CINXE.COM

CIS Center for Internet Security

<!DOCTYPE html><html data-unhead-vue-server-rendered lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width,initial-scale=1"><meta name="VirtualFolder" content="/"><link rel="apple-touch-icon" sizes="180x180" href="/dist/cisecurity/img/icons/apple-touch-icon.png"><link rel="icon" type="image/png" sizes="32x32" href="/dist/cisecurity/img/icons/favicon-32x32.png"><link rel="icon" type="image/png" sizes="16x16" href="/dist/cisecurity/img/icons/favicon-16x16.png"><link rel="manifest" href="/dist/cisecurity/img/icons/site.webmanifest.json"><link rel="mask-icon" href="/dist/cisecurity/img/icons/safari-pinned-tab.svg" color="#5bbad5"><link rel="shortcut icon" href="/dist/cisecurity/img/icons/favicon.ico"><link rel="stylesheet" href="https://use.typekit.net/nap2dtl.css"><meta name="msapplication-TileColor" content="#2b5797"><meta name="msapplication-config" content="/dist/cisecurity/img/icons/browserconfig.xml"><meta name="msapplication-TileImage" content="/dist/cisecurity/img/icons/mstile-150x150.png"><meta name="theme-color" content="#ffffff"><script>let hostname=window?.location?.hostname,cookiebotid="2afb1062-6849-4c19-9611-8de94ea8fe6b";!hostname||"www.cisecurity.org"!==hostname&&"www.codemerge.qa.cisecurity.org"!==hostname||(cookiebotid="965d9c8b-6ef3-48b4-ba8f-11d8d9ba39c1"),function(o,e,t,a,c,i){c=e.scripts[0],(i=e.createElement("script")).src="https://consent.cookiebot.com/uc.js",i.id="Cookiebot",i.dataset.cbid=a,i.dataset.blockingmode="auto",i.addEventListener("load",(function(){var o=new CustomEvent("CookiebotLoaded",{bubbles:!0});e.dispatchEvent(o)})),"function"==typeof CookiebotCallback_Loaded&&CookiebotCallback_Loaded(),c.parentNode.insertBefore(i,c)}(0,document,0,cookiebotid)</script><script type="text/plain" data-cookieconsent="marketing" src="https://cdn.optimizely.com/js/28546730169.js"></script><script defer="defer" src="/dist/cisecurity/js/js-cookie/2.2.1/js.cookie.min.js"></script><script defer="defer" src="https://code.jquery.com/jquery-3.6.0.min.js" integrity="sha256-/xUj+3OJU5yExlq6GSYGSHk7tPXikynS7ogEvDej/m4=" crossorigin="anonymous"></script><script defer="defer" src="https://code.jquery.com/jquery-migrate-3.4.0.min.js" integrity="sha256-mBCu5+bVfYzOqpYyK4jm30ZxAZRomuErKEFJFIyrwvM=" crossorigin="anonymous"></script><script>window.addEventListener("CookiebotOnAccept",(function(){Cookiebot.consent.marketing&&-1==document.cookie.indexOf("SC_TRACKING_CONSENT")&&fetch("/api/cookieconsent/giveconsent")}),!1)</script><script defer="defer" type="module" src="/dist/cisecurity/js/chunk-vendors.d092d48f.js"></script><script defer="defer" type="module" src="/dist/cisecurity/js/app.ba8703b1.js"></script><link href="/dist/cisecurity/css/app.86dc5ff1.css" rel="stylesheet"><script defer="defer" src="/dist/cisecurity/js/chunk-vendors-legacy.91ffd89d.js" nomodule></script><script defer="defer" src="/dist/cisecurity/js/app-legacy.b434539a.js" nomodule></script><title>CIS Center for Internet Security</title><link rel="canonical" href="https://www.cisecurity.org"><meta name="description" content="CIS is a forward-thinking nonprofit that harnesses the power of a global IT community to safeguard public and private organizations against cyber threats."><meta name="robots" content="index, follow"><meta property="og:title" content="CIS"><meta property="og:description" content="CIS is a forward-thinking nonprofit that harnesses the power of a global IT community to safeguard public and private organizations against cyber threats."><meta property="og:image" content="/-/jssmedia/project/cisecurity/cisecurity/data/media/img/uploads/2018/10/2.png?h=627&iar=0&w=1200&rev=8360227aff0642578aa9a280beeae154&hash=70CFAB26019F9C3A69F4EB31FDB0CF8A"><meta property="og:image:width" content="1200"><meta property="og:image:height" content="627"><meta property="og:locale" content="en_US"><meta property="og:site_name" content="CIS"><meta property="og:type" content="website"><meta property="article:publisher" content="https://www.facebook.com/CenterforIntSec/"><meta property="twitter:site" content="@CISecurity"><meta property="twitter:creator" content="@CISecurity"><meta property="twitter:title" content="CIS"><meta property="twitter:description" content="CIS is a forward-thinking nonprofit that harnesses the power of a global IT community to safeguard public and private organizations against cyber threats."><meta property="twitter:image" content="/-/jssmedia/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/logo-mobile.svg?h=60&iar=0&w=155&rev=982608d429ea404fa13f0f7d84594a46&hash=10DCBCCEFABF670C33599FF8CFF64E49"><script type="application/ld+json" data-hid="4c21177">{"@context":"https://schema.org","@type":"WebPage","name":"CIS Center for Internet Security","description":"CIS is a forward-thinking nonprofit that harnesses the power of a global IT community to safeguard public and private organizations against cyber threats.","url":"https://www.cisecurity.org","image":"/-/jssmedia/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/logo-mobile.svg?h=60&iar=0&w=155&rev=982608d429ea404fa13f0f7d84594a46&hash=10DCBCCEFABF670C33599FF8CFF64E49","publisher":{"@type":"Organization","name":"Center for Internet Security","telephone":"518-266-3460","description":"The Center for Internet Security, Inc. (CIS®) makes the connected world a safer place\r\nfor people, businesses, and governments through our core competencies of collaboration\r\nand innovation.","url":"https://www.cisecurity.org","sameAs":["https://en.wikipedia.org/wiki/Center_for_Internet_Security","https://www.facebook.com/CenterforIntSec/","https://www.linkedin.com/company/the-center-for-internet-security/","https://www.youtube.com/user/TheCISecurity/","https://twitter.com/CISecurity/"],"address":{"@type":"PostalAddress","addressCountry":"US","addressRegion":"NY","addressLocality":"East Greenbush","postalCode":"12061","streetAddress":"31 Tech Valley Drive"},"contactPoint":[{"@type":"ContactPoint","contactType":"customer service","telephone":"518-266-3460"},{"@type":"ContactPoint","contactType":"cybersecurity incident","telephone":"866-787-4722"}]}}</script><script type="application/ld+json" data-hid="7fe4905">{"@context":"https://schema.org","@type":"WebSite","name":"Center for Internet Security","url":"https://www.cisecurity.org","potentialAction":{"@type":"SearchAction","target":"https://www.cisecurity.org/search?s={search_term_string}","query-input":"required name=search_term_string"},"publisher":{"@type":"Organization","name":"Center for Internet Security","telephone":"518-266-3460","description":"The Center for Internet Security, Inc. (CIS®) makes the connected world a safer place\r\nfor people, businesses, and governments through our core competencies of collaboration\r\nand innovation.","url":"https://www.cisecurity.org","sameAs":["https://en.wikipedia.org/wiki/Center_for_Internet_Security","https://www.facebook.com/CenterforIntSec/","https://www.linkedin.com/company/the-center-for-internet-security/","https://www.youtube.com/user/TheCISecurity/","https://twitter.com/CISecurity/"],"address":{"@type":"PostalAddress","addressCountry":"US","addressRegion":"NY","addressLocality":"East Greenbush","postalCode":"12061","streetAddress":"31 Tech Valley Drive"},"contactPoint":[{"@type":"ContactPoint","contactType":"customer service","telephone":"518-266-3460"},{"@type":"ContactPoint","contactType":"cybersecurity incident","telephone":"866-787-4722"}]}}</script></head><body ><noscript>You need to enable JavaScript to run this app.</noscript><div id="root"><!--[--><div class="d-flex flex-column" data-v-2559b02d><!----></div><div class="c-site" data-v-c7dc94ea><!----><!----><!----><!----><!----><!----><div class="c-site__banner" data-v-c7dc94ea><!--[--><!--[--><div data-v-c7dc94ea data-v-0c4ecea4><!--[--><div data-v-0c4ecea4><div class="c-banner" data-v-0c4ecea4><div class="c-banner__content" data-v-0c4ecea4><p>Make your cyber defense strong | <a href="/cis-securesuite">Save up to 20% on CIS SecureSuite</a></p></div><button class="c-banner__close" data-v-0c4ecea4></button></div></div><!--]--></div><!--]--><!--]--></div><header class="c-site__header" role="banner" data-v-c7dc94ea><div class="jss-placeholder" data-v-c7dc94ea><!--[--><!--[--><div data-v-c7dc94ea><a class="c-site__logo" href="/" target><!----><img alt="CIS Logo - Celebrating 25 Years" width="300" height="86" class="c-site__logo--d" src="/-/jssmedia/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2025/cis--25th-anniversary-logo--web.svg?h=86&amp;iar=0&amp;w=300&amp;rev=ec127358b1ac42d884392dbf74a65765&amp;hash=2343C2EE3A911502D0428AD7666AC5FF"></a><div class="c-site__nav-container"><div class="c-site__nav-container-padding"><div class="c-nav-controls"><button type="button" class="c-button__close" aria-label="Mobile Close Menu Button"></button></div><div class="c-header-utility" aria-label="Utility Navigation"><div class="c-header-utility__item"><!--[--><a class="c-header-utility__link c-header-utility__security" href="/cis-hardened-image-list" title target data-v-55e17df8>CIS Hardened Images®</a><a class="c-header-utility__link c-header-utility__support" href="/support" target data-v-55e17df8>Support</a><a class="c-header-utility__link c-header-utility__signin" href="https://workbench.cisecurity.org/" target data-v-55e17df8>CIS WorkBench Sign In</a><!--]--></div><!--[--><div class="c-header-utility__item c-alert" data-v-47d70404><div class="c-alert__level--blue c-alert__title" data-v-47d70404> Alert Level: <span class="c-alert__option" data-v-47d70404>guarded</span><span class="c-alert__button" data-v-47d70404></span></div><!----></div><!--]--></div><nav class="c-nav" role="navigation" aria-label="Main Navigation"><div class="c-nav__list"><!--[--><div class="" data-v-0e09efec><div class="c-nav__item" data-v-0e09efec><a class="c-nav__link" aria-haspopup="true" aria-expanded="false" href="/#/" title data-v-0e09efec>Company</a><div class="company c-nav-dropdown" aria-label="submenu" data-v-0e09efec><div class="c-nav-dropdown__container" data-v-0e09efec><div class="c-nav-controls" data-v-0e09efec><button type="button" class="c-button__back" data-v-0e09efec> Back </button><button type="button" class="c-button__close" aria-label="Mobile Back Button" data-v-0e09efec></button></div><span class="c-nav-dropdown__nav-title" data-v-0e09efec>Company</span><div class="c-nav-content" data-v-0e09efec><!--[--><div data-v-0e09efec><div class="c-nav-dropdown__content"><span class="c-nav-dropdown__headline">Who We Are</span><span class="c-nav-dropdown__text">CIS is an independent, nonprofit organization with a mission to create confidence in the connected world.</span></div><div class="c-nav-dropdown__divider"></div><div class="c-nav-dropdown__links"><div class="c-link-list"><!--[--><div class="c-link-list__item"><a class="c-link-list__link" href="/about-us" title>About Us</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/about-us/cis-leadership-principles" title>Leadership Principles</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/about-us/leadership" title>Leadership Team</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/testimonials" title>Testimonials</a><!----></div><!--]--></div><div class="c-link-list"><!--[--><div class="c-link-list__item"><a class="c-link-list__link" href="/about-us/media" title>Media</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/event-calendar" title>Events</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="https://learn.cisecurity.org/contact-us" target>Contact Us</a><!----></div><!--]--></div><div class="c-link-list-bottom"><!----></div></div></div><!--]--></div></div></div></div></div><div class="" data-v-0e09efec><div class="c-nav__item" data-v-0e09efec><a class="c-nav__link" aria-haspopup="true" aria-expanded="false" href="/" target data-v-0e09efec>Solutions</a><div class="solutions c-nav-dropdown" aria-label="submenu" data-v-0e09efec><div class="nav-full-width c-nav-dropdown__container" data-v-0e09efec><div class="c-nav-controls" data-v-0e09efec><button type="button" class="c-button__back" data-v-0e09efec> Back </button><button type="button" class="c-button__close" aria-label="Mobile Back Button" data-v-0e09efec></button></div><span class="c-nav-dropdown__nav-title" data-v-0e09efec>Solutions</span><div class="c-nav-content" data-v-0e09efec><!--[--><div class="u-flex-full" data-v-0e09efec data-v-7c2506f0><div class="c-nav-dropdown__half" data-v-7c2506f0><!--[--><div class="c-nav-dropdown__links nav-with-icon" data-v-7c2506f0 data-v-edfd60ce><img alt="Icon" width="31" height="40" class="c-nav-dropdown__icon" src="/-/jssmedia/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2023/icon-organization.svg?h=40&amp;iar=0&amp;w=31&amp;rev=3ac90ee26d3e44cb9933bfb4fe833319&amp;hash=4FF5620EF56228514B6F48181861DA2E" data-v-edfd60ce><span class="c-nav-dropdown__headline" data-v-edfd60ce>Secure Your Organization</span><div class="c-link-list-half c-link-list" data-v-edfd60ce><!--[--><div class="c-link-list__item" data-v-edfd60ce><a class="c-link-list__link" href="/controls" title target>CIS Critical Security Controls®</a><span class="c-link-list__desc">Prioritized &amp; simplified best practices</span></div><div class="c-link-list__item" data-v-edfd60ce><a class="c-link-list__link" href="/communities/controls" title>CIS Controls Community</a><span class="c-link-list__desc">Help develop and maintain the Controls</span></div><div class="c-link-list__item" data-v-edfd60ce><a class="c-link-list__link" href="https://learn.cisecurity.org/cis-ram" target>CIS RAM</a><span class="c-link-list__desc">Information security risk assessment method</span></div><div class="c-link-list__item" data-v-edfd60ce><a class="c-link-list__link" href="/controls/cis-controls-self-assessment-tool-cis-csat" title>CIS CSAT</a><span class="c-link-list__desc">Assess &amp; measure Controls implementation</span></div><!--]--></div></div><div class="c-nav-dropdown__links nav-with-icon" data-v-7c2506f0 data-v-edfd60ce><img alt="Icon" width="40" height="35" class="c-nav-dropdown__icon" src="/-/jssmedia/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2023/icon-platform.svg?h=35&amp;iar=0&amp;w=40&amp;rev=02136d0686ec492789175c18a4b66c5a&amp;hash=23239652936B5B2FDAF8108302236485" data-v-edfd60ce><span class="c-nav-dropdown__headline" data-v-edfd60ce>Secure Specific Platforms</span><div class="c-link-list-half c-link-list" data-v-edfd60ce><!--[--><div class="c-link-list__item" data-v-edfd60ce><a class="c-link-list__link" href="/cis-benchmarks" title target>CIS Benchmarks™</a><span class="c-link-list__desc">100+ vendor-neutral configuration guides</span></div><div class="c-link-list__item" data-v-edfd60ce><a class="c-link-list__link" href="/communities/benchmarks" title>CIS Benchmarks Community</a><span class="c-link-list__desc">Develop &amp; update secure configuration guides</span></div><div class="c-link-list__item" data-v-edfd60ce><a class="c-link-list__link" href="/cybersecurity-tools/cis-cat-pro" title>CIS-CAT®Pro</a><span class="c-link-list__desc">Assess system conformance to CIS Benchmarks</span></div><div class="c-link-list__item" data-v-edfd60ce><a class="c-link-list__link" href="/cis-hardened-images" title>CIS Hardened Images®</a><span class="c-link-list__desc">Virtual images hardened to CIS Benchmarks on cloud service provider marketplaces</span></div><!--]--></div></div><div class="c-nav-dropdown__links nav-with-icon" data-v-7c2506f0 data-v-edfd60ce><img alt="Situation" width="40" height="39" class="c-nav-dropdown__icon" src="/-/jssmedia/project/cisecurity/cisecurity/data/media/img/icon-situation.svg?h=39&amp;iar=0&amp;w=40&amp;rev=31c65e64a468409fa01c91555a6f1722&amp;hash=014F2674A177C35CE2D944C2FADDB211" data-v-edfd60ce><span class="c-nav-dropdown__headline" data-v-edfd60ce>Track Specific Threats</span><div class="c-link-list-half c-link-list" data-v-edfd60ce><!--[--><div class="c-link-list__item" data-v-edfd60ce><a class="c-link-list__link" href="/industry" title target>Industries</a><span class="c-link-list__desc">Your industry&#39;s specific threats &amp; needs</span></div><div class="c-link-list__item" data-v-edfd60ce><a class="c-link-list__link" href="/topics" title target>Topics</a><span class="c-link-list__desc">Dive deeper into specific cybersecurity topics</span></div><div class="c-link-list__item" data-v-edfd60ce><a class="c-link-list__link" href="/threatwa" title target>ThreatWA™</a><span class="c-link-list__desc">Insights into emerging cyber &amp; physical threats</span></div><!--]--></div></div><div class="c-nav-dropdown__links nav-with-icon bordered" data-v-7c2506f0><img alt="SecureSuite®" width="41" height="41" class="c-nav-dropdown__icon" src="/-/jssmedia/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2023/icon-securesuite.svg?h=41&amp;iar=0&amp;w=41&amp;rev=c067c575dc7e48fa83e5a052d7029702&amp;hash=C62F23121701C04A864BD48323868003"><!----><div class="c-link-list"><!--[--><div class="c-link-list__item" data-v-0a7ab6bc><div class="text-wrap" data-v-0a7ab6bc><a class="c-link-list__link" href="/cis-securesuite" title target data-v-0a7ab6bc>CIS SecureSuite®</a><span class="c-link-list__desc" data-v-0a7ab6bc>Start secure and stay secure with integrated cybersecurity tools and resources designed to help you implement CIS Benchmarks and CIS Controls</span></div><div class="link-wrap" data-v-0a7ab6bc><a class="c-link-list__link--bottom c-cta--tertiary" href="/cis-securesuite" title data-v-0a7ab6bc>Learn More</a><a class="c-link-list__link--bottom c-cta--tertiary" href="https://enroll.cisecurity.org/memberships/#/" target data-v-0a7ab6bc>Apply Now</a></div></div><!--]--></div></div><!--]--></div><div class="c-nav-dropdown__half" data-v-7c2506f0><div class="nav-with-bg" data-v-7c2506f0><!--[--><div class="c-nav-dropdown__links nav-with-icon" data-v-7c2506f0 data-v-0de28657><img alt="U.S. State, Local, Tribal &amp; Territorial Governments" width="41" height="41" class="c-nav-dropdown__icon" src="/-/jssmedia/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2023/icon-government.svg?h=41&amp;iar=0&amp;w=41&amp;rev=16678d2dab0b478e97bd953706f9e35e&amp;hash=CA5BE4A406ED720D654A7D979527A17F" data-v-0de28657><span class="c-nav-dropdown__headline" data-v-0de28657>U.S. State, Local, Tribal &amp; Territorial Governments</span><div class="c-nav-dropdown__half" data-v-0de28657><div class="c-link-list" data-v-0de28657><!--[--><div data-v-0de28657><span class="c-nav-dropdown__subheadline">Memberships</span></div><div class="c-link-list__item" data-v-0de28657><a class="c-link-list__link" href="/ms-isac" title>MS-ISAC®</a><span class="c-link-list__desc">Cybersecurity resource for SLTT Governments</span></div><div class="c-link-list__item" data-v-0de28657><a class="c-link-list__link" href></a><!----></div><div data-v-0de28657><span class="c-nav-dropdown__subheadline">Elections</span></div><div class="c-link-list__item" data-v-0de28657><a class="c-link-list__link" href="/elections" title>Election Security Tools And Resources</a><span class="c-link-list__desc">Sources to support the cybersecurity needs of the election community</span></div><!--]--></div></div><div class="c-nav-dropdown__half" data-v-0de28657><div class="c-link-list" data-v-0de28657><!--[--><div data-v-0de28657><span class="c-nav-dropdown__subheadline">Services for Members</span></div><div class="c-link-list__item" data-v-0de28657><a class="c-link-list__link" href="/services/albert-network-monitoring" title>Albert Network Monitoring®</a><span class="c-link-list__desc">Cost-effective Intrusion Detection System</span></div><div class="c-link-list__item" data-v-0de28657><a class="c-link-list__link" href="/services/managed-security-services-mss" title>Managed Security Services</a><span class="c-link-list__desc">Security monitoring of enterprises devices</span></div><div class="c-link-list__item" data-v-0de28657><a class="c-link-list__link" href="/services/endpoint-security-services" title>CIS Endpoint Security Services</a><span class="c-link-list__desc">Device-level protection and response</span></div><div class="c-link-list__item" data-v-0de28657><a class="c-link-list__link" href="/services/cis-cybermarket" title>CIS CyberMarket®</a><span class="c-link-list__desc">Savings on training and software</span></div><div class="c-link-list__item" data-v-0de28657><a class="c-link-list__link" href="/services/mdbrplus" title target>Malicious Domain Blocking and Reporting Plus</a><span class="c-link-list__desc">Prevent connection to harmful web domains</span></div><!--]--></div><a class="c-cta--tertiary" href="/services" title data-v-0de28657>View All CIS Services</a></div></div><!