisecurity.org/insights/blog/cis-benchmarks-volunteer-spotlight-sean-mccown
CIS Benchmarks Volunteer Spotlight: Sean McCown
Sean McCown has been a part of the CIS Benchmarks community for five years contributing to the new processes and bug fixes of CIS Benchmarks.
cis benchmarks volunteerspotlightseanmccown
https://www.cisecurity.org/insights/blog/cis-benchmarks-community-volunteer-spotlight-touhid-shaikh
CIS Benchmarks Community Volunteer Spotlight: Touhid Shaikh
Touhid Shaikh has done a lot to support effective security controls for cyber defense as a volunteer of the CIS Benchmarks Community. Hear his story.
cis benchmarks communityvolunteer spotlightshaikh
https://www.cisecurity.org/benchmark/talos_linux
CIS Talos Linux Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Talos Linux.
talos linuxcisbenchmarks
https://www.cisecurity.org/benchmark/microsoft_office
CIS Microsoft Office Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Microsoft Office.
cis microsoftofficebenchmarks
https://www.cisecurity.org/benchmark/google_workspace
CIS Google Workspace Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Google Workspace.
cis googleworkspacebenchmarks
https://www.cisecurity.org/insights/webinar/securesuite-platform-benchmarks-dashboard
CIS SecureSuite Platform and the CIS Benchmarks Dashboard
Learn about the CIS Benchmarks Dashboard helps visualize hardening progress over time and turn data into clear, actionable insights.
cis securesuiteplatformbenchmarksdashboard
https://www.cisecurity.org/benchmark/google_chrome
CIS Google Chrome Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Google Chrome.
cis googlechromebenchmarks
https://www.cisecurity.org/benchmark/ibm_db2
CIS IBM Db2 Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for IBM Db2.
cis ibmdb2benchmarks
https://www.cisecurity.org/benchmark/bind
CIS BIND Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for BIND.
cisbindbenchmarks
https://www.cisecurity.org/benchmark/linux_mint
CIS Linux Mint Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Linux Mint.
linux mintcisbenchmarks
https://www.cisecurity.org/benchmark/oracle_linux
CIS Oracle Linux Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Oracle Linux.
oracle linuxcisbenchmarks
https://www.cisecurity.org/benchmark/mozilla_firefox
CIS Mozilla Firefox Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Mozilla Firefox.
mozilla firefoxcisbenchmarks
https://www.cisecurity.org/benchmark/microsoft_365
CIS Microsoft 365 Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Microsoft 365.
cis microsoft365benchmarks
https://www.cisecurity.org/benchmark/apache_http_server
CIS Apache HTTP Server Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Apache HTTP Server.
apache http servercisbenchmarks
https://www.cisecurity.org/benchmark/ubuntu_linux
CIS Ubuntu Linux Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Ubuntu Linux.
ubuntu linuxcisbenchmarks
https://www.cisecurity.org/benchmark/cisco
CIS Cisco Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Cisco.
cisbenchmarks
https://www.cisecurity.org/benchmark/fortinet
CIS Fortinet Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Fortinet.
cisfortinetbenchmarks
https://www.cisecurity.org/benchmark/azure_linux
CIS Azure Linux Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Azure Linux.
azure linuxcisbenchmarks
https://www.cisecurity.org/benchmark/apple_ios
CIS Apple iOS Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Apple iOS.
apple ioscisbenchmarks
https://www.cisecurity.org/benchmark/intune
CIS Microsoft Intune for Microsoft Windows Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Microsoft Intune for Microsoft Windows.
cis microsoftintunewindowsbenchmarks
https://www.cisecurity.org/benchmark/microsoft_internet_explorer
CIS Microsoft Web Browser Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Microsoft Web Browser.
cis microsoftweb browserbenchmarks
https://www.cisecurity.org/benchmark/chromeos
CIS Google ChromeOS Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Google ChromeOS.
cis googlechromeosbenchmarks
https://www.cisecurity.org/benchmark/yugabytedb
CIS YugabyteDB Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for YugabyteDB.
cisyugabytedbbenchmarks
https://www.cisecurity.org/benchmark/palo_alto_networks
CIS Palo Alto Networks Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Palo Alto Networks.
palo alto networkscisbenchmarks
https://www.cisecurity.org/benchmark/alibaba_cloud
CIS Alibaba Cloud Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Alibaba Cloud.
alibaba cloudcisbenchmarks
https://www.cisecurity.org/benchmark/microsoft_windows_server
CIS Microsoft Windows Server Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Microsoft Windows Server.
microsoft windows servercisbenchmarks
https://www.cisecurity.org/benchmark/snowflake
CIS Snowflake Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Snowflake.
cissnowflakebenchmarks
https://www.cisecurity.org/benchmark/apple_os
CIS Apple macOS Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Apple macOS.