--]--></div><a class="c-cta--secondary" href="/cybersecurity-tools" title data-v-7c2506f0>View All Products &amp; Services</a></div></div><!--]--></div></div></div></div></div><div class="" data-v-0e09efec><div class="c-nav__item" data-v-0e09efec><a class="c-nav__link" aria-haspopup="true" aria-expanded="false" href="/insights" title data-v-0e09efec>Insights</a><div class="insights c-nav-dropdown" aria-label="submenu" data-v-0e09efec><div class="nav-full-width c-nav-dropdown__container" data-v-0e09efec><div class="c-nav-controls" data-v-0e09efec><button type="button" class="c-button__back" data-v-0e09efec> Back </button><button type="button" class="c-button__close" aria-label="Mobile Back Button" data-v-0e09efec></button></div><span class="c-nav-dropdown__nav-title" data-v-0e09efec>Insights</span><div class="c-nav-content" data-v-0e09efec><!--[--><div data-v-0e09efec><div class="c-nav-dropdown__content"><span class="c-nav-dropdown__headline">Insights</span><span class="c-nav-dropdown__text">Explore trending articles, expert perspectives, real-world applications, and more from the best minds in cybersecurity and IT.</span></div><div class="c-nav-dropdown__divider"></div><div class="c-nav-dropdown__links"><div class="c-link-list"><!--[--><div class="c-link-list__item"><a class="c-link-list__link" href="/advisory" title>Advisories</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/insights/blog" title>Blog</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/insights/case-study" title>Case Studies</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/insights/spotlight" title>Spotlights</a><!----></div><!--]--></div><div class="c-link-list"><!--[--><div class="c-link-list__item"><a class="c-link-list__link" href="/insights/newsletter" title>Newsletters</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/insights/podcast" title>Podcasts</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/insights/webinar" title>Webinars</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/insights/white-papers" title>Whitepapers</a><!----></div><!--]--></div><div class="c-link-list-bottom"><!--[--><div><a class="c-cta--secondary" href="/insights/all" title>View All Insights</a></div><!--]--></div></div></div><!--]--></div></div></div></div></div><div class="" data-v-0e09efec><div class="c-nav__item" data-v-0e09efec><a class="c-nav__link" aria-haspopup="true" aria-expanded="false" href="/" target data-v-0e09efec>Join CIS</a><div class="joincis c-nav-dropdown" aria-label="submenu" data-v-0e09efec><div class="c-nav-dropdown__container" data-v-0e09efec><div class="c-nav-controls" data-v-0e09efec><button type="button" class="c-button__back" data-v-0e09efec> Back </button><button type="button" class="c-button__close" aria-label="Mobile Back Button" data-v-0e09efec></button></div><span class="c-nav-dropdown__nav-title" data-v-0e09efec>Join CIS</span><div class="c-nav-content" data-v-0e09efec><!--[--><div data-v-0e09efec><div class="c-nav-dropdown__content"><span class="c-nav-dropdown__headline">Get Involved</span><span class="c-nav-dropdown__text">Join us on our mission to secure online experiences for all. Become a CIS member, partner, or volunteer—and explore our career opportunities.</span></div><div class="c-nav-dropdown__divider"></div><div class="c-nav-dropdown__links"><div class="c-link-list"><!--[--><div class="c-link-list__item"><a class="c-link-list__link" href="/cis-securesuite" title>CIS SecureSuite® Membership</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/ms-isac" title>Multi-State ISAC (MS-ISAC®)</a><!----></div><div class="c-link-list__item"><!----><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/services/cis-cybermarket/vendor-information" title>CIS CyberMarket® Vendors</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/communities" title>CIS Communities</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/about-us/partners" title target>Our Partners</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="https://careers-cisecurity.icims.com/jobs/search?hashed=-626009842&amp;mobile=false&amp;width=1492&amp;height=500&amp;bga=true&amp;needsRedirect=false&amp;jan1offset=-300&amp;jun1offset=-240" target>Careers</a><!----></div><!--]--></div><div class="c-link-list"><!----></div><div class="c-link-list-bottom"><!----></div></div></div><!--]--></div></div></div></div></div><!--]--></div></nav></div></div><div class="c-site__search"><div class="wrapper"><button type="button" class="c-search-button" aria-label="Search Open Button"></button><input class="c-search-input" placeholder="" aria-label="Search"><button type="button" class="c-search-submit" aria-label="Search Submit Button"></button><button type="button" class="c-search-close" aria-label="Search Close Button"></button></div></div><button type="button" class="c-site__hamburger" aria-label="Mobile Hamburger Button"><span class="hamburger-inner"></span></button></div><!--]--><!--]--></div></header><main class="c-site__main" role="main" data-v-c7dc94ea><div class="jss-placeholder c-site__breadcrumb" data-v-c7dc94ea><!----></div><div class="jss-placeholder c-site__content" data-v-c7dc94ea><!--[--><!----><div class="c-home-masthead" data-v-c7dc94ea data-v-4888a0c2><div class="c-home-masthead__headlines" data-v-4888a0c2><h1 data-v-4888a0c2>Creating Confidence in the Connected World™</h1><h2 data-v-4888a0c2>At CIS®, we’re harnessing the power of the global IT community to safeguard public and private organizations against cyber threats. Join us.</h2></div><div class="c-home-masthead__gradient" data-v-4888a0c2><div class="c-home-masthead__features" data-v-4888a0c2><div class="left" data-v-4888a0c2><!--[--><div class="featured-article padding" data-v-4888a0c2 data-v-17c72024><div class="featured-article__image" data-v-17c72024><img alt="benchmarks-community" width="1800" height="1140" src="/-/jssmedia/project/cisecurity/cisecurity/data/media/img/homepage-featured-space/2025/featurebenchmarks-community2022-03900x570x2.png?h=1140&amp;iar=0&amp;w=1800&amp;rev=554c88c98e2c41469801ff2600faa3c8&amp;hash=9D7454252723181ECF78A3B10B83A87F" data-v-17c72024></div><div class="featured-article__content" data-v-17c72024><span class="label" data-v-17c72024>FEATURED</span><h3 class="featured-article__title" data-v-17c72024>Boost Your Solutions with CIS&#39;s OEM Partner Program </h3><div class="featured-article__intro" data-v-17c72024><p>Help your customers ensure conformance to the industry-leading CIS Benchmarks.</p></div><a class="c-cta--primary" href="/cis-securesuite/pricing-and-categories/product-vendor/cis-oem-partner-program" title target data-v-17c72024>Learn More</a><!----></div></div><!--]--></div><div class="right" data-v-4888a0c2><!--[--><div class="c-industry" data-v-4888a0c2 data-v-161a7264><span class="label" data-v-161a7264>Our Industries</span><h4 class="headline" data-v-161a7264>Cybersecurity threats and solutions by industry</h4><a class="c-cta--tertiary" href="/industry" title target data-v-161a7264>View Industry List</a></div><div class="from-the-blog" data-v-4888a0c2 data-v-dc136d42><div class="from-the-blog__date" data-v-dc136d42><span data-v-dc136d42>From The Blog 04.07.2025</span></div><span class="from-the-blog__title" data-v-dc136d42> FFIEC CAT Sunset: What You Need to Know</span><a class="c-cta--tertiary" href="/insights/blog/ffiec-cat-sunset-what-you-need-know" data-v-dc136d42>Read More</a></div><!--]--></div><div class="bottom" data-v-4888a0c2><!----></div></div><!--[--><div data-v-4888a0c2 data-v-5c6c38f6><div class="c-cards" data-v-5c6c38f6><h2 class="c-cards__title" data-v-5c6c38f6>World-Renowned Best Practices and Expert Communities</h2><div data-v-5c6c38f6><!--[--><div class="c-cards__item" data-v-5c6c38f6><div class="card-image"><img alt="CIS Controls" width="402" height="72" src="/-/jssmedia/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-controls-card.png?h=72&amp;iar=0&amp;w=402&amp;rev=1eed5a8f521542bfbc3ab1b9dd27d95e&amp;hash=62E82999FC492A008DF59E11AB87343B"></div><div class="card-content">Protect your organization from cyber-attacks with globally recognized CIS Controls®, companion guides, and mappings.</div><a class="c-cta--secondary" href="/controls" title>Download &amp; Explore</a><button aria-label="Expand" class="card-expand"></button><!--teleport start--><!--teleport end--></div><div class="c-cards__item" data-v-5c6c38f6><div class="card-image"><img alt="CIS Benchmarks" width="482" height="68" src="/-/jssmedia/project/cisecurity/cisecurity/data/media/img/uploads/2022/11/cis-benchmarks-card.png?h=68&amp;iar=0&amp;w=482&amp;rev=16d3360d8b964603853cfe81b17e05b5&amp;hash=C71B2EF9F671018348E181B9B3306EE4"></div><div class="card-content">Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.</div><a class="c-cta--secondary" href="/cis-benchmarks" title>Download Latest</a><button aria-label="Expand" class="card-expand"></button><!--teleport start--><!--teleport end--></div><div class="c-cards__item" data-v-5c6c38f6><div class="card-image"><img alt="CIS SecureSuite" width="482" height="72" src="/-/jssmedia/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-securesuite-card.png?h=72&amp;iar=0&amp;w=482&amp;rev=0a6e8cbf135c4d319640226604d1947a&amp;hash=49295C7124E40F0A6B8EF1EB82100991"></div><div class="card-content">Secure your organization with resources and tools designed to harness the power of CIS Benchmarks and CIS Controls.</div><a class="c-cta--secondary" href="/cis-securesuite" title>Learn More</a><button aria-label="Expand" class="card-expand"></button><!--teleport start--><!--teleport end--></div><div class="c-cards__item" data-v-5c6c38f6><div class="card-image"><img alt="MS-ISAC logo" width="300" height="67" src="/-/jssmedia/project/cisecurity/cisecurity/data/media/img/uploads/2017/12/logo-ms-isac-r-300x67.png?h=67&amp;iar=0&amp;w=300&amp;rev=fe05725bbca44980891fca948125bc9f&amp;hash=3A3479FC99CCE47FADAF796F448A3EEA"></div><div class="card-content">Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.</div><a class="c-cta--secondary" href="/isac" title>Learn More</a><button aria-label="Expand" class="card-expand"></button><!--teleport start--><!--teleport end--></div><!--]--></div></div></div><!--]--></div></div><div class="home-blockquote" data-v-c7dc94ea><div class="home-blockquote__title"><h2>What The Experts Are Saying</h2></div><div class="home-blockquote__quotes"><div class="splide" aria-label="Quotes"><div class="splide__track"><ul class="splide__list"><!--[--><!--[--><!--[--><li class="splide__slide"><!--[--><div class="home-blockquote-item" data-v-c7dc94ea data-v-d12e3600><div class="home-blockquote-item__quote" data-v-d12e3600>The CIS Controls® take the background and knowledge of cybersecurity experts literally around the world and help focus efforts on things that are of most value. Directly impacting the adversaries and challenges we face today on our networks.</div><div class="home-blockquote-item__name" data-v-d12e3600>Harley Parkes</div><div data-v-d12e3600><span class="home-blockquote-item__title" data-v-d12e3600>Director</span><span data-v-d12e3600>, </span><span class="home-blockquote-item__organization" data-v-d12e3600>ACD (Integrated Adaptive Cyber Defense)</span></div></div><!--]--></li><li class="splide__slide"><!--[--><div class="home-blockquote-item" data-v-c7dc94ea data-v-d12e3600><div class="home-blockquote-item__quote" data-v-d12e3600>Without this resource, the hardening of our devices would have taken a lot longer and required many meetings between IT and Security to debate which configuration settings to change and the impact they could have. The CIS Benchmarks™ provided the necessary information to alleviate many of the fears IT may have had with changing specific settings.</div><div class="home-blockquote-item__name" data-v-d12e3600>Adam</div><div data-v-d12e3600><span class="home-blockquote-item__title" data-v-d12e3600>Banking Information Security Engineer</span><!----><!----></div></div><!--]--></li><li class="splide__slide"><!--[--><div class="home-blockquote-item" data-v-c7dc94ea data-v-d12e3600><div class="home-blockquote-item__quote" data-v-d12e3600>We work with sensitive information on a daily basis. The CIS Controls® along with CIS-CAT® Pro, a proven and indispensable tool, helps us to evaluate and maintain a security baseline for our IT infrastructure.</div><div class="home-blockquote-item__name" data-v-d12e3600>Sasawat Malaivongs</div><div data-v-d12e3600><span class="home-blockquote-item__title" data-v-d12e3600>Business Director</span><span data-v-d12e3600>, </span><span class="home-blockquote-item__organization" data-v-d12e3600>ACinfotec</span></div></div><!--]--></li><!--]--><!--]--><!--]--></ul></div></div></div></div><div class="featured-cta" data-v-c7dc94ea data-v-81763b76><div class="featured-cta__img" data-v-81763b76><a class="" href="/communities/controls" title="CIS Controls Community" data-v-81763b76><!----><img alt=" " width="400" height="118" src="/-/jssmedia/project/cisecurity/cisecurity/data/media/img/homepage-featured-space/2022/homepage-controls-community.png?h=118&amp;iar=0&amp;w=400&amp;rev=fac50a0f5b6544cb8ff157ffdc089678&amp;hash=DC12AFCE3FA1501CC95B595374B5CA4D" data-v-81763b76></a><a class="" href="/communities/benchmarks" title data-v-81763b76><!----><img alt=" " width="400" height="114" src="/-/jssmedia/project/cisecurity/cisecurity/data/media/img/homepage-featured-space/2022/homepage-benchmarks-community.png?h=114&amp;iar=0&amp;w=400&amp;rev=498de6d6d6724375b4671230afa70722&amp;hash=C2EBFC266F9DD00C08CDC1ADAD5B6E6A" data-v-81763b76></a></div><div class="featured-cta__text" data-v-81763b76><h2 class="cta-title" data-v-81763b76>Together, We Can Make a Difference</h2><div class="featured-cta__content" data-v-81763b76>Our CIS Controls and CIS Benchmarks communities connect IT security practitioners from around the globe to help secure our ever-changing world. Our Ambassadors champion the CIS best practices, making it easier for enterprises everywhere to strengthen their cyber defenses and streamline their compliance efforts. We hope you’ll add your voice.</div><a class="c-cta--secondary" href="/communities" title data-v-81763b76>Learn More</a></div></div><div data-v-c7dc94ea><div class="rich-text-home"> <h2>Our Commitment&nbsp;</h2> <p class="c-intro-text">CIS operates as a mission driven, nonprofit organization dedicated to making the connected world a safer place. Our employees adhere to our <a rel="noopener noreferrer" href="https://learn.cisecurity.org/code-of-ethics" target="_blank">Code of Ethics</a>, <a href="/about-us/cis-leadership-principles">Leadership Principles</a>, and <a rel="noopener noreferrer" href="https://learn.cisecurity.org/code-of-conduct" target="_blank">Code of Conduct</a>, consistent with our collaborative, nonpartisan, vendor-agnostic operating model. These values guide our decisions and actions and build trust in our capabilities, enabling us to achieve our mission.</p> <a class="c-cta--secondary" href="/about-us">About Us</a>&nbsp;</div></div></div><!--]--></div><div class="jss-placeholder c-site__infoHub" data-v-c7dc94ea><!--[--><div class="c-infohub home" data-v-c7dc94ea><div class="c-infohub__header"><h2>Information Hub</h2><h3>What&#39;s New</h3><!----></div><div class="c-infohub__inner"><!--[--><div class="c-infohub-link"><div class="c-infohub-link__header"><span class="c-infohub-link__type">Blog Post</span><span class="c-infohub-link__date">04.07.2025</span></div><div class="c-infohub-link__inner"><a href="/insights/blog/ffiec-cat-sunset-what-you-need-know"> FFIEC CAT Sunset: What You Need to Know</a></div><div class="c-infohub-link__footer"><a href="/insights/blog/ffiec-cat-sunset-what-you-need-know">Read More</a></div></div><div class="c-infohub-link"><div class="c-infohub-link__header"><span class="c-infohub-link__type">Advisory</span><span class="c-infohub-link__date">04.03.2025</span></div><div class="c-infohub-link__inner"><a href="/advisory/multiple-vulnerabilities-in-mozilla-products-could-allow-for-arbitrary-code-execution_2025-035">Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution</a></div><div class="c-infohub-link__footer"><a href="/advisory/multiple-vulnerabilities-in-mozilla-products-could-allow-for-arbitrary-code-execution_2025-035">Read More</a></div></div><div class="c-infohub-link"><div class="c-infohub-link__header"><span class="c-infohub-link__type">Advisory</span><span class="c-infohub-link__date">04.03.2025</span></div><div class="c-infohub-link__inner"><a href="/advisory/a-vulnerability-in-ivanti-products-could-allow-for-remote-code-execution_2025-034">A Vulnerability in Ivanti Products Could Allow for Remote Code Execution</a></div><div class="c-infohub-link__footer"><a href="/advisory/a-vulnerability-in-ivanti-products-could-allow-for-remote-code-execution_2025-034">Read More</a></div></div><div class="c-infohub-link"><div class="c-infohub-link__header"><span class="c-infohub-link__type">White Paper</span><span class="c-infohub-link__date">03.24.2025</span></div><div class="c-infohub-link__inner"><a href="/insights/white-papers/cis-controls-v8-1-mapping-to-ncsc-cyber-essentials-v3-1">CIS Controls v8.1 Mapping to NCSC Cyber Essentials v3.1</a></div><div class="c-infohub-link__footer"><a href="/insights/white-papers/cis-controls-v8-1-mapping-to-ncsc-cyber-essentials-v3-1">Read More</a></div></div><!--]--></div></div><!--]--></div></main><footer class="c-site__footer" role="contentinfo" data-v-c7dc94ea><div class="jss-placeholder" data-v-c7dc94ea><!--[--><!--[--><div class="c-footer" data-v-c7dc94ea data-v-5689c325><nav class="c-footer__nav" aria-label="Footer Navigation" data-v-5689c325><div data-v-5689c325><!--[--><div class="c-nav__list" data-v-5689c325><a class="c-nav__header" href="/about-us" title>About</a><div class="c-link-list-container"><div class="c-link-list"><!--[--><div class="c-link-list__item"><a class="c-link-list__link" href="/about-us/leadership" title>Leadership</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/about-us/board" title>Board</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/communities" title>Communities</a></div><div class="c-link-list__item"><a class="c-link-list__link" rel="noopener noreferrer" href="https://careers-cisecurity.icims.com/" target>Careers</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/about-us/media" title>Media</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/testimonials" title>Testimonials</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/event-calendar" title>Events</a></div><div class="c-link-list__item"><a class="c-link-list__link" rel="noopener noreferrer" href="http://www.uscyberchallenge.org/" target>US Cyber Challenge</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/support" title>Support</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="https://learn.cisecurity.org/contact-us" target>Contact</a></div><!--]--></div></div></div><div class="c-nav__list" data-v-5689c325><a class="c-nav__header" href="/cybersecurity-tools" title>Products And Tools</a><div class="c-link-list-container"><div class="c-link-list"><!--[--><div class="c-link-list__item"><a class="c-link-list__link" href="/controls" title target>CIS Critical Security Controls®</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/cis-benchmarks" title target>CIS Benchmarks®</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/cis-hardened-images" title>CIS Hardened Images®</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/cis-securesuite" title>CIS SecureSuite®</a></div><div class="c-link-list__item c-link-list__item--spacer"></div><div class="c-link-list__item"><a class="c-link-list__link" href="https://learn.cisecurity.org/cis-cat-lite" target>CIS-CAT®Lite</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/cybersecurity-tools/cis-cat-pro" title>CIS-CAT®Pro</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="https://learn.cisecurity.org/cis-ram" target>CIS RAM</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/controls/cis-controls-self-assessment-tool-cis-csat" title>CIS CSAT</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="https://workbench.cisecurity.org/" target>CIS WorkBench</a></div><div class="c-link-list__item c-link-list__item--spacer"></div><div class="c-link-list__item"><a class="c-link-list__link" href="/threatwa" title target>ThreatWA™</a></div><!--]--></div></div></div><div class="c-nav__list" data-v-5689c325><a class="c-nav__header" href="/isac" title>For SLTT Governments</a><div class="c-link-list-container"><div class="c-link-list"><!--[--><div class="c-link-list__item"><a class="c-link-list__link" href="/ms-isac" title>MS-ISAC®</a></div><div class="c-link-list__item"><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/elections" title>Election Resources</a></div><div class="c-link-list__item c-link-list__item--spacer"></div><div class="c-link-list__item"><a class="c-link-list__link" href="/services" title target>CIS Services®</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/services/albert-network-monitoring" title>Albert Network Monitoring</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/services/managed-security-services-mss" title>Managed Security Services</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/services/endpoint-security-services" title>Endpoint Security Services</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/services/mdbrplus" title target>Malicious Domain Blocking and Reporting Plus</a></div><div class="c-link-list__item c-link-list__item--spacer"></div><div class="c-link-list__item"><a class="c-link-list__link" href="/services/cis-cybermarket" title>CIS CyberMarket®</a></div><!--]--></div></div></div><div class="c-nav__list" data-v-5689c325><a class="c-nav__header" href="/insights" title>Explore</a><div class="c-link-list-container"><div class="c-link-list"><!--[--><div class="c-link-list__item"><a class="c-link-list__link" href="/insights/blog" title>Blog</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/insights/white-papers" title>Whitepapers</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/insights/newsletter" title>Newsletters</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/insights/webinar" title>Webinars</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/insights/case-study" title>Case Studies</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/insights/spotlight" title>Spotlights</a></div><div class="c-link-list__item"><a class="c-link-list__link" rel="noopener noreferrer" href="https://www.youtube.com/user/TheCISecurity" target="_blank">Videos</a></div><!--]--></div></div></div><!--]--></div></nav><div class="c-footer__global" data-v-5689c325><div class="c-footer__links" data-v-5689c325><!--[--><p class="c-footer__copyright" data-v-5689c325> Copyright © 2025 Center for Internet Security® </p><a class="c-footer__link" data-v-5689c325 href="/privacy-notice" title target>Privacy Notice</a><!--]--></div><div class="c-footer__social" data-v-5689c325><!--[--><a class="c-footer__icon twitter" rel="noopener noreferrer" data-v-5689c325 href="https://twitter.com/CISecurity/" target="_blank">Twitter</a><a class="c-footer__icon facebook" rel="noopener noreferrer" data-v-5689c325 href="https://www.facebook.com/CenterforIntSec/" target="_blank">Facebook</a><a class="c-footer__icon youtube" rel="noopener noreferrer" data-v-5689c325 href="https://www.youtube.com/user/TheCISecurity/" target="_blank">YouTube</a><a class="c-footer__icon linkedin" rel="noopener noreferrer" data-v-5689c325 href="https://www.linkedin.com/company/the-center-for-internet-security/" target="_blank">LinkedIn</a><!--]--></div></div></div><!--]--><!--]--></div></footer><!--[--><!--]--><!--teleport start--><!--teleport end--><!--teleport start--><!--teleport end--></div><!--]--></div><script type="application/json" id="__JSS_STATE__">{"sitecore":{"context":{"pageEditing":false,"site":{"name":"ngen-1"},"pageState":"normal","canonicalUrl":"https:\u002F\u002Fwww.cisecurity.org","language":"en","itemPath":"\u002F","commonRoutes":{"contactDetails":"\u002Fcontact-details","dashboard":"\u002Fdashboard","organizationDirectory":"\u002Fdirectory"}},"route":{"name":"home","displayName":"home","fields":{"canonicalUrl":{"value":""},"cdnMaxAge":{"value":300},"excludeFromSearch":{"value":false},"featuredImage":{"value":{"src":"\u002F-\u002Fjssmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Flogos-and-icons\u002F2022\u002Flogo-mobile.svg?h=60&iar=0&w=155&rev=982608d429ea404fa13f0f7d84594a46&hash=10DCBCCEFABF670C33599FF8CFF64E49","alt":"CIS","width":"155","height":"60"}},"legacyUrl":{"value":""},"pageDescription":{"value":"CIS is a forward-thinking nonprofit that harnesses the power of a global IT community to safeguard public and private organizations against cyber threats."},"pageTitle":{"value":"CIS Center for Internet Security"},"robotsFollow":{"value":true},"robotsIndex":{"value":true},"robotsMaxImagePreview":{"value":""},"robotsMaxSnippet":{"value":""},"robotsMaxVideoPreview":{"value":""},"internalHostnamePatterns":{"value":".*.cisecurity\\.org$\r\n.*localhost$"},"Page Design":null,"articleModifiedTime":{"value":"0001-01-01T00:00:00Z"},"articlePublishedTime":{"value":"0001-01-01T00:00:00Z"},"articlePublisher":{"value":""},"facebookDescription":{"value":""},"facebookImage":{"value":{"src":"\u002F-\u002Fjssmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fuploads\u002F2018\u002F10\u002F2.png?h=627&iar=0&w=1200&rev=8360227aff0642578aa9a280beeae154&hash=70CFAB26019F9C3A69F4EB31FDB0CF8A","alt":"Center for Internet Security","width":"1200","height":"627"}},"facebookLocale":{"value":""},"facebookSiteName":{"value":""},"facebookTitle":{"value":"CIS"},"facebookType":{"value":"website"},"facebookUrl":{"value":""},"twitterCard":{"value":""},"twitterDescription":{"value":""},"twitterImage":{"value":{}},"twitterReadTime":{"value":""},"twitterTitle":{"value":"CIS"},"twitterWrittenBy":{"value":""},"structuredDataDescription":{"value":""},"structuredDataImage":{"value":{}},"structuredDataTitle":{"value":""},"organization":{"id":"040fb806-1ddf-578d-a46e-f0cbe5f6ae39","url":"\u002Fcontent\u002Forganizations\u002Fcis-organization","name":"CIS-Organization","displayName":"CIS Organization","fields":{"contactPoints":[{"id":"35646787-128a-55cc-8c9e-e9f7ee9dcd01","url":"https:\u002F\u002Fwww.cisecurity.org\u002Fcontent\u002Forganizations\u002Fcontactpoints\u002Fcis-contact-point-customer-service","name":"CIS-Contact-Point-Customer-Service","displayName":"CIS Contact Point - Customer Service","fields":{"email":{"value":""},"telephone":{"value":"518-266-3460"},"contactType":{"value":"customer service"}}},{"id":"30467c35-2c29-593d-b5fa-8bd493dcf7d1","url":"https:\u002F\u002Fwww.cisecurity.org\u002Fcontent\u002Forganizations\u002Fcontactpoints\u002Fcis-contact-point-cybersecurity-incident","name":"CIS-Contact-Point-Cybersecurity-Incident","displayName":"CIS Contact Point - Cybersecurity Incident","fields":{"email":{"value":"soc@cisecurity.org"},"telephone":{"value":"866-787-4722"},"contactType":{"value":"cybersecurity incident"}}}],"postalAddress":{"id":"c10c91d4-27e5-52a9-bc77-9f8b773cbd11","url":"\u002Fcontent\u002Forganizations\u002Fpostaladdress\u002Fcis-postaladdress","name":"CIS-PostalAddress","displayName":"CIS Postal Address","fields":{"postalCode":{"value":"12061"},"country":{"value":"US"},"locality":{"value":"East Greenbush"},"region":{"value":"NY"},"street":{"value":"31 Tech Valley Drive"}}},"name":{"value":"Center for Internet Security"},"relatedUrls":{"value":"https:\u002F\u002Fen.wikipedia.org\u002Fwiki\u002FCenter_for_Internet_Security\r\nhttps:\u002F\u002Fwww.facebook.com\u002FCenterforIntSec\u002F\r\nhttps:\u002F\u002Fwww.linkedin.com\u002Fcompany\u002Fthe-center-for-internet-security\u002F\r\nhttps:\u002F\u002Fwww.youtube.com\u002Fuser\u002FTheCISecurity\u002F\r\nhttps:\u002F\u002Ftwitter.com\u002FCISecurity\u002F\r\n"},"telephone":{"value":"518-266-3460"},"url":{"value":"https:\u002F\u002Fwww.cisecurity.org"},"description":{"value":"The Center for Internet Security, Inc. (CIS®) makes the connected world a safer place\r\nfor people, businesses, and governments through our core competencies of collaboration\r\nand innovation.\r\n"},"logo":{"value":{}}}},"structuredDataCustom":{"value":""},"controlsResourceSortOrder":{"value":9999999},"controlsResourceSubcategories":[],"controlsResourceQueryHash":{"value":""},"controlsResourceFilters":[],"controlsResourceTitle":{"value":""}},"databaseName":"web","deviceId":"fe5d7fdf-89c0-4d99-9aa3-b5fbd009c9f3","itemId":"6e72cc69-c129-4c6a-b439-296957f13a11","itemLanguage":"en","itemVersion":23,"layoutId":"c7698a3d-4d25-44d2-8d47-e0c96d6e424f","templateId":"05104a97-4567-4c08-97e7-122d45274800","templateName":"App Route","placeholders":{"jss-banner":[{"uid":"2144986b-b693-4334-8dd7-3663201cd5a0","componentName":"PartialDesignDynamicPlaceholder","dataSource":"","params":{"sid":"{04FBF6E2-C039-4F1C-8C1B-B41CABA5CECA}","ph":"jss-banner","sig":"sxa-banner"},"placeholders":{"sxa-banner":[{"uid":"3c74800e-e981-47df-b975-64e0d73e46ca","componentName":"CIS-Banner","dataSource":"{E43A5261-F26B-4FBA-B0EB-4607E56770C8}","fields":{"content":{"value":"\u003Cp\u003EMake your cyber defense strong | \u003Ca href=\"\u002Fcis-securesuite\"\u003ESave up to 20% on CIS SecureSuite\u003C\u002Fa\u003E\u003C\u002Fp\u003E"}}}]}}],"jss-header":[{"uid":"0d98acf5-fb67-43ac-9508-33123d562d5b","componentName":"PartialDesignDynamicPlaceholder","dataSource":"","params":{"sid":"{16968506-A352-48E5-AA44-4E6A4EA4CA96}","ph":"jss-header","sig":"sxa-header"},"placeholders":{"sxa-header":[{"uid":"328909f8-cbeb-44ef-a4fc-134ea9f6c4f9","componentName":"CIS-Header","dataSource":"{450033B1-BCBB-43F2-87ED-F2E8D2EF6614}","fields":{"logo":{"value":{"src":"\u002F-\u002Fjssmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Flogos-and-icons\u002F2025\u002Fcis--25th-anniversary-logo--web.svg?h=86&iar=0&w=300&rev=ec127358b1ac42d884392dbf74a65765&hash=2343C2EE3A911502D0428AD7666AC5FF","alt":"CIS Logo - Celebrating 25 Years","width":"300","height":"86"}},"logoLink":{"value":{"href":"\u002F","text":"Logo","linktype":"external","url":"\u002F","anchor":"","target":""}},"logoMobile":{"value":{"src":"\u002F-\u002Fjssmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Flogos-and-icons\u002F2025\u002Fcis--25th-anniversary-logo--web.svg?h=86&iar=0&w=300&rev=ec127358b1ac42d884392dbf74a65765&hash=2343C2EE3A911502D0428AD7666AC5FF","alt":"CIS Logo - Celebrating 25 Years","width":"300","height":"86"}}},"placeholders":{"jss-global-links":[{"uid":"2126b36f-d96b-4d5c-842c-11541ddbf375","componentName":"CIS-HeaderUtility-Link","dataSource":"{73B049AB-6C79-4CEF-8FCE-853BD50E6146}","fields":{"link":{"value":{"text":"CIS Hardened Images®","anchor":"","linktype":"internal","class":"c-header-utility__security","title":"","target":"","querystring":"","id":"{17A384ED-7A9D-E228-BE2B-EC5EC762A3F3}","href":"\u002Fcis-hardened-image-list"}}}},{"uid":"b90923e9-4fc7-419e-b99d-e6e3bde67cb7","componentName":"CIS-HeaderUtility-Link","dataSource":"{A3D61712-E370-4901-B7C9-4CE5F08BE2A3}","fields":{"link":{"value":{"linktype":"internal","text":"Support","class":"c-header-utility__support","querystring":"","target":"","id":"{34DDDDA5-FD41-E76F-9829-385B9EF35B03}","href":"\u002Fsupport"}}}},{"uid":"c78f0976-de6c-4dc5-81a7-679fd494eb1e","componentName":"CIS-HeaderUtility-Link","dataSource":"{C6AF05B5-D306-4FCB-A358-D9A14F1EEEC5}","fields":{"link":{"value":{"href":"https:\u002F\u002Fworkbench.cisecurity.org\u002F","linktype":"external","text":"CIS WorkBench Sign In","class":"c-header-utility__signin","url":"https:\u002F\u002Fworkbench.cisecurity.org\u002F","anchor":"","target":""}}}}],"jss-nav":[{"uid":"ed5cf878-93f0-470f-b35f-26445268d7bf","componentName":"CIS-Navigation-Link","dataSource":"{8A1E2376-A4AB-4437-879F-BBAF836A69CB}","fields":{"content":{"value":""},"fullWidth":{"value":false},"link":{"value":{"text":"Company","anchor":"\u002F","linktype":"internal","class":"","title":"","querystring":"","id":"{6E72CC69-C129-4C6A-B439-296957F13A11}","href":"\u002F"}},"title":{"value":"Company"}},"placeholders":{"jss-dropdown":[{"uid":"36f636cb-409a-48f5-968e-755e3b7d9b76","componentName":"CIS-DropDown-ContentWithLinks","dataSource":"{8AAD819E-E56E-459F-9523-0A0A4AFFE503}","fields":{"content":{"value":"CIS is an independent, nonprofit organization with a mission to create confidence in the connected world."},"heading":{"value":"Who We Are"}},"placeholders":{"jss-link":[{"uid":"cb1739f1-5b33-425a-83c7-6baaae630912","componentName":"CIS-List-Link","dataSource":"{3A4B3C38-FAB2-4B8D-BB4C-E0105B310100}","fields":{"description":{"value":""},"link":{"value":{"text":"About Us","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{CE0E4674-2099-1EFD-0872-24554C9B1BDF}","href":"\u002Fabout-us"}}}},{"uid":"0ebaac49-8f14-4235-99a2-bd808684dc78","componentName":"CIS-List-Link","dataSource":"{7E0B5AEC-66A1-4A71-B5E3-C61F123650D5}","fields":{"description":{"value":""},"link":{"value":{"text":"Leadership Principles","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{819935F0-5143-D949-EFE4-8FE50A244B11}","href":"\u002Fabout-us\u002Fcis-leadership-principles"}}}},{"uid":"bee24314-44d4-4ff4-8c5f-2e542cf0ffb6","componentName":"CIS-List-Link","dataSource":"{E413B8F2-7527-47F1-AF16-72EDDCC6BBAF}","fields":{"description":{"value":""},"link":{"value":{"text":"Leadership Team","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{38C7F30C-A0A6-1FCC-B555-0F0B31319356}","href":"\u002Fabout-us\u002Fleadership"}}}},{"uid":"5d62de7e-9cfd-412a-a09c-988c835c9c2f","componentName":"CIS-List-Link","dataSource":"{D0576333-B539-4B02-8C3A-AD80884C6879}","fields":{"description":{"value":""},"link":{"value":{"text":"Testimonials","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{96FDBB45-69F1-2EB3-2D0B-27983F625023}","href":"\u002Ftestimonials"}}}}],"jss-link-second":[{"uid":"87e688ef-b608-4f61-9903-f7f7d5a328bc","componentName":"CIS-List-Link","dataSource":"{C7D0A084-4227-4B5D-B13A-8913C1AF2F24}","fields":{"description":{"value":""},"link":{"value":{"id":"{C44F2D0C-7882-EF48-AAF0-ABD11D4FD831}","querystring":"","text":"Media","anchor":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Fabout-us\u002Fmedia","title":"","class":"","linktype":"internal","href":"\u002Fabout-us\u002Fmedia"}}}},{"uid":"354aab95-9bc5-42c5-b955-c9f2a3e89874","componentName":"CIS-List-Link","dataSource":"{91CF1D26-7AB6-49A3-A6C3-2CC23F90F277}","fields":{"description":{"value":""},"link":{"value":{"text":"Events","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{AF78681B-ADBD-0D67-43E1-A8933FB358B8}","href":"\u002Fevent-calendar"}}}},{"uid":"f3013010-169d-4a55-97d6-318429307a14","componentName":"CIS-List-Link","dataSource":"{33CC2B08-F08F-4D16-BD74-82D8D15C6DBA}","fields":{"description":{"value":""},"link":{"value":{"href":"https:\u002F\u002Flearn.cisecurity.org\u002Fcontact-us","text":"Contact Us","linktype":"external","url":"https:\u002F\u002Flearn.cisecurity.org\u002Fcontact-us","anchor":"","target":""}}}}],"jss-link-bottom":[]}}]}},{"uid":"a85daf89-b69b-4cbf-870e-16091f7dd676","componentName":"CIS-Navigation-Link","dataSource":"{3CF4048D-5468-4562-9D53-5548E34BCF35}","fields":{"content":{"value":""},"fullWidth":{"value":true},"link":{"value":{"href":"\u002F","text":"Solutions","linktype":"external","url":"\u002F","anchor":"","target":""}},"title":{"value":"Solutions"}},"placeholders":{"jss-dropdown":[{"uid":"c70af5ed-ac69-4708-938f-6b05f68e8b68","componentName":"CIS-DropDown-TwoColumn","dataSource":"{9D537D46-D706-45B3-B3B9-6FB2ACBCEF3C}","fields":{"linkRightBottom":{"value":{"text":"View All Products & Services","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{EEAB23B1-CC27-66BC-CB2F-6613F71BEA94}","href":"\u002Fcybersecurity-tools"}}},"placeholders":{"jss-column-left":[{"uid":"9a33d4bc-cf85-4bfc-ae58-68e08b995328","componentName":"CIS-DropDown-LinkSection","dataSource":"{9A662824-EA3A-4396-ACBF-32E1DB1EA03F}","fields":{"heading":{"value":"Secure Your Organization"},"icon":{"value":{"src":"\u002F-\u002Fjssmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Flogos-and-icons\u002F2023\u002Ficon-organization.svg?h=40&iar=0&w=31&rev=3ac90ee26d3e44cb9933bfb4fe833319&hash=4FF5620EF56228514B6F48181861DA2E","alt":"Icon","width":"31","height":"40"}},"listFullWidth":{"value":false}},"placeholders":{"jss-link":[{"uid":"0da76734-47f8-491f-b59a-cccc6ab8102f","componentName":"CIS-List-Link","dataSource":"{E93D3215-333B-46AD-8BB3-B2B53EF53C3F}","fields":{"description":{"value":"Prioritized & simplified best practices"},"link":{"value":{"text":"CIS Critical Security Controls®","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{19BC09D8-ABED-CA6C-9B3B-169405015827}","href":"\u002Fcontrols"}}}},{"uid":"c1165c5c-73fc-4a73-9c15-5b9d2eb0cb6a","componentName":"CIS-List-Link","dataSource":"{AA55B710-CE50-4703-B678-84703152D96B}","fields":{"description":{"value":"Help develop and maintain the Controls"},"link":{"value":{"text":"CIS Controls Community","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{F14FD165-50F4-70A7-D717-B58EFF6B22F5}","href":"\u002Fcommunities\u002Fcontrols"}}}},{"uid":"eec305d5-f4de-4a05-93e1-002dc952fbf5","componentName":"CIS-List-Link","dataSource":"{295443A1-E804-4B38-BF30-A5D4A7BF97B3}","fields":{"description":{"value":"Information security risk assessment method"},"link":{"value":{"href":"https:\u002F\u002Flearn.cisecurity.org\u002Fcis-ram","text":"CIS RAM","linktype":"external","url":"https:\u002F\u002Flearn.cisecurity.org\u002Fcis-ram","anchor":"","target":""}}}},{"uid":"f2ea3e6e-905b-49a2-8bd9-cc0a704174c1","componentName":"CIS-List-Link","dataSource":"{2DE5F28D-4B75-427A-8F52-C40FB56E4175}","fields":{"description":{"value":"Assess & measure Controls implementation"},"link":{"value":{"text":"CIS CSAT","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{E28A0486-04C9-EE4A-D85D-A29A9045942C}","href":"\u002Fcontrols\u002Fcis-controls-self-assessment-tool-cis-csat"}}}}]}},{"uid":"b9c8b9bc-4547-4815-a72c-558cc28152ea","componentName":"CIS-DropDown-LinkSection","dataSource":"{E4C08ADE-58B0-452E-A8C4-18F18F1BD8B6}","fields":{"heading":{"value":"Secure Specific Platforms"},"icon":{"value":{"src":"\u002F-\u002Fjssmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Flogos-and-icons\u002F2023\u002Ficon-platform.svg?h=35&iar=0&w=40&rev=02136d0686ec492789175c18a4b66c5a&hash=23239652936B5B2FDAF8108302236485","alt":"Icon","width":"40","height":"35"}},"listFullWidth":{"value":false}},"placeholders":{"jss-link":[{"uid":"c1f0bb39-67cc-4be6-8eec-116856b737d3","componentName":"CIS-List-Link","dataSource":"{285291D8-B30A-4892-9118-4DF4AF15A8A8}","fields":{"description":{"value":"100+ vendor-neutral configuration guides"},"link":{"value":{"text":"CIS Benchmarks™","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{EEAD5F3F-F889-42AE-555F-AB0B21F4FF01}","href":"\u002Fcis-benchmarks"}}}},{"uid":"e53784f0-487c-4165-9580-cf3483b282e4","componentName":"CIS-List-Link","dataSource":"{FEA7DF03-9545-4D2E-8AD6-7BA46725D7F9}","fields":{"description":{"value":"Develop & update secure configuration guides"},"link":{"value":{"text":"CIS Benchmarks Community","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{E2E60C34-788C-3C5E-B4AB-D9B8D9AEF16D}","href":"\u002Fcommunities\u002Fbenchmarks"}}}},{"uid":"b5f73c72-b943-4992-b71f-2802011e3b51","componentName":"CIS-List-Link","dataSource":"{D4B85B15-8FFD-4423-95FF-AFD5D0AA16AF}","fields":{"description":{"value":"Assess system conformance to CIS Benchmarks"},"link":{"value":{"text":"CIS-CAT®Pro","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{1804D342-98D7-427D-0CB2-01136C37C047}","href":"\u002Fcybersecurity-tools\u002Fcis-cat-pro"}}}},{"uid":"add2f3f9-ca40-4b9a-b8ab-7fb1edf62543","componentName":"CIS-List-Link","dataSource":"{8A97B104-711B-4243-83F4-C1EDAECEB17D}","fields":{"description":{"value":"Virtual images hardened to CIS Benchmarks on cloud service provider marketplaces"},"link":{"value":{"text":"CIS Hardened Images®","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{E7B5656B-D504-03B9-3E90-66CACEFDC5AC}","href":"\u002Fcis-hardened-images"}}}}]}},{"uid":"705a1ccd-9559-4b1e-bc85-7821f24cba41","componentName":"CIS-DropDown-LinkSection","dataSource":"{1F533DE6-7FDD-463F-A560-8EDBBBFAD8E2}","params":{"GridParameters":"col-12","CacheClearingBehavior":"Clear on publish"},"fields":{"heading":{"value":"Track Specific Threats"},"icon":{"value":{"src":"\u002F-\u002Fjssmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Ficon-situation.svg?h=39&iar=0&w=40&rev=31c65e64a468409fa01c91555a6f1722&hash=014F2674A177C35CE2D944C2FADDB211","alt":"Situation","width":"40","height":"39"}},"listFullWidth":{"value":false}},"placeholders":{"jss-link":[{"uid":"a0f636c3-cd4f-4fea-b6cb-52b176d6d239","componentName":"CIS-List-Link","dataSource":"{D4DBA30D-3A50-482C-8AA3-85B4C2B30B83}","params":{"GridParameters":"col-12","CacheClearingBehavior":"Clear on publish"},"fields":{"description":{"value":"Your industry's specific threats & needs"},"link":{"value":{"text":"Industries","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{C8E4AB9D-99F0-463C-8F20-FF8ABA96FB2E}","href":"\u002Findustry"}}}},{"uid":"d3e205e5-29f0-4a78-8646-731a411b0d7f","componentName":"CIS-List-Link","dataSource":"{67046EBF-2368-46AA-B497-7B382BF8A3DE}","params":{"GridParameters":"col-12","CacheClearingBehavior":"Clear on publish"},"fields":{"description":{"value":"Dive deeper into specific