apple macoscisbenchmarks
https://www.cisecurity.org/benchmark/ibm_aix
CIS IBM AIX Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for IBM AIX.
cis ibmaixbenchmarks
https://www.cisecurity.org/benchmark/microsoft_exchange_server
CIS Microsoft Exchange Server Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Microsoft Exchange Server.
microsoft exchange servercisbenchmarks
https://www.cisecurity.org/benchmark/mongodb
CIS MongoDB Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for MongoDB.
cismongodbbenchmarks
https://www.cisecurity.org/benchmark/red_hat_linux
CIS Red Hat Enterprise Linux Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Red Hat Enterprise Linux.
red hat enterpriselinux benchmarkscis
https://www.cisecurity.org/benchmark/singlestore
CIS SingleStore Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for SingleStore.
cissinglestorebenchmarks
https://www.cisecurity.org/benchmark/microsoft_365_dyn
CIS Microsoft Dynamics 365 Power Platform Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Microsoft Dynamics 365 Power Platform.
microsoft dynamics 365power platformcisbenchmarks
https://www.cisecurity.org/benchmark/extreme
CIS Extreme Networks Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Extreme Networks.
extreme networkscisbenchmarks
https://www.cisecurity.org/benchmark/microsoft_windows_desktop
CIS Microsoft Windows Desktop Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Microsoft Windows Desktop.
cis microsoftwindows desktopbenchmarks
https://www.cisecurity.org/benchmark/ibm
CIS IBM i Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for IBM i.
cis ibmbenchmarks
https://www.cisecurity.org/benchmark/amazon_linux
CIS Amazon Linux Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Amazon Linux.
amazon linuxcisbenchmarks
https://www.cisecurity.org/benchmark/software-supply-chain-security
CIS Software Supply Chain Security Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Software Supply Chain Security.
software supply chaincissecuritybenchmarks
https://www.cisecurity.org/benchmark/debian_linux
CIS Debian Linux Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Debian Linux.
debian linuxcisbenchmarks
https://www.cisecurity.org/benchmark/stig_bm
CIS DISA STIG Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for DISA STIG.
disa stigcisbenchmarks
https://www.cisecurity.org/benchmark/freebsd
CIS FreeBSD Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for FreeBSD.
cisfreebsdbenchmarks
https://www.cisecurity.org/benchmark/sophos
CIS Sophos Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Sophos.
cissophosbenchmarks
https://www.cisecurity.org/benchmark/microsoft_sql_server
CIS Microsoft SQL Server Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Microsoft SQL Server.
microsoft sql servercisbenchmarks
https://www.cisecurity.org/benchmark/almalinuxos_linux
CIS AlmaLinux OS Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for AlmaLinux OS.
almalinux oscisbenchmarks
https://www.cisecurity.org/benchmark/oracle_database
CIS Oracle Database Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Oracle Database.
oracle databasecisbenchmarks
https://www.cisecurity.org/benchmark/rocky_linux
CIS Rocky Linux Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Rocky Linux.
rocky linuxcisbenchmarks
https://www.cisecurity.org/benchmark/websphere
CIS IBM WebSphere Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for IBM WebSphere.
cis ibmwebspherebenchmarks
https://www.cisecurity.org/benchmark/google_android
CIS Google Android Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Google Android.
cis googleandroid benchmarks
https://www.cisecurity.org/benchmark/postgresql
CIS PostgreSQL Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for PostgreSQL.
cispostgresqlbenchmarks
https://www.cisecurity.org/benchmark/suse_linux
CIS SUSE Linux Enterprise Server Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for SUSE Linux Enterprise Server.
suse linux enterpriseserver benchmarkscis
https://www.cisecurity.org/benchmark/microsoft_iis
CIS Microsoft IIS Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Microsoft IIS.
cis microsoftiisbenchmarks
https://www.cisecurity.org/benchmark/safari_browser
CIS Safari Browser Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Safari Browser.
browser benchmarkscissafari
https://www.cisecurity.org/benchmark/ibm_cloud
CIS IBM Cloud Foundations Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for IBM Cloud Foundations.
cis ibmcloud foundationsbenchmarks
https://www.cisecurity.org/benchmark/juniper
CIS Juniper Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Juniper.
cisjuniperbenchmarks
https://www.cisecurity.org/benchmark/vmware
CIS VMware Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for VMware.
cisvmwarebenchmarks
https://www.cisecurity.org/benchmark/f5
CIS F5 Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for F5.
cisf5benchmarks
https://www.cisecurity.org/benchmark/kubernetes
CIS Kubernetes Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Kubernetes.
ciskubernetesbenchmarks
https://www.cisecurity.org/benchmark/nginx
CIS NGINX Benchmarks
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for NGINX.
cisnginxbenchmarks