cybersecurity topics"},"link":{"value":{"text":"Topics","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{9B71A3D1-6EE5-4B7F-8E6F-11172EDC0E70}","href":"\u002Ftopics"}}}},{"uid":"ea39a547-3b38-458d-810a-9456dc267670","componentName":"CIS-List-Link","dataSource":"{977E12B0-42C9-429A-8616-16D7C6055BC0}","params":{"GridParameters":"col-12","CacheClearingBehavior":"Clear on publish"},"fields":{"description":{"value":"Insights into emerging cyber & physical threats"},"link":{"value":{"text":"ThreatWA™","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{FE080995-4192-4AF4-8065-A5778EA2EB7C}","href":"\u002Fthreatwa"}}}}]}},{"uid":"84de6200-b476-4277-a087-a076ea002b28","componentName":"CIS-DropDown-LinkSection-Bordered","dataSource":"{7FE5ACDA-99FC-490D-9969-D6B1C2625D0F}","fields":{"heading":{"value":""},"icon":{"value":{"src":"\u002F-\u002Fjssmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Flogos-and-icons\u002F2023\u002Ficon-securesuite.svg?h=41&iar=0&w=41&rev=c067c575dc7e48fa83e5a052d7029702&hash=C62F23121701C04A864BD48323868003","alt":"SecureSuite®","width":"41","height":"41"}},"listFullWidth":{"value":true}},"placeholders":{"jss-link":[{"uid":"54bda5c1-72f4-41f3-9aa4-2e59b3daf380","componentName":"CIS-List-Link-Extra-Links","dataSource":"{B714D7A2-3ED3-45C5-8109-C2201314CB64}","fields":{"description":{"value":"Start secure and stay secure with integrated cybersecurity tools and resources designed to help you implement CIS Benchmarks and CIS Controls"},"link":{"value":{"text":"CIS SecureSuite®","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{A4AF0446-1D42-B77C-07A3-E39FBFA059A8}","href":"\u002Fcis-securesuite"}},"linkBottomOne":{"value":{"text":"Learn More","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{A4AF0446-1D42-B77C-07A3-E39FBFA059A8}","href":"\u002Fcis-securesuite"}},"linkBottomTwo":{"value":{"href":"https:\u002F\u002Fenroll.cisecurity.org\u002Fmemberships\u002F#\u002F","text":"Apply Now","linktype":"external","url":"https:\u002F\u002Fenroll.cisecurity.org\u002Fmemberships\u002F#\u002F","anchor":"","target":""}}}}]}}],"jss-column-right":[{"uid":"cfb2ba39-ed8d-49f6-8f21-7ef64cbfdf3c","componentName":"CIS-DropDown-LinkSectionWithBg","dataSource":"{D72FAEFA-3AE5-4624-86B1-30557751C0F5}","fields":{"heading":{"value":"U.S. State, Local, Tribal & Territorial Governments"},"headingLeft":{"value":"Memberships"},"headingLeft_2":{"value":""},"headingRight":{"value":"Services for Members"},"icon":{"value":{"src":"\u002F-\u002Fjssmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Flogos-and-icons\u002F2023\u002Ficon-government.svg?h=41&iar=0&w=41&rev=16678d2dab0b478e97bd953706f9e35e&hash=CA5BE4A406ED720D654A7D979527A17F","alt":"U.S. State, Local, Tribal & Territorial Governments","width":"41","height":"41"}},"link":{"value":{"text":"View All CIS Services","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{2BF3F743-4F7D-2A44-9BA1-426B3A3CFCDD}","href":"\u002Fservices"}},"linkBg":{"value":{"text":"View All CIS Services","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{2BF3F743-4F7D-2A44-9BA1-426B3A3CFCDD}","href":"\u002Fservices"}}},"placeholders":{"jss-bg-left":[{"uid":"9936591d-cb1c-4e0f-ae0b-2efc99a50262","componentName":"CIS-List-Link-Title","dataSource":"{4A882BCE-E4A5-450B-AC2A-611708B9EBDA}","fields":{"heading":{"value":"Memberships"}}},{"uid":"01997673-069c-40b2-82da-97a50a39a88a","componentName":"CIS-List-Link","dataSource":"{74D9205C-915C-45C2-82DC-F72E255FFFA3}","fields":{"description":{"value":"Cybersecurity resource for SLTT Governments"},"link":{"value":{"text":"MS-ISAC®","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{D08DEDA9-3029-4145-7DDB-B71F23291CE5}","href":"\u002Fms-isac"}}}},{"uid":"2bd7b657-50e3-4975-8266-7993bdef3152","componentName":"CIS-List-Link","dataSource":"{A2F2C1C2-E2BC-423A-B7A8-DEC12746ACC5}","fields":{"description":{"value":""},"link":{"value":{"href":""}}}},{"uid":"e8e546d1-fd1c-46be-9539-1d7b65e162b9","componentName":"CIS-List-Link-Title","dataSource":"{E20A50CE-5E81-4B56-8901-1F90571CACE3}","fields":{"heading":{"value":"Elections"}}},{"uid":"0920dc46-9497-4240-bc87-3c2f5dc3ca91","componentName":"CIS-List-Link","dataSource":"{4BC43D06-F4DA-4E88-901E-258B20EE2354}","fields":{"description":{"value":"Sources to support the cybersecurity needs of the election community"},"link":{"value":{"text":"Election Security Tools And Resources","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{BAFE31A6-43F2-4780-8A84-BF0146DF5BD5}","href":"\u002Felections"}}}}],"jss-bg-right":[{"uid":"0628201d-8988-4d62-b289-260aa03f1087","componentName":"CIS-List-Link-Title","dataSource":"{7BB43C52-ED1E-478E-B0DE-3F7325B225E4}","fields":{"heading":{"value":"Services for Members"}}},{"uid":"ee5eeb3f-075b-40e2-80a4-1c3cf08bf273","componentName":"CIS-List-Link","dataSource":"{FA210D02-EA30-45CE-81ED-572882AE5F93}","fields":{"description":{"value":"Cost-effective Intrusion Detection System"},"link":{"value":{"text":"Albert Network Monitoring®","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{B8C5738E-5FD1-C161-683D-3F5C78315E0E}","href":"\u002Fservices\u002Falbert-network-monitoring"}}}},{"uid":"70bed5cf-edf6-40eb-8d13-c04a6302d178","componentName":"CIS-List-Link","dataSource":"{BA57CC9E-8D21-4A2C-B833-4980B4A32FDE}","fields":{"description":{"value":"Security monitoring of enterprises devices"},"link":{"value":{"text":"Managed Security Services","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{E8E5D5A9-41BD-E30B-787D-134B9687DFBB}","href":"\u002Fservices\u002Fmanaged-security-services-mss"}}}},{"uid":"03dee259-e087-4707-b107-0baacde1d5d4","componentName":"CIS-List-Link","dataSource":"{3CFFA584-409D-4428-A43E-09E37A7B3D9B}","fields":{"description":{"value":"Device-level protection and response"},"link":{"value":{"text":"CIS Endpoint Security Services","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{FEC18F53-D2B1-59FF-1ADB-F7AE386AB4F2}","href":"\u002Fservices\u002Fendpoint-security-services"}}}},{"uid":"77e9bbb8-d5c4-4873-98b2-f65be8d5fcdd","componentName":"CIS-List-Link","dataSource":"{ED9D5296-EE40-4CAF-9195-8FCE68333DFA}","fields":{"description":{"value":"Savings on training and software"},"link":{"value":{"text":"CIS CyberMarket®","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{377369ED-DD43-D165-4A7E-156EBE490770}","href":"\u002Fservices\u002Fcis-cybermarket"}}}},{"uid":"fae63fa0-0e46-4d65-bb7d-5ba38d200cb1","componentName":"CIS-List-Link","dataSource":"{1465AC7B-EDF6-4F98-8840-BCCE1E5C9D95}","fields":{"description":{"value":"Prevent connection to harmful web domains"},"link":{"value":{"text":"Malicious Domain Blocking and Reporting Plus","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{C908677A-58DC-4788-97E1-DDE96D8766C3}","href":"\u002Fservices\u002Fmdbrplus"}}}}]}}]}}]}},{"uid":"7cc9bb04-9f20-42f1-b974-cde5b2c6094d","componentName":"CIS-Navigation-Link","dataSource":"{3D87CDC1-5AE3-4B1F-B95C-6AE07F6EBF71}","fields":{"content":{"value":""},"fullWidth":{"value":true},"link":{"value":{"text":"Insights","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{FB4E12C1-82FC-59D2-90B1-F58388DAACC3}","href":"\u002Finsights"}},"title":{"value":"Insights"}},"placeholders":{"jss-dropdown":[{"uid":"e4a27e4e-9031-4bfe-8bde-7a4123f2efe8","componentName":"CIS-DropDown-ContentWithLinks","dataSource":"{7E6BF5B0-FD02-404C-BA0E-FEAD337CB9EC}","fields":{"content":{"value":"Explore trending articles, expert perspectives, real-world applications, and more from the best minds in cybersecurity and IT."},"heading":{"value":"Insights"}},"placeholders":{"jss-link":[{"uid":"a88bb037-4188-4743-aeff-571c3f7ddfed","componentName":"CIS-List-Link","dataSource":"{28C31E26-1C34-4DCA-B662-C1C3064C860B}","fields":{"description":{"value":""},"link":{"value":{"text":"Advisories","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{977EDD7F-F11F-5770-ADD2-C7E2CA47B471}","href":"\u002Fadvisory"}}}},{"uid":"7afae56c-6aa3-4808-9323-24b3efdd4587","componentName":"CIS-List-Link","dataSource":"{F203FE56-AC25-409E-8E47-E2C7193CDAA9}","fields":{"description":{"value":""},"link":{"value":{"id":"{A699BE35-8674-5BE8-B3F4-C9769391F6FE}","querystring":"","text":"Blog","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights\u002Fblog","linktype":"internal","href":"\u002Finsights\u002Fblog"}}}},{"uid":"362d9a7f-c77e-481a-ab84-b4e71d2b77cd","componentName":"CIS-List-Link","dataSource":"{55CDE8FF-0116-482A-9D5A-0D6A4F396BAC}","fields":{"description":{"value":""},"link":{"value":{"id":"{2992CF52-4336-5643-BB61-EB5BF0A5DB2A}","querystring":"","text":"Case Studies","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights\u002Fcase-study","linktype":"internal","href":"\u002Finsights\u002Fcase-study"}}}},{"uid":"46693bbb-2607-4400-817a-669114598530","componentName":"CIS-List-Link","dataSource":"{2E11D16A-402E-4C9F-9AA3-6D0E66CB1B9C}","fields":{"description":{"value":""},"link":{"value":{"id":"{19FA18AC-9BBF-569D-AB84-45572D276F62}","querystring":"","text":"Spotlights","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights\u002Fspotlight","linktype":"internal","href":"\u002Finsights\u002Fspotlight"}}}}],"jss-link-second":[{"uid":"9632edf6-b084-42cf-b688-8feef21a06ed","componentName":"CIS-List-Link","dataSource":"{AF8DEABD-3EA5-4442-AFE4-2B7453F03C7F}","fields":{"description":{"value":""},"link":{"value":{"id":"{11C8CCFC-833F-576D-AF85-2C37560B1A67}","querystring":"","text":"Newsletters","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights\u002Fnewsletter","linktype":"internal","href":"\u002Finsights\u002Fnewsletter"}}}},{"uid":"a0ea545f-7d6d-43f4-891e-bfbdae1a3823","componentName":"CIS-List-Link","dataSource":"{DE522F3E-4549-4E11-AC31-389B394BDB59}","fields":{"description":{"value":""},"link":{"value":{"text":"Podcasts","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{02EAD54A-71B4-5BE2-9E78-83925450A1B3}","href":"\u002Finsights\u002Fpodcast"}}}},{"uid":"893e2d06-8485-4226-9c68-be0baf841f8d","componentName":"CIS-List-Link","dataSource":"{B828F752-13CE-4AE1-AA69-4BA39E9D9276}","fields":{"description":{"value":""},"link":{"value":{"id":"{F07F8DAA-8808-5FB4-BB19-1D0F5E5D8D9D}","querystring":"","text":"Webinars","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights\u002Fwebinar","linktype":"internal","href":"\u002Finsights\u002Fwebinar"}}}},{"uid":"704694f4-71e5-49a1-9448-82845348f643","componentName":"CIS-List-Link","dataSource":"{B7368F49-B590-45C3-992C-84974D94DC4D}","fields":{"description":{"value":""},"link":{"value":{"text":"Whitepapers","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{C74111A6-95B5-5A9E-A5DF-2E2A7D2884F9}","href":"\u002Finsights\u002Fwhite-papers"}}}}],"jss-link-bottom":[{"uid":"c7360426-3aaf-47f8-a97c-69c17bcbe335","componentName":"CIS-CTA-Secondary","dataSource":"{1DDC74DF-F8F7-4054-AA7A-AC7197A4F113}","fields":{"cta":{"value":{"text":"View All Insights","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{AA1576EB-41D5-5908-8670-7482A60EF2FE}","href":"\u002Finsights\u002Fall"}}}}]}}]}},{"uid":"210d76b3-a08a-4575-9c45-f573ce6634dc","componentName":"CIS-Navigation-Link","dataSource":"{709FA9B7-B6BB-43E9-8338-2292C3A1F8DE}","fields":{"content":{"value":""},"fullWidth":{"value":false},"link":{"value":{"href":"\u002F","text":"Join CIS","linktype":"external","url":"\u002F","anchor":"","target":""}},"title":{"value":"Join CIS"}},"placeholders":{"jss-dropdown":[{"uid":"9e7ad4da-90d4-4b39-b24b-06754d51dcb6","componentName":"CIS-DropDown-ContentWithLinks","dataSource":"{2D08E60E-967F-4BC0-96EA-E81EB0647361}","fields":{"content":{"value":"Join us on our mission to secure online experiences for all. Become a CIS member, partner, or volunteer—and explore our career opportunities."},"heading":{"value":"Get Involved"}},"placeholders":{"jss-link":[{"uid":"3997df11-bd24-421a-898c-56364f1c2c07","componentName":"CIS-List-Link","dataSource":"{6B8F8747-7ED6-4238-83C9-D05FE3636413}","fields":{"description":{"value":""},"link":{"value":{"text":"CIS SecureSuite® Membership","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{A4AF0446-1D42-B77C-07A3-E39FBFA059A8}","href":"\u002Fcis-securesuite"}}}},{"uid":"643776ab-eefe-46f1-9128-7b918f0ca3a6","componentName":"CIS-List-Link","dataSource":"{F06A46E0-940D-48A3-868A-9DC46B6705EC}","fields":{"description":{"value":""},"link":{"value":{"text":"Multi-State ISAC (MS-ISAC®)","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{D08DEDA9-3029-4145-7DDB-B71F23291CE5}","href":"\u002Fms-isac"}}}},{"uid":"d85631ff-9cf4-485e-afd3-de47bf00b2f6","componentName":"CIS-List-Link","dataSource":"{5926B4E2-A03F-4F82-80FE-3B280C220391}"},{"uid":"1a086d84-0685-4edd-88c7-ec1914466913","componentName":"CIS-List-Link","dataSource":"{2B1A6AD2-4554-41EE-AB08-EEA7E555BCC7}","fields":{"description":{"value":""},"link":{"value":{"text":"CIS CyberMarket® Vendors","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{F4EA8918-FC81-DFEB-4F6C-95111021DD73}","href":"\u002Fservices\u002Fcis-cybermarket\u002Fvendor-information"}}}},{"uid":"367d33a8-9fdf-4368-8bf6-42ec6fa87b60","componentName":"CIS-List-Link","dataSource":"{3BDE9CF1-7D21-4B68-AAD4-8410098D4E9F}","fields":{"description":{"value":""},"link":{"value":{"text":"CIS Communities","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{C8DE7E1E-6D97-4675-2B7C-D7D191BE4FD1}","href":"\u002Fcommunities"}}}},{"uid":"35bd8a07-f453-4ce3-8055-9d0826c88a8d","componentName":"CIS-List-Link","dataSource":"{88898152-6DEF-45B1-B2EC-096F49D7166C}","params":{"GridParameters":"col-12","CacheClearingBehavior":"Clear on publish"},"fields":{"description":{"value":""},"link":{"value":{"text":"Our Partners","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{F8D81986-CDC6-4500-8136-41272AD67DDE}","href":"\u002Fabout-us\u002Fpartners"}}}},{"uid":"ae84ead0-c256-4bf0-85ed-d2515a58d091","componentName":"CIS-List-Link","dataSource":"{72A11957-58AD-43F6-A3F2-4A061683EC8D}","fields":{"description":{"value":""},"link":{"value":{"href":"https:\u002F\u002Fcareers-cisecurity.icims.com\u002Fjobs\u002Fsearch?hashed=-626009842&mobile=false&width=1492&height=500&bga=true&needsRedirect=false&jan1offset=-300&jun1offset=-240","text":"Careers","linktype":"external","url":"https:\u002F\u002Fcareers-cisecurity.icims.com\u002Fjobs\u002Fsearch?hashed=-626009842&mobile=false&width=1492&height=500&bga=true&needsRedirect=false&jan1offset=-300&jun1offset=-240","anchor":"","target":""}}}}],"jss-link-second":[],"jss-link-bottom":[]}}]}}],"jss-alert":[{"uid":"be66fe6c-f368-42d0-a2a3-626fc41b05c0","componentName":"CIS-Alert","dataSource":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002FPresentation\u002FPartial Designs\u002FHeader\u002FData\u002FAlert","fields":{"alert":{"id":"a2b3d6ff-dd6a-411a-b3d9-bbcd6ef49a9c","url":"\u002Fcontent\u002Falertlevel\u002Falert_level","name":"alert_level","displayName":"Alert Level","fields":{"alertLevelDescription":{"value":"On April 2, the Cyber Threat Alert Level was evaluated and is remaining at Blue (Guarded) due to a vulnerability in CrushFTP. On March 27, the MS-ISAC released an advisory for a vulnerability in CrushFTP that could allow for unauthorized access. Organizations and users are advised to update and apply all appropriate vendor security patches to vulnerable systems and to continue to update their antivirus signatures daily. Another line of defense includes user awareness training regarding the threats posed by attachments and hypertext links contained in emails especially from un-trusted sources."},"color":{"value":"BLUE"},"dateIssued":{"value":"2025-04-02T04:00:00Z"},"legacyId":{"value":367},"publishedAt":{"value":"2025-04-02T18:12:58Z"},"threatLevel":{"value":"GUARDED"}}}}}]}}]}}],"jss-breadcrumb":[],"jss-main":[{"uid":"b8c4191a-8e69-432d-9c99-4efc235b19a4","componentName":"CIS-StructuredData-Website","dataSource":"{421FA3B0-86B5-4FA3-9B5C-C3EA02A9A6BD}","params":{"GridParameters":"col-12","CacheClearingBehavior":"Clear on publish"},"fields":{"searchActionTarget":{"value":"https:\u002F\u002Fwww.cisecurity.org\u002Fsearch?s={search_term_string}"},"name":{"value":"Center for Internet Security"},"organization":{"id":"040fb806-1ddf-578d-a46e-f0cbe5f6ae39","url":"\u002Fcontent\u002Forganizations\u002Fcis-organization","name":"CIS-Organization","displayName":"CIS Organization","fields":{"contactPoints":[{"id":"35646787-128a-55cc-8c9e-e9f7ee9dcd01","url":"https:\u002F\u002Fwww.cisecurity.org\u002Fcontent\u002Forganizations\u002Fcontactpoints\u002Fcis-contact-point-customer-service","name":"CIS-Contact-Point-Customer-Service","displayName":"CIS Contact Point - Customer Service","fields":{"email":{"value":""},"telephone":{"value":"518-266-3460"},"contactType":{"value":"customer service"}}},{"id":"30467c35-2c29-593d-b5fa-8bd493dcf7d1","url":"https:\u002F\u002Fwww.cisecurity.org\u002Fcontent\u002Forganizations\u002Fcontactpoints\u002Fcis-contact-point-cybersecurity-incident","name":"CIS-Contact-Point-Cybersecurity-Incident","displayName":"CIS Contact Point - Cybersecurity Incident","fields":{"email":{"value":"soc@cisecurity.org"},"telephone":{"value":"866-787-4722"},"contactType":{"value":"cybersecurity incident"}}}],"postalAddress":{"id":"c10c91d4-27e5-52a9-bc77-9f8b773cbd11","url":"\u002Fcontent\u002Forganizations\u002Fpostaladdress\u002Fcis-postaladdress","name":"CIS-PostalAddress","displayName":"CIS Postal Address","fields":{"postalCode":{"value":"12061"},"country":{"value":"US"},"locality":{"value":"East Greenbush"},"region":{"value":"NY"},"street":{"value":"31 Tech Valley Drive"}}},"name":{"value":"Center for Internet Security"},"relatedUrls":{"value":"https:\u002F\u002Fen.wikipedia.org\u002Fwiki\u002FCenter_for_Internet_Security\r\nhttps:\u002F\u002Fwww.facebook.com\u002FCenterforIntSec\u002F\r\nhttps:\u002F\u002Fwww.linkedin.com\u002Fcompany\u002Fthe-center-for-internet-security\u002F\r\nhttps:\u002F\u002Fwww.youtube.com\u002Fuser\u002FTheCISecurity\u002F\r\nhttps:\u002F\u002Ftwitter.com\u002FCISecurity\u002F\r\n"},"telephone":{"value":"518-266-3460"},"url":{"value":"https:\u002F\u002Fwww.cisecurity.org"},"description":{"value":"The Center for Internet Security, Inc. (CIS®) makes the connected world a safer place\r\nfor people, businesses, and governments through our core competencies of collaboration\r\nand innovation.\r\n"},"logo":{"value":{}}}},"url":{"value":"https:\u002F\u002Fwww.cisecurity.org"},"searchQueryInput":{"value":"required name=search_term_string"}}},{"uid":"ca9c18bf-c531-464c-bf4d-b865d764b772","componentName":"CIS-Home-Masthead","dataSource":"{9A964C19-3707-4534-82E1-DF457FCE05EE}","params":{"GridParameters":"col-12","CacheClearingBehavior":"Clear on publish"},"fields":{"heading":{"value":"Creating Confidence in the Connected World™"},"subheading":{"value":"At CIS®, we’re harnessing the power of the global IT community to safeguard public and private organizations against cyber threats. Join us."}},"placeholders":{"jss-home-masthead-left":[{"uid":"e779e8a0-60f9-4660-ac27-b27dedd17e59","componentName":"CIS-Featured-Article","dataSource":"{791CA17B-A33A-486F-B23E-732F3F5C9380}","params":{"GridParameters":"col-12","CacheClearingBehavior":"Clear on publish"},"fields":{"cta":{"value":{"text":"Learn More","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{7ABC5FD4-5002-42D4-B264-A6C57AC1D0CC}","href":"\u002Fcis-securesuite\u002Fpricing-and-categories\u002Fproduct-vendor\u002Fcis-oem-partner-program"}},"featuredpadding":{"value":true},"image":{"value":{"src":"\u002F-\u002Fjssmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fhomepage-featured-space\u002F2025\u002Ffeaturebenchmarks-community2022-03900x570x2.png?h=1140&iar=0&w=1800&rev=554c88c98e2c41469801ff2600faa3c8&hash=9D7454252723181ECF78A3B10B83A87F","alt":"benchmarks-community","width":"1800","height":"1140"}},"intro":{"value":"\u003Cp\u003EHelp your customers ensure conformance to the industry-leading CIS Benchmarks.\u003C\u002Fp\u003E"},"label":{"value":"FEATURED"},"link":{"value":{"href":""}},"title":{"value":"Boost Your Solutions with CIS's OEM Partner Program "}}}],"jss-home-masthead-right":[{"uid":"11a7bae8-7a5c-475f-aaa0-bfc375ee62fd","componentName":"CIS-Home-Industry","dataSource":"{22C67CEE-B507-42A6-8A71-AA3D81C30E0F}","params":{"GridParameters":"col-12","CacheClearingBehavior":"Clear on publish"},"fields":{"cta":{"value":{"text":"View Industry List","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{C8E4AB9D-99F0-463C-8F20-FF8ABA96FB2E}","href":"\u002Findustry"}},"heading":{"value":"Cybersecurity threats and solutions by industry"},"label":{"value":"Our Industries"}}},{"uid":"3861ce63-aa34-4d8e-826c-b5996cb6a8b4","componentName":"CIS-From-The-Blog","dataSource":"{3642F679-1E5D-4D9F-A9A2-BAF0077206FE}","params":{"GridParameters":"col-12","CacheClearingBehavior":"Clear on publish"},"fields":{"blogPage":{"id":"9c39ab11-f4db-4837-b763-7ff8404fe4be","url":"\u002Finsights\u002Fblog\u002Fffiec-cat-sunset-what-you-need-know","name":"ffiec-cat-sunset-what-you-need-know","displayName":" FFIEC CAT Sunset: What You Need to Know","fields":{"canonicalUrl":{"value":""},"cdnMaxAge":{"value":1800},"excludeFromSearch":{"value":false},"featuredImage":{"value":{"src":"\u002F-\u002Fjssmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Finsights_images\u002Fblog_post_img\u002F2025\u002F04\u002Fffiec-cat-sunset--what-you-need-to-know.png?h=627&iar=0&w=1200&rev=58136b2e244f4ce7afaf8a85d96b9d2c&hash=889E3F45A0689BE88A1C01102B09043E","alt":"FFIEC CAT Sunset- What You Need to Know","width":"1200","height":"627"}},"legacyUrl":{"value":""},"pageDescription":{"value":"How are you preparing for the sunset of the FFIEC CAT? Read on to learn how another framework can guide you through this change."},"pageTitle":{"value":" FFIEC CAT Sunset: What You Need to Know"},"robotsFollow":{"value":true},"robotsIndex":{"value":true},"robotsMaxImagePreview":{"value":"max-image-preview:large"},"robotsMaxSnippet":{"value":"max-snippet:-1"},"robotsMaxVideoPreview":{"value":"max-video-preview:-1"},"internalHostnamePatterns":{"value":".*.cisecurity\\.org$\r\n.*localhost$"},"owners":[],"tags":[],"technologies":[],"controls":[],"postID":{"value":null},"resourceSubtitle":{"value":""},"resourceTitle":{"value":" FFIEC CAT Sunset: What You Need to Know"},"cta":{"value":{"href":""}},"dateIssued":{"value":"0001-01-01T00:00:00Z"},"publishedAt":{"value":"2025-04-07T13:19:00Z"},"resourceContent":{"value":"\u003Cp\u003EAs any cybersecurity practitioner in the finance industry knows, it can be tedious to demonstrate compliance according to regulatory oversight. The Federal Financial Institutions Examination Council (FFIEC) developed its Cybersecurity Assessment Tool (CAT) in 2016 to help financial institutions overcome this challenge by creating a process to identify their institution's risks and determine its cybersecurity preparedness.\u003C\u002Fp\u003E\n\u003Cp\u003EBut the financial regulatory environment is always changing. The FFIEC \u003Ca title=\"Cybersecurity Assessment Tool\" href=\"https:\u002F\u002Fwww.ffiec.gov\u002Fresources\u002Fcat\" target=\"_blank\" rel=\"noopener noreferrer\"\u003Eannounced\u003C\u002Fa\u003E it will sunset CAT on August 31, 2025, potentially causing an uncomfortable change in how you inform your cybersecurity risk management strategy. Read on to find out how you can proactively adapt to this event.&nbsp;\u003C\u002Fp\u003E\n\u003Ch2\u003EAn Important Update for Financial GRC and Cybersecurity Practitioners\u003C\u002Fh2\u003E\n\u003Cp\u003EOn August 29, 2024, the FFIEC first announced the sunset of CAT.\u003C\u002Fp\u003E\n\u003Cp\u003EIn its announcement, the FFIEC clarified it&nbsp;&ldquo;will remove the CAT from the FFIEC website on August 31, 2025&rdquo; after determining &ldquo;not to update the CAT to reflect new government resources, including the National Institute of Standards and Technology (NIST) Cybersecurity Framework 2.0 and the Cybersecurity and Infrastructure Security Agency&rsquo;s (CISA) Cybersecurity Performance Goals.&rdquo;\u003C\u002Fp\u003E\n\u003Cp\u003EThis change affects supervised financial institutions that used FFIEC CAT as their cybersecurity self-assessment tool. These institutions will continue to be subject to risk-focused examinations going forward.\u003C\u002Fp\u003E\n\u003Ch2\u003EThe Use and Limitations of FFIEC CAT\u003C\u002Fh2\u003E\n\u003Cp\u003ETo shift your financial institution's approach to cybersecurity assessments, you must first take a moment to understand what you could and could not do with FFIEC CAT. This tool was designed to provide the inherent risk profile of the institution before implementing controls. While it was designed to guide management&rsquo;s assessment of your institution&rsquo;s maturity level in five key domains, FFIEC CAT was not designed to identify your institution's overall cybersecurity maturity level. As such, the methodology supporting the use of the tool was intended to complement, not replace, your institution&rsquo;s risk management process and cybersecurity program.\u003C\u002Fp\u003E\n\u003Ch2\u003EThe Future of Assessing Cyber Risk for Your&nbsp;Financial Institution\u003C\u002Fh2\u003E\n\u003Cp\u003EFortunately, you don't need to look far to find a replacement for FFIEC CAT. As noted in the sunset announcement:\u003C\u002Fp\u003E\n\u003Cblockquote\u003E\u003Cspan style=\"color: #0086bf;\"\u003E\"Supervised financial institutions may also consider use of industry developed resources, such as the Cyber Risk Institute&rsquo;s (CRI) Cyber Profile, and the Center for Internet Security Critical Security Controls. These tools can be used in conjunction with other resources (e.g., frameworks, standards, guidelines, leading practices) to better address and inform management of continuously evolving cyber security risk. Supervised financial institutions should ensure that any self-assessment tool(s) they utilize support an effective control environment and are commensurate with their risk.\"\u003C\u002Fspan\u003E\n\u003C\u002Fblockquote\u003E\n\u003Cp\u003EWe couldn't have said it better ourselves. Risk assessments are an incredibly important component of managing your institution's&nbsp;comprehensive cybersecurity program. Solid program management begins with selecting the right framework to ensure you are not only meeting regulatory expectations and demonstrating applicable industry standards compliance but are also implementing the proper set of actions that will safeguard your networks and assets to defend against top threats.\u003C\u002Fp\u003E\n\u003Cp\u003EAs the FFIEC said, the \u003Ca title=\"CIS Critical Security Controls®\" href=\"https:\u002F\u002Fwww.cisecurity.org\u002Fcontrols\" target=\"_blank\" rel=\"noopener noreferrer\"\u003ECIS Critical Security Controls (CIS Controls)\u003C\u002Fa\u003E can&nbsp;help you to achieve that. They are a set of prioritized defensive actions designed to defend against the most common attacks we are facing today across any industry, not just financial services. The Controls are divided into three \u003Ca title=\"CIS Critical Security Controls Implementation Groups\" href=\"https:\u002F\u002Fwww.cisecurity.org\u002Fcontrols\u002Fimplementation-groups\" target=\"_blank\" rel=\"noopener noreferrer\"\u003EImplementation Groups (IGs)\u003C\u002Fa\u003E that use data to drive and prioritize&nbsp;your&nbsp;implementation&nbsp;of individual security measures, or CIS Safeguards. They&nbsp;also&nbsp;help you to streamline your compliance to NIST CSF 2.0, ISO, FFIEC, HIPAA, and other industry standards with mappings that are available through \u003Ca title=\"CIS Critical Security Controls Navigator\" href=\"https:\u002F\u002Fwww.cisecurity.org\u002Fcontrols\u002Fcis-controls-navigator\" target=\"_blank\" rel=\"noopener noreferrer\"\u003ECIS Critical Security Controls Navigator\u003C\u002Fa\u003E. The Controls thus provide an implementation and maturity roadmap for your cybersecurity and compliance program.\u003C\u002Fp\u003E\n\u003Ch2\u003ETwo Ways to Enhance Your Financial Cybersecurity with the CIS Controls\u003C\u002Fh2\u003E\n\u003Cp\u003EWe get it. It's not always easy getting started with enacting a new framework, especially when you're moving from another one. That's why we've also designed an entire ecosystem of tools and resources to help you implement the CIS Controls in a way that aligns to your unique business needs.\u003C\u002Fp\u003E\n\u003Cp\u003ELet's look at a couple of examples below.\u003C\u002Fp\u003E\n\u003Ch3\u003EReasonably Assess Your Financial Institution's Risk\u003C\u002Fh3\u003E\n\u003Cp\u003ELike all other organizations in your sector, your institution is expected to adequately communicate and assess risk. Most senior governance, risk, and compliance (GRC) professionals along with cybersecurity practitioners ask themselves or have been asked, &ldquo;How much security is 'reasonable?'&rdquo; &ldquo;How do we demonstrate that?&rdquo; The answer to these questions isn't obvious. As we explain in our \u003Ca title=\"Reasonable Cybersecurity Guide\" href=\"https:\u002F\u002Fwww.cisecurity.org\u002Finsights\u002Fwhite-papers\u002Freasonable-cybersecurity-guide\" target=\"_blank\" rel=\"noopener noreferrer\"\u003EReasonable Cybersecurity Guide\u003C\u002Fa\u003E, while many U.S. state data privacy laws require cybersecurity programs to meet the standard of reasonableness, none of them explains what organizations must do to fulfill this standard.\u003C\u002Fp\u003E\n\u003Cp\u003EThis is where our free-to-use \u003Ca title=\"CIS Risk Assessment Method (RAM)\" href=\"https:\u002F\u002Flearn.cisecurity.org\u002Fcis-ram?_gl=1*btc673*_ga*MTYxNTc3NjUxOC4xNzQzNjE0MDcz*_ga_N70Z2MKMD7*MTc0MzYxNjAzMC4yLjEuMTc0MzYxNzMzMC4wLjAuMA..*_ga_3FW1B1JC98*MTc0MzYxNjAzMC4yLjEuMTc0MzYxNzMzMC4wLjAuMA..\" target=\"_blank\" rel=\"noopener noreferrer\"\u003ECIS Risk Assessment Method (RAM)\u003C\u002Fa\u003E can help. Blending both qualitative and quantitative risk analysis, CIS RAM doesn't just empower you to determine your risk based upon your Controls implementation. It also provides a method for \u003Ca title=\"https:\u002F\u002Fwww.cisecurity.org\u002Finsights\u002Fwebinar\u002Fhow-to-test-your-reasonable-cyber-defenses\" href=\"https:\u002F\u002Fwww.cisecurity.org\u002Finsights\u002Fwebinar\u002Fhow-to-test-your-reasonable-cyber-defenses\" target=\"_blank\" rel=\"noopener noreferrer\"\u003Edetermining whether the security controls you&rsquo;ve implemented are reasonable\u003C\u002Fa\u003E. CIS RAM takes the guesswork out of evaluating risk by calculating the likelihood of an impact to your institution in the language of your institution, enabling you to apply just the right amount of security for your business needs.\u003C\u002Fp\u003E\n\u003Ch3\u003EPrioritize and Track Your Controls Implementation\u003C\u002Fh3\u003E\n\u003Cp\u003EOne of the most important things you need to do when adopting a new framework is demonstrate progress. Leadership wants to understand how your implementation efforts minimize risk and how you plan to strengthen your institution's cybersecurity posture going forward. Auditors can use this same information to evaluate the effectiveness of your controls program.\u003C\u002Fp\u003E\n\u003Cp\u003EWhich brings us to the pro version of our \u003Ca title=\"CIS Controls Self Assessment Tool (CIS CSAT)\" href=\"https:\u002F\u002Fwww.cisecurity.org\u002Fcontrols\u002Fcis-controls-self-assessment-tool-cis-csat\" target=\"_blank\" rel=\"noopener noreferrer\"\u003ECIS Controls Self Assessment Tool (CIS CSAT Pro)\u003C\u002Fa\u003E. Available exclusive to \u003Ca title=\"https:\u002F\u002Fwww.cisecurity.org\u002Fcis-securesuite\" href=\"https:\u002F\u002Fwww.cisecurity.org\u002Fcis-securesuite\" target=\"_blank\" rel=\"noopener noreferrer\"\u003ECIS SecureSuite\u003C\u002Fa\u003E\u003Ca title=\"https:\u002F\u002Fwww.cisecurity.org\u002Fcis-securesuite\" href=\"https:\u002F\u002Fwww.cisecurity.org\u002Fcis-securesuite\" target=\"_blank\" rel=\"noopener noreferrer\"\u003E\u003Csup\u003E&reg;\u003C\u002Fsup\u003E \u003C\u002Fa\u003E\u003Ca title=\"https:\u002F\u002Fwww.cisecurity.org\u002Fcis-securesuite\" href=\"https:\u002F\u002Fwww.cisecurity.org\u002Fcis-securesuite\" target=\"_blank\" rel=\"noopener noreferrer\"\u003EMembers\u003C\u002Fa\u003E, CIS CSAT Pro enables organizations of any size and resource level to track and prioritize their implementation of the Controls at the CIS Safeguard level. This means you can track and manage your implementation roadmap over time as well as upload and share documentation (evidence, policies, files, etc.) that could be very useful in an internal or external audit examination. CIS CSAT Pro also enables you to measure your progress against peers in your industry, giving you an additional input for planning out and receiving buy-in for your implementation efforts.\u003C\u002Fp\u003E\n\u003Cp\u003EWant to learn more about how you can strengthen your cybersecurity posture with CIS CSAT Pro? Check out our video below.\u003C\u002Fp\u003E\n\u003Cp\u003E&nbsp;\u003C\u002Fp\u003E\n\u003Cdiv class=\"wistia_responsive_padding\" style=\"padding:56.25% 0 0 0;position:relative;\"\u003E\n\u003Cdiv class=\"wistia_responsive_wrapper\" style=\"height:100%;left:0;position:absolute;top:0;width:100%;\"\u003E\u003Ciframe src=\"https:\u002F\u002Ffast.wistia.net\u002Fembed\u002Fiframe\u002Fjj109rpk0t?web_component=true&amp;seo=true\" title=\" Strengthen Your Cyber Defenses with CIS CSAT Video\" allow=\"autoplay; fullscreen\" allowtransparency=\"true\" frameborder=\"0\" scrolling=\"no\" class=\"wistia_embed\" name=\"wistia_embed\" width=\"100%\" height=\"100%\"\u003E\u003C\u002Fiframe\u003E\u003C\u002Fdiv\u003E\n\u003C\u002Fdiv\u003E\n\u003Cscript src=\"https:\u002F\u002Ffast.wistia.net\u002Fplayer.js\" async\u003E\u003C\u002Fscript\u003E\n\u003Cp\u003E&nbsp;\u003C\u002Fp\u003E\n\u003Ch2\u003ENow Is the Time to Embrace Change\u003C\u002Fh2\u003E\n\u003Cp\u003EIt is important to act now and proactively prepare for the FFIEC CAT sunset! While you may have used the tool for many years, its retirement gives you an opportunity to take charge of improving your cyber hygiene. Backed by data and adopted globally, our CIS Controls tools and resources are designed to guide you every step of the way.\u003C\u002Fp\u003E\n\u003Cp\u003EReady to take the first step?\u003C\u002Fp\u003E\n\u003Cimg alt=\"\" src=\"https:\u002F\u002Fpixel.welcomesoftware.com\u002Fpx.gif?key=YXJ0aWNsZT01YmM0NDNhY2YyYzAxMWVmYmQyOTdlNWI2ZGJkYzgxZQ==\" height=\"1\" width=\"1\" class=\"nc_pixel\" \u002F\u003E"},"resourceExcerpt":{"value":"\u003Cp\u003EHow are you preparing for the sunset of the FFIEC CAT? Read on to learn how another framework can guide you through this change.\u003C\u002Fp\u003E"},"format":{"value":"standard"},"categories":[],"Page Design":null,"articleModifiedTime":{"value":"0001-01-01T00:00:00Z"},"articlePublishedTime":{"value":"0001-01-01T00:00:00Z"},"articlePublisher":{"value":"https:\u002F\u002Fwww.facebook.com\u002FCenterforIntSec\u002F"},"facebookDescription":{"value":"How are you preparing for the sunset of the FFIEC CAT? Read on to learn how another framework can guide you through this change."},"facebookImage":{"value":{"src":"\u002F-\u002Fjssmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Finsights_images\u002Fblog_post_img\u002F2025\u002F04\u002Fffiec-cat-sunset--what-you-need-to-know.png?h=627&iar=0&w=1200&rev=58136b2e244f4ce7afaf8a85d96b9d2c&hash=889E3F45A0689BE88A1C01102B09043E","alt":"FFIEC CAT Sunset- What You Need to Know","width":"1200","height":"627"}},"facebookLocale":{"value":"en_US"},"facebookSiteName":{"value":"CIS"},"facebookTitle":{"value":" FFIEC CAT Sunset: What You Need to Know"},"facebookType":{"value":"article"},"facebookUrl":{"value":""},"twitterCard":{"value":"summary_large_image"},"twitterDescription":{"value":"How are you preparing for the sunset of the FFIEC CAT? Read on to learn how another framework can guide you through this change."},"twitterImage":{"value":{"src":"\u002F-\u002Fjssmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Finsights_images\u002Fblog_post_img\u002F2025\u002F04\u002Fffiec-cat-sunset--what-you-need-to-know.png?h=627&iar=0&w=1200&rev=58136b2e244f4ce7afaf8a85d96b9d2c&hash=889E3F45A0689BE88A1C01102B09043E","alt":"FFIEC CAT Sunset- What You Need to Know","width":"1200","height":"627"}},"twitterReadTime":{"value":""},"twitterTitle":{"value":" FFIEC CAT Sunset: What You Need to Know"},"twitterWrittenBy":{"value":""},"structuredDataDescription":{"value":""},"structuredDataImage":{"value":{}},"structuredDataTitle":{"value":""},"organization":{"id":"040fb806-1ddf-578d-a46e-f0cbe5f6ae39","url":"\u002Fcontent\u002Forganizations\u002Fcis-organization","name":"CIS-Organization","displayName":"CIS Organization","fields":{"contactPoints":[{"id":"35646787-128a-55cc-8c9e-e9f7ee9dcd01","url":"https:\u002F\u002Fwww.cisecurity.org\u002Fcontent\u002Forganizations\u002Fcontactpoints\u002Fcis-contact-point-customer-service","name":"CIS-Contact-Point-Customer-Service","displayName":"CIS Contact Point - Customer Service","fields":{"email":{"value":""},"telephone":{"value":"518-266-3460"},"contactType":{"value":"customer service"}}},{"id":"30467c35-2c29-593d-b5fa-8bd493dcf7d1","url":"https:\u002F\u002Fwww.cisecurity.org\u002Fcontent\u002Forganizations\u002Fcontactpoints\u002Fcis-contact-point-cybersecurity-incident","name":"CIS-Contact-Point-Cybersecurity-Incident","displayName":"CIS Contact Point - Cybersecurity Incident","fields":{"email":{"value":"soc@cisecurity.org"},"telephone":{"value":"866-787-4722"},"contactType":{"value":"cybersecurity incident"}}}],"postalAddress":{"id":"c10c91d4-27e5-52a9-bc77-9f8b773cbd11","url":"\u002Fcontent\u002Forganizations\u002Fpostaladdress\u002Fcis-postaladdress","name":"CIS-PostalAddress","displayName":"CIS Postal Address","fields":{"postalCode":{"value":"12061"},"country":{"value":"US"},"locality":{"value":"East Greenbush"},"region":{"value":"NY"},"street":{"value":"31 Tech Valley Drive"}}},"name":{"value":"Center for Internet Security"},"relatedUrls":{"value":"https:\u002F\u002Fen.wikipedia.org\u002Fwiki\u002FCenter_for_Internet_Security\r\nhttps:\u002F\u002Fwww.facebook.com\u002FCenterforIntSec\u002F\r\nhttps:\u002F\u002Fwww.linkedin.com\u002Fcompany\u002Fthe-center-for-internet-security\u002F\r\nhttps:\u002F\u002Fwww.youtube.com\u002Fuser\u002FTheCISecurity\u002F\r\nhttps:\u002F\u002Ftwitter.com\u002FCISecurity\u002F\r\n"},"telephone":{"value":"518-266-3460"},"url":{"value":"https:\u002F\u002Fwww.cisecurity.org"},"description":{"value":"The Center for Internet Security, Inc. (CIS®) makes the connected world a safer place\r\nfor people, businesses, and governments through our core competencies of collaboration\r\nand innovation.\r\n"},"logo":{"value":{}}}},"structuredDataCustom":{"value":""},"controlsResourceSortOrder":{"value":9999999},"controlsResourceSubcategories":[],"controlsResourceQueryHash":{"value":""},"controlsResourceFilters":[],"controlsResourceTitle":{"value":""}}}}}],"jss-home-masthead-update":[],"jss-home-masthead-bottom":[{"uid":"ccf3663e-88a9-4652-826d-534d0f231b01","componentName":"CIS-Home-Cards","dataSource":"{86B27591-3F11-4F96-A736-89D912FEA64D}","params":{"GridParameters":"col-12","CacheClearingBehavior":"Clear on publish"},"fields":{"heading":{"value":"World-Renowned Best Practices and Expert Communities"}},"placeholders":{"jss-home-cards":[{"uid":"9bf813bb-7eaa-4a74-b06e-d5aac117e108","componentName":"CIS-Home-Card-Item","dataSource":"{A0BD6133-A77F-4D65-AA0B-BD53B6E2F454}","params":{"GridParameters":"col-12","CacheClearingBehavior":"Clear on publish"},"fields":{"content":{"value":"Protect your organization from cyber-attacks with globally recognized CIS Controls®, companion guides, and mappings."},"cta":{"value":{"text":"Download & Explore","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{19BC09D8-ABED-CA6C-9B3B-169405015827}","href":"\u002Fcontrols"}},"image":{"value":{"src":"\u002F-\u002Fjssmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Flogos-and-icons\u002F2022\u002Fcis-controls-card.png?h=72&iar=0&w=402&rev=1eed5a8f521542bfbc3ab1b9dd27d95e&hash=62E82999FC492A008DF59E11AB87343B","alt":"CIS Controls","width":"402","height":"72"}},"modalContent":{"value":"\u003Cdiv\u003E\n\u003Cul\u003E\n \u003Cli\u003EPrioritized and prescriptive path defining how to achieve cybersecurity\u003C\u002Fli\u003E\n \u003Cli\u003EDeveloped by a community of cybersecurity experts\u003C\u002Fli\u003E\n \u003Cli\u003EMapped to multiple legal, regulatory, and policy frameworks, simplifying cybersecurity compliance\u003C\u002Fli\u003E\n\u003C\u002Ful\u003E\n\u003C\u002Fdiv\u003E"},"modalCta":{"value":{"text":"Download & Explore","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{19BC09D8-ABED-CA6C-9B3B-169405015827}","href":"\u002Fcontrols"}},"modalTitle":{"value":"Protect Your Organization"},"name":{"value":"CIS Controls"}}},{"uid":"43d113b7-85fa-40dc-a219-13d0a0665c01","componentName":"CIS-Home-Card-Item","dataSource":"{4982E115-5800-4AC1-8B61-16D54A5C416F}","params":{"GridParameters":"col-12","CacheClearingBehavior":"Clear on publish"},"fields":{"content":{"value":"Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families."},"cta":{"value":{"text":"Download Latest","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{EEAD5F3F-F889-42AE-555F-AB0B21F4FF01}","href":"\u002Fcis-benchmarks"}},"image":{"value":{"src":"\u002F-\u002Fjssmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fuploads\u002F2022\u002F11\u002Fcis-benchmarks-card.png?h=68&iar=0&w=482&rev=16d3360d8b964603853cfe81b17e05b5&hash=C71B2EF9F671018348E181B9B3306EE4","alt":"CIS Benchmarks","width":"482","height":"68"}},"modalContent":{"value":"\u003Cdiv\u003E\n\u003Cul\u003E\n \u003Cli\u003EThe only consensus-based, best-practice security configuration guides\u003C\u002Fli\u003E\n \u003Cli\u003EDeveloped through a collaborative process, leveraging the expertise of IT security professionals from around the world\u003C\u002Fli\u003E\n \u003Cli\u003ETrusted and recognized by businesses, industry leaders, government entities, and academia\u003C\u002Fli\u003E\n\u003C\u002Ful\u003E\n\u003C\u002Fdiv\u003E"},"modalCta":{"value":{"text":"Download Latest","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{EEAD5F3F-F889-42AE-555F-AB0B21F4FF01}","href":"\u002Fcis-benchmarks"}},"modalTitle":{"value":"Secure Your Configuration"},"name":{"value":"CIS Benchmarks"}}},{"uid":"58ab4c54-f6eb-4643-a0f0-53602785e6c0","componentName":"CIS-Home-Card-Item","dataSource":"{9F119E31-DCD9-48E0-929E-7A293B463B1C}","params":{"GridParameters":"col-12","CacheClearingBehavior":"Clear on publish"},"fields":{"content":{"value":"Secure your organization with resources and tools designed to harness the power of CIS Benchmarks and CIS Controls."},"cta":{"value":{"text":"Learn More","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{A4AF0446-1D42-B77C-07A3-E39FBFA059A8}","href":"\u002Fcis-securesuite"}},"image":{"value":{"src":"\u002F-\u002Fjssmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Flogos-and-icons\u002F2022\u002Fcis-securesuite-card.png?h=72&iar=0&w=482&rev=0a6e8cbf135c4d319640226604d1947a&hash=49295C7124E40F0A6B8EF1EB82100991","alt":"CIS SecureSuite","width":"482","height":"72"}},"modalContent":{"value":"\u003Cdiv\u003E\n\u003Cul\u003E\n \u003Cli\u003EAccess multiple cybersecurity resources including CIS-CAT&reg; Pro, CIS CSAT Pro, and more\u003C\u002Fli\u003E\n \u003Cli\u003ECustomize CIS Benchmarks and tailor security recommendations to your organization&rsquo;s needs\u003C\u002Fli\u003E\n \u003Cli\u003EReceive enhanced cybersecurity support from CIS experts\u003C\u002Fli\u003E\n\u003C\u002Ful\u003E\n\u003C\u002Fdiv\u003E"},"modalCta":{"value":{"text":"Learn More","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{A4AF0446-1D42-B77C-07A3-E39FBFA059A8}","href":"\u002Fcis-securesuite"}},"modalTitle":{"value":"Assess and Remediate at Scale"},"name":{"value":"CIS SecureSuite"}}},{"uid":"81c814fe-7f78-442d-9555-57421e7adbab","componentName":"CIS-Home-Card-Item","dataSource":"{E6FABAF2-7B88-47DC-8A8E-49083DEBD009}","params":{"GridParameters":"col-12","CacheClearingBehavior":"Clear on publish"},"fields":{"content":{"value":"Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities."},"cta":{"value":{"text":"Learn More","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{5AB4691B-C79A-D293-3D46-199080A68B6A}","href":"\u002Fisac"}},"image":{"value":{"src":"\u002F-\u002Fjssmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fuploads\u002F2017\u002F12\u002Flogo-ms-isac-r-300x67.png?h=67&iar=0&w=300&rev=fe05725bbca44980891fca948125bc9f&hash=3A3479FC99CCE47FADAF796F448A3EEA","alt":"MS-ISAC logo","width":"300","height":"67"}},"modalContent":{"value":"\u003Cdiv\u003E\n\u003Cul\u003E\n \u003Cli\u003EMS-ISAC is the key resource for cyber threat prevention, protection, response, and recovery for all SLTT government entities. It is a voluntary and collaborative effort based on a strong partnership between CIS, SLTT government organizations, and the U.S. Department of Homeland Security (DHS).\u003C\u002Fli\u003E\n \n\u003C\u002Ful\u003E\n\u003C\u002Fdiv\u003E"},"modalCta":{"value":{"text":"Learn More","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{5AB4691B-C79A-D293-3D46-199080A68B6A}","href":"\u002Fisac"}},"modalTitle":{"value":"Support for U.S. Government Organizations"},"name":{"value":"MS-ISAC"}}}]}}]}},{"uid":"59e37805-4cba-434b-a4cd-626ebe950e7e","componentName":"CIS-Home-Blockquote","dataSource":"{8FF0DDCA-7F12-4167-B36E-506280656326}","fields":{"heading":{"value":"What The Experts Are Saying"}},"placeholders":{"jss-home-blockquotes":[{"uid":"07e30321-58a5-4b9f-b5ab-41ca323335e2","componentName":"CIS-Home-Blockquote-Item","dataSource":"{B66B4C83-5FBB-4521-AFD3-C6A8D222C5AE}","fields":{"name":{"value":"Harley Parkes"},"organization":{"value":"ACD (Integrated Adaptive Cyber Defense)"},"quote":{"value":"The CIS Controls® take the background and knowledge of cybersecurity experts literally around the world and help focus efforts on things that are of most value. Directly impacting the adversaries and challenges we face today on our networks."},"title":{"value":"Director"}}},{"uid":"602a912d-40ba-410b-a146-d46c23003242","componentName":"CIS-Home-Blockquote-Item","dataSource":"{E7CBCC40-A20D-4AA0-8497-B01C4AFE5108}","fields":{"name":{"value":"Adam"},"organization":{"value":""},"quote":{"value":"Without this resource, the hardening of our devices would have taken a lot longer and required many meetings between IT and Security to debate which configuration settings to change and the impact they could have. The CIS Benchmarks™ provided the necessary information to alleviate many of the fears IT may have had with changing specific settings."},"title":{"value":"Banking Information Security Engineer"}}},{"uid":"a9d4085f-1ff9-4bea-94c8-25aa17cff7fc","componentName":"CIS-Home-Blockquote-Item","dataSource":"{C153406B-EBD9-403D-9B16-5028B4C3EFAA}","fields":{"name":{"value":"Sasawat Malaivongs"},"organization":{"value":"ACinfotec"},"quote":{"value":"We work with sensitive information on a daily basis. The CIS Controls® along with CIS-CAT® Pro, a proven and indispensable tool, helps us to evaluate and maintain a security baseline for our IT infrastructure."},"title":{"value":"Business Director"}}}]}},{"uid":"965c632c-9c4d-42b5-8b1e-445306235020","componentName":"CIS-Home-Featured-CTA","dataSource":"{7FC0DD34-A6C6-4C0B-A622-D4D9DB906A3F}","fields":{"title":{"value":"Together, We Can Make a Difference"},"content":{"value":"Our CIS Controls and CIS Benchmarks communities connect IT security practitioners from around the globe to help secure our ever-changing world. Our Ambassadors champion the CIS best practices, making it easier for enterprises everywhere to strengthen their cyber defenses and streamline their compliance efforts. We hope you’ll add your voice."},"cta":{"value":{"text":"Learn More","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{C8DE7E1E-6D97-4675-2B7C-D7D191BE4FD1}","href":"\u002Fcommunities"}},"image":{"value":{"src":"\u002F-\u002Fjssmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fhomepage-featured-space\u002F2022\u002Fhomepage-controls-community.png?h=118&iar=0&w=400&rev=fac50a0f5b6544cb8ff157ffdc089678&hash=DC12AFCE3FA1501CC95B595374B5CA4D","alt":" ","width":"400","height":"118"}},"imageBottom":{"value":{"src":"\u002F-\u002Fjssmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fhomepage-featured-space\u002F2022\u002Fhomepage-benchmarks-community.png?h=114&iar=0&w=400&rev=498de6d6d6724375b4671230afa70722&hash=C2EBFC266F9DD00C08CDC1ADAD5B6E6A","alt":" ","width":"400","height":"114"}},"imageBottomUrl":{"value":{"text":"","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{E2E60C34-788C-3C5E-B4AB-D9B8D9AEF16D}","href":"\u002Fcommunities\u002Fbenchmarks"}},"imageUrl":{"value":{"text":"","anchor":"","linktype":"internal","class":"","title":"CIS Controls Community","querystring":"","id":"{F14FD165-50F4-70A7-D717-B58EFF6B22F5}","href":"\u002Fcommunities\u002Fcontrols"}}}},{"uid":"75e8b61f-5b9f-4af9-b15a-99ff20464fea","componentName":"CIS-RichText","dataSource":"{5F7D9464-A2B0-4279-A2F5-53EBFB89C4E2}","fields":{"content":{"value":"\u003Cdiv class=\"rich-text-home\"\u003E\n\u003Ch2\u003EOur Commitment&nbsp;\u003C\u002Fh2\u003E\n\u003Cp class=\"c-intro-text\"\u003ECIS operates as a mission driven, nonprofit organization dedicated to making the connected world a safer place. Our employees adhere to our \u003Ca rel=\"noopener noreferrer\" href=\"https:\u002F\u002Flearn.cisecurity.org\u002Fcode-of-ethics\" target=\"_blank\"\u003ECode of Ethics\u003C\u002Fa\u003E, \u003Ca href=\"\u002Fabout-us\u002Fcis-leadership-principles\"\u003ELeadership Principles\u003C\u002Fa\u003E, and \u003Ca rel=\"noopener noreferrer\" href=\"https:\u002F\u002Flearn.cisecurity.org\u002Fcode-of-conduct\" target=\"_blank\"\u003ECode of Conduct\u003C\u002Fa\u003E, consistent with our collaborative, nonpartisan, vendor-agnostic operating model. These values guide our decisions and actions and build trust in our capabilities, enabling us to achieve our mission.\u003C\u002Fp\u003E\n\u003Ca class=\"c-cta--secondary\" href=\"\u002Fabout-us\"\u003EAbout Us\u003C\u002Fa\u003E&nbsp;\u003C\u002Fdiv\u003E\u003C\u002Fdiv\u003E"}}}],"jss-infohub":[{"uid":"e3259403-8222-42c4-ac82-e1076a38bd37","componentName":"CIS-InfoHub","dataSource":""}],"jss-footer":[{"uid":"553700a6-01a3-483c-8f2f-b59adf99adf6","componentName":"PartialDesignDynamicPlaceholder","dataSource":"","params":{"sid":"{D1A57C00-3585-4E9E-9182-C24DC35D6BAF}","ph":"jss-footer","sig":"sxa-footer"},"placeholders":{"sxa-footer":[{"uid":"a8978e0a-759d-4313-b928-327f298cd41c","componentName":"CIS-Footer","dataSource":"{39EFF40B-A685-43BF-AAB7-7D46B180FC1A}","fields":{},"placeholders":{"jss-footer-navlist-column":[{"uid":"e5145744-b8a6-4506-b0b4-302838e012b3","componentName":"CIS-Footer-NavList","dataSource":"{12E5086E-D59C-4EFF-888C-6E0238C09822}","fields":{"heading":{"value":"About"},"link":{"value":{"text":"About","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{CE0E4674-2099-1EFD-0872-24554C9B1BDF}","href":"\u002Fabout-us"}},"ref":{"value":"about"}},"placeholders":{"jss-footer-navlist-column-links":[{"uid":"d264738e-7812-4d00-b72c-06cb8d4bfdf2","componentName":"CIS-Footer-NavList-Link","dataSource":"{0C2C8351-6981-477C-B685-7BBA633B8577}","fields":{"link":{"value":{"text":"Leadership","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{38C7F30C-A0A6-1FCC-B555-0F0B31319356}","href":"\u002Fabout-us\u002Fleadership"}}}},{"uid":"77595b46-2389-46e2-88bf-34abe57e9f99","componentName":"CIS-Footer-NavList-Link","dataSource":"{B6D4574D-41C3-4042-946F-A3292C8A7043}","fields":{"link":{"value":{"text":"Board","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{92F9E383-BE0B-797D-7877-5538CBB153EB}","href":"\u002Fabout-us\u002Fboard"}}}},{"uid":"2b54c015-0e62-446b-8a69-f34e2417d602","componentName":"CIS-Footer-NavList-Link","dataSource":"{A27DEE21-4F7C-4A17-95A0-3095FD8CFC98}","fields":{"link":{"value":{"text":"Communities","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{C8DE7E1E-6D97-4675-2B7C-D7D191BE4FD1}","href":"\u002Fcommunities"}}}},{"uid":"e4430129-0780-47e2-89df-8ddeea1efdc2","componentName":"CIS-Footer-NavList-Link","dataSource":"{20FC9B61-6044-4EB6-9041-A84A98278542}","fields":{"link":{"value":{"href":"https:\u002F\u002Fcareers-cisecurity.icims.com\u002F","text":"Careers","linktype":"external","url":"https:\u002F\u002Fcareers-cisecurity.icims.com\u002F","anchor":"","target":""}}}},{"uid":"2c965f67-b655-4314-9c6d-0e66c6596c33","componentName":"CIS-Footer-NavList-Link","dataSource":"{610121FE-8393-4FE8-AAA7-E0577CCCF0DD}","fields":{"link":{"value":{"id":"{C44F2D0C-7882-EF48-AAF0-ABD11D4FD831}","querystring":"","text":"Media","anchor":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Fabout-us\u002Fmedia","title":"","class":"","linktype":"internal","href":"\u002Fabout-us\u002Fmedia"}}}},{"uid":"0bda124a-003f-4d4e-9c13-dbfaef1b0afb","componentName":"CIS-Footer-NavList-Link","dataSource":"{A5634E04-8E09-40EB-B40B-4DD4FB085808}","fields":{"link":{"value":{"text":"Testimonials","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{96FDBB45-69F1-2EB3-2D0B-27983F625023}","href":"\u002Ftestimonials"}}}},{"uid":"9982a926-d32c-43d8-a5d7-b93db0b93545","componentName":"CIS-Footer-NavList-Link","dataSource":"{FEAAEC42-5B3D-48CC-B291-6A0024A7116B}","fields":{"link":{"value":{"text":"Events","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{AF78681B-ADBD-0D67-43E1-A8933FB358B8}","href":"\u002Fevent-calendar"}}}},{"uid":"81e62ea7-9117-47fe-8832-dbad1df3293b","componentName":"CIS-Footer-NavList-Link","dataSource":"{EB40E188-7B0E-4E68-905E-873C6112F1D5}","fields":{"link":{"value":{"href":"http:\u002F\u002Fwww.uscyberchallenge.org\u002F","text":"US Cyber Challenge","linktype":"external","url":"http:\u002F\u002Fwww.uscyberchallenge.org\u002F","anchor":"","target":""}}}},{"uid":"2185db58-b7c1-4223-9279-3da66370c973","componentName":"CIS-Footer-NavList-Link","dataSource":"{CD268DD4-C58C-4D4A-9DE1-26129762EC97}","fields":{"link":{"value":{"text":"Support","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{34DDDDA5-FD41-E76F-9829-385B9EF35B03}","href":"\u002Fsupport"}}}},{"uid":"fb72e8b4-ec6b-4a96-bf50-ec748aa35d94","componentName":"CIS-Footer-NavList-Link","dataSource":"{145B4E68-B168-41B2-A3F0-F9E5B17E83EF}","fields":{"link":{"value":{"href":"https:\u002F\u002Flearn.cisecurity.org\u002Fcontact-us","text":"Contact","linktype":"external","url":"https:\u002F\u002Flearn.cisecurity.org\u002Fcontact-us","anchor":"","target":""}}}}]}},{"uid":"e914d3fb-6a33-40b2-bb8b-69450086ac40","componentName":"CIS-Footer-NavList","dataSource":"{083423F3-5313-4B8C-A83A-27F7A250E546}","fields":{"heading":{"value":"Products and Tools"},"link":{"value":{"text":"Products And Tools","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{EEAB23B1-CC27-66BC-CB2F-6613F71BEA94}","href":"\u002Fcybersecurity-tools"}},"ref":{"value":"products"}},"placeholders":{"jss-footer-navlist-column-links":[{"uid":"6ac739f7-9f97-4a7d-8a21-57e03a61150d","componentName":"CIS-Footer-NavList-Link","dataSource":"{05552B05-9D5F-467F-90D7-86F6C77649AE}","fields":{"link":{"value":{"text":"CIS Critical Security Controls®","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{19BC09D8-ABED-CA6C-9B3B-169405015827}","href":"\u002Fcontrols"}}}},{"uid":"0a93c4b4-af89-4383-acfa-abe7ef32c5e4","componentName":"CIS-Footer-NavList-Link","dataSource":"{B0D663C7-8F1C-4CAB-B849-F82C6FA2C785}","fields":{"link":{"value":{"text":"CIS Benchmarks®","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{EEAD5F3F-F889-42AE-555F-AB0B21F4FF01}","href":"\u002Fcis-benchmarks"}}}},{"uid":"a2617d74-ba1f-492a-960a-a42f4e643576","componentName":"CIS-Footer-NavList-Link","dataSource":"{34CC9ED9-4634-460F-AD6C-F6F72EAB048F}","fields":{"link":{"value":{"text":"CIS Hardened Images®","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{E7B5656B-D504-03B9-3E90-66CACEFDC5AC}","href":"\u002Fcis-hardened-images"}}}},{"uid":"3722006b-9906-4445-97a4-9c0d77662013","componentName":"CIS-Footer-NavList-Link","dataSource":"{0810869C-8C37-43DC-A10F-80F181298E28}","fields":{"link":{"value":{"text":"CIS SecureSuite®","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{A4AF0446-1D42-B77C-07A3-E39FBFA059A8}","href":"\u002Fcis-securesuite"}}}},{"uid":"76f3c134-d1af-439b-9531-5ee29aa04c0d","componentName":"CIS-Footer-NavList-Spacer","dataSource":"{B6498EE1-A41A-4FAE-87BE-F546E929E33D}","fields":{}},{"uid":"cc1fff93-630d-436f-a286-d55f7050a692","componentName":"CIS-Footer-NavList-Link","dataSource":"{0CD6D24B-BEC5-43CF-8732-6237BC2290F5}","fields":{"link":{"value":{"href":"https:\u002F\u002Flearn.cisecurity.org\u002Fcis-cat-lite","text":"CIS-CAT®Lite","linktype":"external","url":"https:\u002F\u002Flearn.cisecurity.org\u002Fcis-cat-lite","anchor":"","target":""}}}},{"uid":"843e353e-5a25-48e0-b1dd-ad8b89c228f2","componentName":"CIS-Footer-NavList-Link","dataSource":"{F97428A4-ADD4-4C83-B397-6C3C367D1B32}","fields":{"link":{"value":{"text":"CIS-CAT®Pro","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{1804D342-98D7-427D-0CB2-01136C37C047}","href":"\u002Fcybersecurity-tools\u002Fcis-cat-pro"}}}},{"uid":"e092dad5-bcd5-454c-a0f1-0a92cdfb8a5c","componentName":"CIS-Footer-NavList-Link","dataSource":"{2232687A-D22C-4102-8574-8D2CD75D37CF}","fields":{"link":{"value":{"href":"https:\u002F\u002Flearn.cisecurity.org\u002Fcis-ram","text":"CIS RAM","linktype":"external","url":"https:\u002F\u002Flearn.cisecurity.org\u002Fcis-ram","anchor":"","target":""}}}},{"uid":"52b86e48-7eec-4cf7-bc5b-afe738172fe5","componentName":"CIS-Footer-NavList-Link","dataSource":"{9266E5B3-601F-460D-8160-6A5C7B3E1879}","fields":{"link":{"value":{"text":"CIS CSAT","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{E28A0486-04C9-EE4A-D85D-A29A9045942C}","href":"\u002Fcontrols\u002Fcis-controls-self-assessment-tool-cis-csat"}}}},{"uid":"9344189d-ffc6-4ff5-a317-e856d91e50c7","componentName":"CIS-Footer-NavList-Link","dataSource":"{44F65ED1-5F79-4A55-9D77-D10E1076DD8D}","fields":{"link":{"value":{"href":"https:\u002F\u002Fworkbench.cisecurity.org\u002F","text":"CIS WorkBench","linktype":"external","url":"https:\u002F\u002Fworkbench.cisecurity.org\u002F","anchor":"","target":""}}}},{"uid":"2e9cae98-2ce6-4f36-85b4-a52ece0ca0e3","componentName":"CIS-Footer-NavList-Spacer","dataSource":"{B6498EE1-A41A-4FAE-87BE-F546E929E33D}","params":{"GridParameters":"col-12","CacheClearingBehavior":"Clear on publish"},"fields":{}},{"uid":"964c08c0-889b-4af1-9215-a38650f500d3","componentName":"CIS-Footer-NavList-Link","dataSource":"{A8BF71D2-E776-46D5-B7ED-2A6916580353}","params":{"GridParameters":"col-12","CacheClearingBehavior":"Clear on publish"},"fields":{"link":{"value":{"text":"ThreatWA™","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{FE080995-4192-4AF4-8065-A5778EA2EB7C}","href":"\u002Fthreatwa"}}}}]}},{"uid":"82a124a4-fb65-4ef6-9d0d-d134104d9bfc","componentName":"CIS-Footer-NavList","dataSource":"{BFE797D1-CE1F-4D73-92AA-ECEF12995772}","fields":{"heading":{"value":"For SLTT Governments"},"link":{"value":{"text":"For SLTT Governments","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{5AB4691B-C79A-D293-3D46-199080A68B6A}","href":"\u002Fisac"}},"ref":{"value":"government"}},"placeholders":{"jss-footer-navlist-column-links":[{"uid":"96acc86b-723e-4da2-a5ba-f2a2eb67a96c","componentName":"CIS-Footer-NavList-Link","dataSource":"{5984A729-DCF3-435D-AC99-241AF350C9E0}","fields":{"link":{"value":{"text":"MS-ISAC®","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{D08DEDA9-3029-4145-7DDB-B71F23291CE5}","href":"\u002Fms-isac"}}}},{"uid":"683cd9c7-4719-4700-9f04-39796e0e0f90","componentName":"CIS-Footer-NavList-Link","dataSource":"{7B95416F-9480-462A-83DA-1ADD53017C2F}"},{"uid":"5a198c67-8816-4126-9846-45dd59b0afbe","componentName":"CIS-Footer-NavList-Link","dataSource":"{0355C105-03EA-466D-AADD-F3F4F9C351CD}","fields":{"link":{"value":{"text":"Election Resources","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{BAFE31A6-43F2-4780-8A84-BF0146DF5BD5}","href":"\u002Felections"}}}},{"uid":"c61ed8f8-190a-4592-b4bd-4d6d19b9d8eb","componentName":"CIS-Footer-NavList-Spacer","dataSource":"{B6498EE1-A41A-4FAE-87BE-F546E929E33D}","fields":{}},{"uid":"4eaac569-9a00-4ec7-9c36-58c7dda38227","componentName":"CIS-Footer-NavList-Link","dataSource":"{2BFE53C1-53D7-4A30-A819-8379DA462DBC}","fields":{"link":{"value":{"text":"CIS Services®","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{2BF3F743-4F7D-2A44-9BA1-426B3A3CFCDD}","href":"\u002Fservices"}}}},{"uid":"dbd75e0f-47c9-4976-a255-97ab90652a91","componentName":"CIS-Footer-NavList-Link","dataSource":"{E0F4A2E2-1F5C-47E6-ADC9-0068425EA8FD}","fields":{"link":{"value":{"text":"Albert Network Monitoring","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{B8C5738E-5FD1-C161-683D-3F5C78315E0E}","href":"\u002Fservices\u002Falbert-network-monitoring"}}}},{"uid":"7f934023-1c24-4c8c-950f-43b0749f3933","componentName":"CIS-Footer-NavList-Link","dataSource":"{35630969-32FC-4DD0-8A5A-9AE60025659B}","fields":{"link":{"value":{"text":"Managed Security Services","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{E8E5D5A9-41BD-E30B-787D-134B9687DFBB}","href":"\u002Fservices\u002Fmanaged-security-services-mss"}}}},{"uid":"640df112-cbf4-4ebb-a773-2959515dcbc6","componentName":"CIS-Footer-NavList-Link","dataSource":"{4C87F991-03D4-4FAE-ACCF-E65C128FEA30}","fields":{"link":{"value":{"text":"Endpoint Security Services","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{FEC18F53-D2B1-59FF-1ADB-F7AE386AB4F2}","href":"\u002Fservices\u002Fendpoint-security-services"}}}},{"uid":"dbacf4d6-66aa-45dd-845a-4808b3bbe245","componentName":"CIS-Footer-NavList-Link","dataSource":"{0F6874E7-97E3-4010-81BA-FD5B049A3B9E}","fields":{"link":{"value":{"text":"Malicious Domain Blocking and Reporting Plus","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{C908677A-58DC-4788-97E1-DDE96D8766C3}","href":"\u002Fservices\u002Fmdbrplus"}}}},{"uid":"153cdb32-da95-4c38-8922-c13d39d0c70f","componentName":"CIS-Footer-NavList-Spacer","dataSource":"{B6498EE1-A41A-4FAE-87BE-F546E929E33D}","fields":{}},{"uid":"1f401c95-ee1f-4132-aaa5-97ccb79be8b2","componentName":"CIS-Footer-NavList-Link","dataSource":"{4B3617F6-AC3B-4B46-93C3-10947668BCAE}","fields":{"link":{"value":{"text":"CIS CyberMarket®","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{377369ED-DD43-D165-4A7E-156EBE490770}","href":"\u002Fservices\u002Fcis-cybermarket"}}}}]}},{"uid":"8782ff4a-16ae-4016-bc16-9fce5f1e5590","componentName":"CIS-Footer-NavList","dataSource":"{41A4AE22-BA78-4488-89B0-304C6E1981FB}","fields":{"heading":{"value":"Explore"},"link":{"value":{"id":"{FB4E12C1-82FC-59D2-90B1-F58388DAACC3}","querystring":"","text":"Explore","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights","linktype":"internal","href":"\u002Finsights"}},"ref":{"value":"explore"}},"placeholders":{"jss-footer-navlist-column-links":[{"uid":"62c7cf0f-9878-4c3f-8274-2063f06ad888","componentName":"CIS-Footer-NavList-Link","dataSource":"{444FEC6A-E844-4EF3-93A5-3D3341C9E9A2}","fields":{"link":{"value":{"id":"{A699BE35-8674-5BE8-B3F4-C9769391F6FE}","querystring":"","text":"Blog","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights\u002Fblog","linktype":"internal","href":"\u002Finsights\u002Fblog"}}}},{"uid":"3bd043b3-d463-478e-b681-01c398493250","componentName":"CIS-Footer-NavList-Link","dataSource":"{A33D9C0E-15F2-4721-91D2-514F6785875C}","fields":{"link":{"value":{"id":"{c74111a6-95b5-5a9e-a5df-2e2a7d2884f9}","querystring":"","text":"Whitepapers","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights\u002Fwhite-papers","linktype":"internal","href":"\u002Finsights\u002Fwhite-papers"}}}},{"uid":"347754e1-1502-44b9-a342-79c3c0eeb4bd","componentName":"CIS-Footer-NavList-Link","dataSource":"{ADF890CC-64A8-4BC4-9147-E62D6715F54A}","fields":{"link":{"value":{"id":"{11C8CCFC-833F-576D-AF85-2C37560B1A67}","querystring":"","text":"Newsletters","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights\u002Fnewsletter","linktype":"internal","href":"\u002Finsights\u002Fnewsletter"}}}},{"uid":"7168b19c-9893-4a5c-aedb-0858df521ecc","componentName":"CIS-Footer-NavList-Link","dataSource":"{2F037D55-1F06-4B2D-848B-1C07039FFF9C}","fields":{"link":{"value":{"id":"{F07F8DAA-8808-5FB4-BB19-1D0F5E5D8D9D}","querystring":"","text":"Webinars","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights\u002Fwebinar","linktype":"internal","href":"\u002Finsights\u002Fwebinar"}}}},{"uid":"1f8dd1b3-3236-4b2e-a871-e1763a43ddc6","componentName":"CIS-Footer-NavList-Link","dataSource":"{98605ECF-5F35-4119-99E2-5BBB86782929}","fields":{"link":{"value":{"id":"{2992CF52-4336-5643-BB61-EB5BF0A5DB2A}","querystring":"","text":"Case Studies","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights\u002Fcase-study","linktype":"internal","href":"\u002Finsights\u002Fcase-study"}}}},{"uid":"9f24d096-5ae4-4320-9b4c-e77b5cd31232","componentName":"CIS-Footer-NavList-Link","dataSource":"{DB31F159-66FC-4271-914A-4C9589A4ACC2}","fields":{"link":{"value":{"text":"Spotlights","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{19FA18AC-9BBF-569D-AB84-45572D276F62}","href":"\u002Finsights\u002Fspotlight"}}}},{"uid":"78700ef9-593f-4b51-bc07-73c8a0505950","componentName":"CIS-Footer-NavList-Link","dataSource":"{CFD0B212-070C-4798-8747-F0115D9866B9}","fields":{"link":{"value":{"href":"https:\u002F\u002Fwww.youtube.com\u002Fuser\u002FTheCISecurity","text":"Videos","linktype":"external","url":"https:\u002F\u002Fwww.youtube.com\u002Fuser\u002FTheCISecurity","anchor":"","target":"_blank"}}}}]}}],"jss-footer-navlist-column-links":[],"jss-footer-utility-links":[{"uid":"64c39b1e-99b7-4e52-96e7-468d2233c0d2","componentName":"CIS-Footer-Copyright","dataSource":"{F40328ED-66D1-4513-B625-5A9F94DB9020}","fields":{}},{"uid":"6be99de6-acda-44dd-885f-537dec8218a4","componentName":"CIS-Footer-UtilityLink","dataSource":"{B9D5776A-CCA1-4CE8-81E1-8AF8341278D2}","fields":{"link":{"value":{"text":"Privacy Notice","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{03F9C8E2-8578-2383-F241-107EF459D053}","href":"\u002Fprivacy-notice"}}}}],"jss-footer-social-links":[{"uid":"f8128af4-282e-433e-af8d-c996bde765c2","componentName":"CIS-Footer-SocialLink","dataSource":"{63F874B5-8028-4107-9CD1-683CB6E502F1}","fields":{"link":{"value":{"href":"https:\u002F\u002Ftwitter.com\u002FCISecurity\u002F","text":"Twitter","linktype":"external","url":"https:\u002F\u002Ftwitter.com\u002FCISecurity\u002F","anchor":"","class":"twitter","target":"_blank"}}}},{"uid":"82e90894-0a00-406c-97eb-db3d4366e95a","componentName":"CIS-Footer-SocialLink","dataSource":"{33D75F03-7FD9-4225-9E75-5412D314707A}","fields":{"link":{"value":{"href":"https:\u002F\u002Fwww.facebook.com\u002FCenterforIntSec\u002F","text":"Facebook","linktype":"external","url":"https:\u002F\u002Fwww.facebook.com\u002FCenterforIntSec\u002F","anchor":"","class":"facebook","target":"_blank"}}}},{"uid":"e7f3d3b2-dcc3-46cb-b833-e626f131cd72","componentName":"CIS-Footer-SocialLink","dataSource":"{FE4E37CB-5B3A-4042-ACA4-42BEAAF9F1E7}","fields":{"link":{"value":{"href":"https:\u002F\u002Fwww.youtube.com\u002Fuser\u002FTheCISecurity\u002F","text":"YouTube","linktype":"external","url":"https:\u002F\u002Fwww.youtube.com\u002Fuser\u002FTheCISecurity\u002F","anchor":"","class":"youtube","target":"_blank"}}}},{"uid":"7acef943-cbe1-411c-bb11-905cab2ba0d6","componentName":"CIS-Footer-SocialLink","dataSource":"{5E480327-B353-4EE8-B9C8-4E868D0AA204}","fields":{"link":{"value":{"href":"https:\u002F\u002Fwww.linkedin.com\u002Fcompany\u002Fthe-center-for-internet-security\u002F","text":"LinkedIn","linktype":"external","url":"https:\u002F\u002Fwww.linkedin.com\u002Fcompany\u002Fthe-center-for-internet-security\u002F","anchor":"","class":"linkedin","target":"_blank"}}}}]}}]}}]}}},"APOLLO_STATE":{"ItemTemplate:05104A9745674C0897E7122D45274800":{"__typename":"ItemTemplate","id":"05104A9745674C0897E7122D45274800","name":"App Route"},"C__AppRoute:6E72CC69C1294C6AB439296957F13A11":{"__typename":"C__AppRoute","id":"6E72CC69C1294C6AB439296957F13A11","name":"home","displayName":"home","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome","template":{"__ref":"ItemTemplate:05104A9745674C0897E7122D45274800"},"field({\"name\":\"pageTitle\"})":{"__typename":"TextField","value":"CIS Center for Internet Security"},"field({\"name\":\"owners\"})":null},"ItemTemplate:2AAF7415514F5C10B597D162F39A1E4E":{"__typename":"ItemTemplate","id":"2AAF7415514F5C10B597D162F39A1E4E","name":"CIS-Resource-Blog-RouteType"},"CISResourceBlogRouteType:631834ECBE414B8AAA5FAB88CEA8F71E":{"__typename":"CISResourceBlogRouteType","id":"631834ECBE414B8AAA5FAB88CEA8F71E","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fblog\u002Fcis-benchmarks-march-2025-update","url":"\u002Finsights\u002Fblog\u002Fcis-benchmarks-march-2025-update","displayName":"CIS Benchmarks March 2025 Update","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"CIS Benchmarks March 2025 Update"},"template":{"__ref":"ItemTemplate:2AAF7415514F5C10B597D162F39A1E4E"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1741629180000}},"ItemTemplate:A0F8790640805FF7AAA73E7F2EF7A26A":{"__typename":"ItemTemplate","id":"A0F8790640805FF7AAA73E7F2EF7A26A","name":"CIS-Resource-White-Paper-RouteType"},"CISResourceWhitePaperRouteType:51E867E6A0E943AB940E138C236EE4DA":{"__typename":"CISResourceWhitePaperRouteType","id":"51E867E6A0E943AB940E138C236EE4DA","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fwhite-papers\u002Fcis-year-in-review-2024","url":"\u002Finsights\u002Fwhite-papers\u002Fcis-year-in-review-2024","displayName":"CIS Year in Review 2024","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"CIS Year in Review 2024"},"template":{"__ref":"ItemTemplate:A0F8790640805FF7AAA73E7F2EF7A26A"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1739481720000}},"CISResourceBlogRouteType:B82D697309EA46D0A809E2A38663726C":{"__typename":"CISResourceBlogRouteType","id":"B82D697309EA46D0A809E2A38663726C","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fblog\u002Fcis-benchmarks-february-2025-update","url":"\u002Finsights\u002Fblog\u002Fcis-benchmarks-february-2025-update","displayName":"cis-benchmarks-february-2025-update","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"CIS Benchmarks February 2025 Update"},"template":{"__ref":"ItemTemplate:2AAF7415514F5C10B597D162F39A1E4E"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1738780140000}},"CISResourceBlogRouteType:0A9311A438F34C23BE55832880909444":{"__typename":"CISResourceBlogRouteType","id":"0A9311A438F34C23BE55832880909444","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fblog\u002Fcis-benchmarks-january-2025-update","url":"\u002Finsights\u002Fblog\u002Fcis-benchmarks-january-2025-update","displayName":"CIS Benchmarks January 2025 Update","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"CIS Benchmarks January 2025 Update"},"template":{"__ref":"ItemTemplate:2AAF7415514F5C10B597D162F39A1E4E"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1736864520000}},"CISInfoHubPages:A2B19B758C094CF69DAA49356FC44805":{"__typename":"CISInfoHubPages","id":"A2B19B758C094CF69DAA49356FC44805","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002FContent\u002FInfoHub\u002Fcis-benchmarks-owner","field({\"name\":\"owner\"})":{"__typename":"ReferenceField","value":"{2E6FD602-06DA-5187-A787-AE5BE20DD812}"},"field({\"name\":\"isGeneric\"})":{"__typename":"CheckboxField","boolValue":false},"field({\"name\":\"isHomepage\"})":{"__typename":"CheckboxField","boolValue":false},"field({\"name\":\"subTitle\"})":{"__typename":"TextField","value":"CIS Benchmarks"},"field({\"name\":\"pages\"})":{"__typename":"MultilistField","targetItems":[{"__ref":"CISResourceBlogRouteType:631834ECBE414B8AAA5FAB88CEA8F71E"},{"__ref":"CISResourceWhitePaperRouteType:51E867E6A0E943AB940E138C236EE4DA"},{"__ref":"CISResourceBlogRouteType:B82D697309EA46D0A809E2A38663726C"},{"__ref":"CISResourceBlogRouteType:0A9311A438F34C23BE55832880909444"}]}},"CISResourceWhitePaperRouteType:ED798A6970E8405C8EC195C488E1CF4D":{"__typename":"CISResourceWhitePaperRouteType","id":"ED798A6970E8405C8EC195C488E1CF4D","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fwhite-papers\u002Fcis-controls-v8-1-mapping-to-ncsc-cyber-essentials-v3-1","url":"\u002Finsights\u002Fwhite-papers\u002Fcis-controls-v8-1-mapping-to-ncsc-cyber-essentials-v3-1","displayName":"CIS Controls v8.1 Mapping to NCSC Cyber Essentials v3.1","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"CIS Controls v8.1 Mapping to NCSC Cyber Essentials v3.1"},"template":{"__ref":"ItemTemplate:A0F8790640805FF7AAA73E7F2EF7A26A"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1742849940000}},"CISResourceWhitePaperRouteType:709234C1EE144D53A006D4A7B499C146":{"__typename":"CISResourceWhitePaperRouteType","id":"709234C1EE144D53A006D4A7B499C146","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fwhite-papers\u002FCIS Controls v8-1 Mapping to NCSC CAF v3-2","url":"\u002Finsights\u002Fwhite-papers\u002Fcis-controls-v8-1-mapping-to-ncsc-caf-v3-2","displayName":"CIS Controls v8.1 Mapping to NCSC CAF v3.2","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"CIS Controls v8.1 Mapping to NCSC CAF v3.2"},"template":{"__ref":"ItemTemplate:A0F8790640805FF7AAA73E7F2EF7A26A"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1742225220000}},"CISResourceWhitePaperRouteType:55A76F13F7A64B8798C31F057BD13BDC":{"__typename":"CISResourceWhitePaperRouteType","id":"55A76F13F7A64B8798C31F057BD13BDC","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fwhite-papers\u002FCIS Controls v8-1 Mapping to GSMA FS-31 Baseline Security Controls v4-0","url":"\u002Finsights\u002Fwhite-papers\u002Fcis-controls-v8-1-mapping-to-gsma-fs-31-baseline-security-controls-v4-0","displayName":"CIS Controls v8.1 Mapping to GSMA FS.31 Baseline Security Controls v4.0","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"CIS Controls v8.1 Mapping to GSMA FS.31 Baseline Security Controls v4.0"},"template":{"__ref":"ItemTemplate:A0F8790640805FF7AAA73E7F2EF7A26A"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1742225220000}},"CISResourceWhitePaperRouteType:3E847BF318FA4C41BF667171B4429E55":{"__typename":"CISResourceWhitePaperRouteType","id":"3E847BF318FA4C41BF667171B4429E55","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fwhite-papers\u002FCIS Controls v8-1 Mapping to ASD Essential Eight","url":"\u002Finsights\u002Fwhite-papers\u002Fcis-controls-v8-1-mapping-to-asd-essential-eight","displayName":"CIS Controls v8.1 Mapping to ASD Essential Eight","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"CIS Controls v8.1 Mapping to ASD Essential Eight"},"template":{"__ref":"ItemTemplate:A0F8790640805FF7AAA73E7F2EF7A26A"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1742225220000}},"CISInfoHubPages:20F7065F4F1243398CBBCD03B7078864":{"__typename":"CISInfoHubPages","id":"20F7065F4F1243398CBBCD03B7078864","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002FContent\u002FInfoHub\u002Fcis-controls-owner","field({\"name\":\"owner\"})":{"__typename":"ReferenceField","value":"{74CCE205-EB59-520F-A66B-4FD1FC70F279}"},"field({\"name\":\"isGeneric\"})":{"__typename":"CheckboxField","boolValue":false},"field({\"name\":\"isHomepage\"})":{"__typename":"CheckboxField","boolValue":false},"field({\"name\":\"subTitle\"})":{"__typename":"TextField","value":"CIS Controls"},"field({\"name\":\"pages\"})":{"__typename":"MultilistField","targetItems":[{"__ref":"CISResourceWhitePaperRouteType:ED798A6970E8405C8EC195C488E1CF4D"},{"__ref":"CISResourceWhitePaperRouteType:709234C1EE144D53A006D4A7B499C146"},{"__ref":"CISResourceWhitePaperRouteType:55A76F13F7A64B8798C31F057BD13BDC"},{"__ref":"CISResourceWhitePaperRouteType:3E847BF318FA4C41BF667171B4429E55"}]}},"CISResourceWhitePaperRouteType:A0A82BE479114924B35BE5756CB46DA0":{"__typename":"CISResourceWhitePaperRouteType","id":"A0A82BE479114924B35BE5756CB46DA0","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fwhite-papers\u002Fcybersecurity-quarterly-winter-2024","url":"\u002Finsights\u002Fwhite-papers\u002Fcybersecurity-quarterly-winter-2024","displayName":"Cybersecurity Quarterly Winter 2024","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"Cybersecurity Quarterly Winter 2024"},"template":{"__ref":"ItemTemplate:A0F8790640805FF7AAA73E7F2EF7A26A"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1736948580000}},"CISResourceBlogRouteType:53B440CAE3F84002B03CDB6C42475246":{"__typename":"CISResourceBlogRouteType","id":"53B440CAE3F84002B03CDB6C42475246","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fblog\u002F12-cis-experts-cybersecurity-predictions-2025","url":"\u002Finsights\u002Fblog\u002F12-cis-experts-cybersecurity-predictions-2025","displayName":"12 CIS Experts' Cybersecurity Predictions for 2025","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"12 CIS Experts' Cybersecurity Predictions for 2025"},"template":{"__ref":"ItemTemplate:2AAF7415514F5C10B597D162F39A1E4E"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1733412420000}},"CISResourceWhitePaperRouteType:71007088D2F54A6A9A02959723AEBD6B":{"__typename":"CISResourceWhitePaperRouteType","id":"71007088D2F54A6A9A02959723AEBD6B","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fwhite-papers\u002FCybersecurity Quarterly Fall 2024","url":"\u002Finsights\u002Fwhite-papers\u002Fcybersecurity-quarterly-fall-2024","displayName":"Cybersecurity Quarterly Fall 2024","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"Cybersecurity Quarterly Fall 2024"},"template":{"__ref":"ItemTemplate:A0F8790640805FF7AAA73E7F2EF7A26A"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1728306300000}},"CISInfoHubPages:8EB2420933EA4B8FA255D62F0E0975D3":{"__typename":"CISInfoHubPages","id":"8EB2420933EA4B8FA255D62F0E0975D3","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002FContent\u002FInfoHub\u002Fcis-cybermarket-owner","field({\"name\":\"owner\"})":{"__typename":"ReferenceField","value":"{EF534102-8C87-5E0D-B4C6-FDCF23E563C7}"},"field({\"name\":\"isGeneric\"})":{"__typename":"CheckboxField","boolValue":false},"field({\"name\":\"isHomepage\"})":{"__typename":"CheckboxField","boolValue":false},"field({\"name\":\"subTitle\"})":{"__typename":"TextField","value":"CIS CyberMarket"},"field({\"name\":\"pages\"})":{"__typename":"MultilistField","targetItems":[{"__ref":"CISResourceWhitePaperRouteType:51E867E6A0E943AB940E138C236EE4DA"},{"__ref":"CISResourceWhitePaperRouteType:A0A82BE479114924B35BE5756CB46DA0"},{"__ref":"CISResourceBlogRouteType:53B440CAE3F84002B03CDB6C42475246"},{"__ref":"CISResourceWhitePaperRouteType:71007088D2F54A6A9A02959723AEBD6B"}]}},"CISResourceWhitePaperRouteType:AA71090E28A74788BF5D2DE7ACA2CA82":{"__typename":"CISResourceWhitePaperRouteType","id":"AA71090E28A74788BF5D2DE7ACA2CA82","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fwhite-papers\u002Fsecuring-scaling-cloud-adoption-sltt-organizations","url":"\u002Finsights\u002Fwhite-papers\u002Fsecuring-scaling-cloud-adoption-sltt-organizations","displayName":"Securing and Scaling Cloud Adoption for SLTT Organizations","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"Securing and Scaling Cloud Adoption for SLTT Organizations"},"template":{"__ref":"ItemTemplate:A0F8790640805FF7AAA73E7F2EF7A26A"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1732638060000}},"ItemTemplate:166E538304785F8D9F5861A81B056FC4":{"__typename":"ItemTemplate","id":"166E538304785F8D9F5861A81B056FC4","name":"CIS-Resource-Webinar-RouteType"},"CISResourceWebinarRouteType:3670AC39A451481BBBB2889BA1745171":{"__typename":"CISResourceWebinarRouteType","id":"3670AC39A451481BBBB2889BA1745171","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fwebinar\u002FCloud Desktop Resilience Blueprint Expert Insights and Strategies","url":"\u002Finsights\u002Fwebinar\u002Fcloud-desktop-resilience-blueprint-expert-insights-and-strategies","displayName":"Cloud Desktop Resilience Blueprint: Expert Insights and Strategies","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"Cloud Desktop Resilience Blueprint: Expert Insights and Strategies"},"template":{"__ref":"ItemTemplate:166E538304785F8D9F5861A81B056FC4"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1730205840000}},"CISResourceWebinarRouteType:353CD948E7B645E9AFD538C9FB55F1E4":{"__typename":"CISResourceWebinarRouteType","id":"353CD948E7B645E9AFD538C9FB55F1E4","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fwebinar\u002FMaximizing Cloud Security and Efficiency with Nerdio and CIS Hardened Images","url":"\u002Finsights\u002Fwebinar\u002Fmaximizing-cloud-security-and-efficiency-with-nerdio-and-cis-hardened-images","displayName":"Maximizing Cloud Security and Efficiency with Nerdio and CIS Hardened Images","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"Maximizing Cloud Security and Efficiency with Nerdio and CIS Hardened Images"},"template":{"__ref":"ItemTemplate:166E538304785F8D9F5861A81B056FC4"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1729600980000}},"CISInfoHubPages:D9871457DE8442A48189FB5F598C6623":{"__typename":"CISInfoHubPages","id":"D9871457DE8442A48189FB5F598C6623","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002FContent\u002FInfoHub\u002Fcis-hardened-images-owner","field({\"name\":\"owner\"})":{"__typename":"ReferenceField","value":"{44BCB76B-7F76-576C-947A-02B957604BC4}"},"field({\"name\":\"isGeneric\"})":{"__typename":"CheckboxField","boolValue":false},"field({\"name\":\"isHomepage\"})":{"__typename":"CheckboxField","boolValue":false},"field({\"name\":\"subTitle\"})":{"__typename":"TextField","value":"CIS Hardened Images"},"field({\"name\":\"pages\"})":{"__typename":"MultilistField","targetItems":[{"__ref":"CISResourceWhitePaperRouteType:51E867E6A0E943AB940E138C236EE4DA"},{"__ref":"CISResourceWhitePaperRouteType:AA71090E28A74788BF5D2DE7ACA2CA82"},{"__ref":"CISResourceWebinarRouteType:3670AC39A451481BBBB2889BA1745171"},{"__ref":"CISResourceWebinarRouteType:353CD948E7B645E9AFD538C9FB55F1E4"}]}},"CISResourceWebinarRouteType:33451B287B0D4E259CBE227863BABFE3":{"__typename":"CISResourceWebinarRouteType","id":"33451B287B0D4E259CBE227863BABFE3","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fwebinar\u002Fhow-to-test-your-reasonable-cyber-defenses","url":"\u002Finsights\u002Fwebinar\u002Fhow-to-test-your-reasonable-cyber-defenses","displayName":"How Risk Quantification Tests Your Reasonable Cyber Defense","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"How Risk Quantification Tests Your Reasonable Cyber Defense"},"template":{"__ref":"ItemTemplate:166E538304785F8D9F5861A81B056FC4"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1740414180000}},"CISResourceWebinarRouteType:5EF43DA777B8466BABBE7D1FD5DDD0AB":{"__typename":"CISResourceWebinarRouteType","id":"5EF43DA777B8466BABBE7D1FD5DDD0AB","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fwebinar\u002Fcis-securesuite-product-vendor-membership-enhance-your-product-service-offerings","url":"\u002Finsights\u002Fwebinar\u002Fcis-securesuite-product-vendor-membership-enhance-your-product-service-offerings","displayName":"CIS SecureSuite Product Vendor Membership: Enhance Your Product and Service Offerings","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"CIS SecureSuite Product Vendor Membership: Enhance Your Product and Service Offerings"},"template":{"__ref":"ItemTemplate:166E538304785F8D9F5861A81B056FC4"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1736794020000}},"CISResourceWebinarRouteType:4E9F06D0017ED0FE2991E0925E63AD2B":{"__typename":"CISResourceWebinarRouteType","id":"4E9F06D0017ED0FE2991E0925E63AD2B","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fwebinar\u002Feffective-implementation-of-the-cis-benchmarks-and-cis-controls","url":"\u002Finsights\u002Fwebinar\u002Feffective-implementation-of-the-cis-benchmarks-and-cis-controls","displayName":"Effective Implementation of the CIS Benchmarks and CIS Controls","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"Effective Implementation of the CIS Benchmarks and CIS Controls"},"template":{"__ref":"ItemTemplate:166E538304785F8D9F5861A81B056FC4"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1736532840000}},"CISResourceBlogRouteType:B23B74F447914693AF1014FDB0D20C7B":{"__typename":"CISResourceBlogRouteType","id":"B23B74F447914693AF1014FDB0D20C7B","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fblog\u002FBuilding a Reasonable Cyber Defense Program","url":"\u002Finsights\u002Fblog\u002Fbuilding-a-reasonable-cyber-defense-program","displayName":"Building a Reasonable Cyber Defense Program","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"Building a Reasonable Cyber Defense Program"},"template":{"__ref":"ItemTemplate:2AAF7415514F5C10B597D162F39A1E4E"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1726026420000}},"CISInfoHubPages:F8A03F8DD436493CAECA77CA3842B715":{"__typename":"CISInfoHubPages","id":"F8A03F8DD436493CAECA77CA3842B715","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002FContent\u002FInfoHub\u002Fcis-securesuite-owner","field({\"name\":\"owner\"})":{"__typename":"ReferenceField","value":"{58BCBBDF-6877-560E-96F1-5F2358637BD1}"},"field({\"name\":\"isGeneric\"})":{"__typename":"CheckboxField","boolValue":false},"field({\"name\":\"isHomepage\"})":{"__typename":"CheckboxField","boolValue":false},"field({\"name\":\"subTitle\"})":{"__typename":"TextField","value":"CIS SecureSuite"},"field({\"name\":\"pages\"})":{"__typename":"MultilistField","targetItems":[{"__ref":"CISResourceWebinarRouteType:33451B287B0D4E259CBE227863BABFE3"},{"__ref":"CISResourceWebinarRouteType:5EF43DA777B8466BABBE7D1FD5DDD0AB"},{"__ref":"CISResourceWebinarRouteType:4E9F06D0017ED0FE2991E0925E63AD2B"},{"__ref":"CISResourceBlogRouteType:B23B74F447914693AF1014FDB0D20C7B"}]}},"ItemTemplate:510C9D3F0B8D5A05930577D10935B86D":{"__typename":"ItemTemplate","id":"510C9D3F0B8D5A05930577D10935B86D","name":"CIS-Resource-Press-Release-RouteType"},"CISResourcePressReleaseRouteType:F20FB81545AE4E1AB7F0D1C211D7A642":{"__typename":"CISResourcePressReleaseRouteType","id":"F20FB81545AE4E1AB7F0D1C211D7A642","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Fabout-us\u002Fmedia\u002Fpress-release\u002FNew Intelligence Subscription Informs Organizations of Multidimensional Threats","url":"\u002Fabout-us\u002Fmedia\u002Fpress-release\u002Fnew-intelligence-subscription-informs-organizations--of-multidimensional-threats","displayName":"New Intelligence Subscription Informs Organizations of Multidimensional Threats","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"New Intelligence Subscription Informs Organizations of Multidimensional Threats"},"template":{"__ref":"ItemTemplate:510C9D3F0B8D5A05930577D10935B86D"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1732565100000}},"CISResourceWhitePaperRouteType:670A6F09FB804F3D816F3F7BD37B0158":{"__typename":"CISResourceWhitePaperRouteType","id":"670A6F09FB804F3D816F3F7BD37B0158","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fwhite-papers\u002FReasonable Cybersecurity Guide","url":"\u002Finsights\u002Fwhite-papers\u002Freasonable-cybersecurity-guide","displayName":"Reasonable Cybersecurity Guide","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"Reasonable Cybersecurity Guide"},"template":{"__ref":"ItemTemplate:A0F8790640805FF7AAA73E7F2EF7A26A"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1729864080000}},"CISResourceWhitePaperRouteType:9CAC7816B4D94FB18DAB7631130E0CEF":{"__typename":"CISResourceWhitePaperRouteType","id":"9CAC7816B4D94FB18DAB7631130E0CEF","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fwhite-papers\u002FThe CIS Security Operations Center SOC The Key to Growing Your SLTTs Cyber Maturity","url":"\u002Finsights\u002Fwhite-papers\u002Fthe-cis-security-operations-center-soc-the-key-to-growing-your-sltts-cyber-maturity","displayName":"The CIS Security Operations Center (SOC): The Key to Growing Your SLTT's Cyber Maturity","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"The CIS Security Operations Center (SOC): The Key to Growing Your SLTT's Cyber Maturity"},"template":{"__ref":"ItemTemplate:A0F8790640805FF7AAA73E7F2EF7A26A"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1724898840000}},"CISInfoHubPages:BAFCBB62482E44B99D30E19EE5803D10":{"__typename":"CISInfoHubPages","id":"BAFCBB62482E44B99D30E19EE5803D10","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002FContent\u002FInfoHub\u002Fcis-services-owner","field({\"name\":\"owner\"})":{"__typename":"ReferenceField","value":"{46D73C5E-C911-5BBD-BD34-DD2DB2562E2B}"},"field({\"name\":\"isGeneric\"})":{"__typename":"CheckboxField","boolValue":false},"field({\"name\":\"isHomepage\"})":{"__typename":"CheckboxField","boolValue":false},"field({\"name\":\"subTitle\"})":{"__typename":"TextField","value":"CIS Services"},"field({\"name\":\"pages\"})":{"__typename":"MultilistField","targetItems":[{"__ref":"CISResourceBlogRouteType:53B440CAE3F84002B03CDB6C42475246"},{"__ref":"CISResourcePressReleaseRouteType:F20FB81545AE4E1AB7F0D1C211D7A642"},{"__ref":"CISResourceWhitePaperRouteType:670A6F09FB804F3D816F3F7BD37B0158"},{"__ref":"CISResourceWhitePaperRouteType:9CAC7816B4D94FB18DAB7631130E0CEF"}]}},"CISResourcePressReleaseRouteType:E59BD8B14EA24B389BB4848F92DA38D2":{"__typename":"CISResourcePressReleaseRouteType","id":"E59BD8B14EA24B389BB4848F92DA38D2","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Fabout-us\u002Fmedia\u002Fpress-release\u002FCenter for Internet Security Releases K-12 Cybersecurity Report","url":"\u002Fabout-us\u002Fmedia\u002Fpress-release\u002Fcenter-for-internet-security-releases-k-12-cybersecurity-report","displayName":"Center for Internet Security Releases K-12 Cybersecurity Report","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"Center for Internet Security Releases K-12 Cybersecurity Report"},"template":{"__ref":"ItemTemplate:510C9D3F0B8D5A05930577D10935B86D"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1741715580000}},"CISResourceWhitePaperRouteType:A029869A07E94126AFCCCD22A4B7F3F4":{"__typename":"CISResourceWhitePaperRouteType","id":"A029869A07E94126AFCCCD22A4B7F3F4","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fwhite-papers\u002F2025-k12-cybersecurity-report","url":"\u002Finsights\u002Fwhite-papers\u002F2025-k12-cybersecurity-report","displayName":"2025 K-12 State of Cybersecurity Report: Where Education Meets Community Resilience","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"2025 CIS MS-ISAC K-12 Cybersecurity Report: Where Education Meets Community Resilience"},"template":{"__ref":"ItemTemplate:A0F8790640805FF7AAA73E7F2EF7A26A"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1741280700000}},"ItemTemplate:09A0529BD4EA5F2DBA29426950E364E6":{"__typename":"ItemTemplate","id":"09A0529BD4EA5F2DBA29426950E364E6","name":"CIS-Resource-CaseStudy-RouteType"},"CISResourceCaseStudyRouteType:089763A358A444A3B57D1BAEC93D6AF1":{"__typename":"CISResourceCaseStudyRouteType","id":"089763A358A444A3B57D1BAEC93D6AF1","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fcase-study\u002FFormalizing K-12 Cybersecurity Policies in Less Time","url":"\u002Finsights\u002Fcase-study\u002Fformalizing-k-12-cybersecurity-policies-in-less-time","displayName":"Formalizing K-12 Cybersecurity Policies in Less Time","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"Formalizing K-12 Cybersecurity Policies in Less Time"},"template":{"__ref":"ItemTemplate:09A0529BD4EA5F2DBA29426950E364E6"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1708104180000}},"CISResourcePressReleaseRouteType:FEC391B5511848B893C821D8E9058BA8":{"__typename":"CISResourcePressReleaseRouteType","id":"FEC391B5511848B893C821D8E9058BA8","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Fabout-us\u002Fmedia\u002Fpress-release\u002FNew Report Reveals Critical Cybersecurity Insights in K-12 Schools","url":"\u002Fabout-us\u002Fmedia\u002Fpress-release\u002Fnew-report-reveals-critical-cybersecurity-insights-in-k-12-schools","displayName":"New Report Reveals Critical Cybersecurity Insights in K-12 Schools","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"New Report Reveals Critical Cybersecurity Insights in K-12 Schools"},"template":{"__ref":"ItemTemplate:510C9D3F0B8D5A05930577D10935B86D"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1700487720000}},"CISInfoHubPages:7409946519974EAF9D11333D64790219":{"__typename":"CISInfoHubPages","id":"7409946519974EAF9D11333D64790219","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002FContent\u002FInfoHub\u002Feducation-sector","field({\"name\":\"owner\"})":{"__typename":"ReferenceField","value":"{78BB4F2C-83E4-534D-869C-5DEF71534EB8}"},"field({\"name\":\"isGeneric\"})":{"__typename":"CheckboxField","boolValue":false},"field({\"name\":\"isHomepage\"})":{"__typename":"CheckboxField","boolValue":false},"field({\"name\":\"subTitle\"})":{"__typename":"TextField","value":"Education"},"field({\"name\":\"pages\"})":{"__typename":"MultilistField","targetItems":[{"__ref":"CISResourcePressReleaseRouteType:E59BD8B14EA24B389BB4848F92DA38D2"},{"__ref":"CISResourceWhitePaperRouteType:A029869A07E94126AFCCCD22A4B7F3F4"},{"__ref":"CISResourceCaseStudyRouteType:089763A358A444A3B57D1BAEC93D6AF1"},{"__ref":"CISResourcePressReleaseRouteType:FEC391B5511848B893C821D8E9058BA8"}]}},"ItemTemplate:194F40483FF15ABF9DD3E54CCA4A7376":{"__typename":"ItemTemplate","id":"194F40483FF15ABF9DD3E54CCA4A7376","name":"CIS-Resource-Advisory-RouteType"},"CISResourceAdvisoryRouteType:97509C544B2B281A0C77BBE19C355694":{"__typename":"CISResourceAdvisoryRouteType","id":"97509C544B2B281A0C77BBE19C355694","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Fadvisory\u002Fa-vulnerability-in-ivanti-products-could-allow-for-remote-code-execution_2025-034","url":"\u002Fadvisory\u002Fa-vulnerability-in-ivanti-products-could-allow-for-remote-code-execution_2025-034","displayName":"2025-034: A Vulnerability in Ivanti Products Could Allow for Remote Code Execution","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"A Vulnerability in Ivanti Products Could Allow for Remote Code Execution"},"template":{"__ref":"ItemTemplate:194F40483FF15ABF9DD3E54CCA4A7376"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1743714146000}},"CISResourceAdvisoryRouteType:4F899679932FE52CF5CEBB660F3972BD":{"__typename":"CISResourceAdvisoryRouteType","id":"4F899679932FE52CF5CEBB660F3972BD","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Fadvisory\u002Fa-vulnerability-in-google-chrome-could-allow-for-arbitrary-code-execution_2025-031","url":"\u002Fadvisory\u002Fa-vulnerability-in-google-chrome-could-allow-for-arbitrary-code-execution_2025-031","displayName":"2025-031: A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution"},"template":{"__ref":"ItemTemplate:194F40483FF15ABF9DD3E54CCA4A7376"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1743002918000}},"CISResourcePressReleaseRouteType:FC5C292F8E1D460CBBDC73F572486439":{"__typename":"CISResourcePressReleaseRouteType","id":"FC5C292F8E1D460CBBDC73F572486439","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Fabout-us\u002Fmedia\u002Fpress-release\u002FCIS Statement on the Passing of Tenable CEO Amit Yoran","url":"\u002Fabout-us\u002Fmedia\u002Fpress-release\u002Fcis-statement-on-the-passing-of-tenable-ceo-amit-yoran","displayName":"CIS Statement on the Passing of Tenable CEO Amit Yoran","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"CIS Statement on the Passing of Tenable CEO Amit Yoran"},"template":{"__ref":"ItemTemplate:510C9D3F0B8D5A05930577D10935B86D"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1736201700000}},"CISInfoHubPages:FAB4BF7ADA164C65A7A5BBA79CE0E6B2":{"__typename":"CISInfoHubPages","id":"FAB4BF7ADA164C65A7A5BBA79CE0E6B2","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002FContent\u002FInfoHub\u002Feiisac-owner","field({\"name\":\"owner\"})":{"__typename":"ReferenceField","value":"{DBCE1B44-7F3B-5F29-AC2A-408492C4DC47}"},"field({\"name\":\"isGeneric\"})":{"__typename":"CheckboxField","boolValue":false},"field({\"name\":\"isHomepage\"})":{"__typename":"CheckboxField","boolValue":false},"field({\"name\":\"subTitle\"})":{"__typename":"TextField","value":"EI-ISAC"},"field({\"name\":\"pages\"})":{"__typename":"MultilistField","targetItems":[{"__ref":"CISResourceAdvisoryRouteType:97509C544B2B281A0C77BBE19C355694"},{"__ref":"CISResourceAdvisoryRouteType:4F899679932FE52CF5CEBB660F3972BD"},{"__ref":"CISResourceWhitePaperRouteType:51E867E6A0E943AB940E138C236EE4DA"},{"__ref":"CISResourcePressReleaseRouteType:FC5C292F8E1D460CBBDC73F572486439"}]}},"CISResourceWebinarRouteType:CC0178180D774B989DEBDC7721BD1483":{"__typename":"CISResourceWebinarRouteType","id":"CC0178180D774B989DEBDC7721BD1483","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fwebinar\u002Fsecurely-migrating-cloud-overview-process-strategy","url":"\u002Finsights\u002Fwebinar\u002Fsecurely-migrating-cloud-overview-process-strategy","displayName":"Securely Migrating to the Cloud: An Overview of Process and Strategy","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"Securely Migrating to the Cloud: An Overview of Process and Strategy"},"template":{"__ref":"ItemTemplate:166E538304785F8D9F5861A81B056FC4"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1742838180000}},"CISResourceWebinarRouteType:A105DE51D39347129E4AA67F9F854901":{"__typename":"CISResourceWebinarRouteType","id":"A105DE51D39347129E4AA67F9F854901","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fwebinar\u002Fnavigating-financial-cybersecurity-compliance-and-security-posture","url":"\u002Finsights\u002Fwebinar\u002Fnavigating-financial-cybersecurity-compliance-and-security-posture","displayName":"Banking on CIS: Navigating Financial Cybersecurity Compliance and  Security Posture","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"Banking on CIS: Navigating Financial Cybersecurity Compliance and  Security Posture"},"template":{"__ref":"ItemTemplate:166E538304785F8D9F5861A81B056FC4"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1742833260000}},"CISResourceWhitePaperRouteType:F9F5E430E50CB3BBD0007587303CCBBD":{"__typename":"CISResourceWhitePaperRouteType","id":"F9F5E430E50CB3BBD0007587303CCBBD","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fwhite-papers\u002Fa-cyber-defense-guide-for-the-financial-sector","url":"\u002Finsights\u002Fwhite-papers\u002Fa-cyber-defense-guide-for-the-financial-sector","displayName":"A Cyber Defense Guide for the Financial Sector","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"A Cyber Defense Guide for the Financial Sector"},"template":{"__ref":"ItemTemplate:A0F8790640805FF7AAA73E7F2EF7A26A"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1719430680000}},"CISResourceWhitePaperRouteType:430E8EA49B524D9B85E1400E9C8793BE":{"__typename":"CISResourceWhitePaperRouteType","id":"430E8EA49B524D9B85E1400E9C8793BE","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fwhite-papers\u002FHow to Plan a Cybersecurity Roadmap in 4 Steps","url":"\u002Finsights\u002Fwhite-papers\u002Fhow-to-plan-a-cybersecurity-roadmap-in-4-steps","displayName":"How to Plan a Cybersecurity Roadmap in 4 Steps","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"How to Plan a Cybersecurity Roadmap in 4 Steps"},"template":{"__ref":"ItemTemplate:A0F8790640805FF7AAA73E7F2EF7A26A"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1690547460000}},"CISInfoHubPages:F96AC088E5A3429B9CC1D0FDACB75C3C":{"__typename":"CISInfoHubPages","id":"F96AC088E5A3429B9CC1D0FDACB75C3C","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002FContent\u002FInfoHub\u002Ffinance-industry","field({\"name\":\"owner\"})":{"__typename":"ReferenceField","value":"{6D8BA4F5-E636-5AF5-8ABE-77106573A8CC}"},"field({\"name\":\"isGeneric\"})":{"__typename":"CheckboxField","boolValue":false},"field({\"name\":\"isHomepage\"})":{"__typename":"CheckboxField","boolValue":false},"field({\"name\":\"subTitle\"})":{"__typename":"TextField","value":"Finance"},"field({\"name\":\"pages\"})":{"__typename":"MultilistField","targetItems":[{"__ref":"CISResourceWebinarRouteType:CC0178180D774B989DEBDC7721BD1483"},{"__ref":"CISResourceWebinarRouteType:A105DE51D39347129E4AA67F9F854901"},{"__ref":"CISResourceWhitePaperRouteType:F9F5E430E50CB3BBD0007587303CCBBD"},{"__ref":"CISResourceWhitePaperRouteType:430E8EA49B524D9B85E1400E9C8793BE"}]}},"CISResourceBlogRouteType:9C39AB11F4DB4837B7637FF8404FE4BE":{"__typename":"CISResourceBlogRouteType","id":"9C39AB11F4DB4837B7637FF8404FE4BE","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fblog\u002Fffiec-cat-sunset-what-you-need-know","url":"\u002Finsights\u002Fblog\u002Fffiec-cat-sunset-what-you-need-know","displayName":" FFIEC CAT Sunset: What You Need to Know","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":" FFIEC CAT Sunset: What You Need to Know"},"template":{"__ref":"ItemTemplate:2AAF7415514F5C10B597D162F39A1E4E"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1744031940000}},"CISResourcePressReleaseRouteType:006972ED34194660B117D18899A45F65":{"__typename":"CISResourcePressReleaseRouteType","id":"006972ED34194660B117D18899A45F65","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Fabout-us\u002Fmedia\u002Fpress-release\u002Fthe-center-for-internet-security-to-be-featured-on-bloomberg-televisions-the-american-dream","url":"\u002Fabout-us\u002Fmedia\u002Fpress-release\u002Fthe-center-for-internet-security-to-be-featured-on-bloomberg-televisions-the-american-dream","displayName":"The Center for Internet Security to be Featured on Bloomberg Television’s ‘The American Dream’ ","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"The Center for Internet Security to be Featured on Bloomberg Television’s ‘The American Dream’"},"template":{"__ref":"ItemTemplate:510C9D3F0B8D5A05930577D10935B86D"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1742836800000}},"CISInfoHubPages:C8E4BAB3B2D64698981752904F30BDBE":{"__typename":"CISInfoHubPages","id":"C8E4BAB3B2D64698981752904F30BDBE","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002FContent\u002FInfoHub\u002FGeneric","field({\"name\":\"owner\"})":{"__typename":"ReferenceField","value":""},"field({\"name\":\"isGeneric\"})":{"__typename":"CheckboxField","boolValue":true},"field({\"name\":\"isHomepage\"})":{"__typename":"CheckboxField","boolValue":false},"field({\"name\":\"subTitle\"})":{"__typename":"TextField","value":""},"field({\"name\":\"pages\"})":{"__typename":"MultilistField","targetItems":[{"__ref":"CISResourceBlogRouteType:9C39AB11F4DB4837B7637FF8404FE4BE"},{"__ref":"CISResourceWhitePaperRouteType:ED798A6970E8405C8EC195C488E1CF4D"},{"__ref":"CISResourceWebinarRouteType:CC0178180D774B989DEBDC7721BD1483"},{"__ref":"CISResourcePressReleaseRouteType:006972ED34194660B117D18899A45F65"}]}},"CISResourceWhitePaperRouteType:EA41EADB11684722A116FE25E1F52AE3":{"__typename":"CISResourceWhitePaperRouteType","id":"EA41EADB11684722A116FE25E1F52AE3","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fwhite-papers\u002Fcis-controls-v8-1-mapping-to-hipaa","url":"\u002Finsights\u002Fwhite-papers\u002Fcis-controls-v8-1-mapping-to-hipaa","displayName":"CIS Controls v8.1 Mapping to HIPAA","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"CIS Controls v8.1 Mapping to Health Insurance Portability and Accountability Act (HIPAA), Regulation Text, 2013"},"template":{"__ref":"ItemTemplate:A0F8790640805FF7AAA73E7F2EF7A26A"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1738691520000}},"CISResourceBlogRouteType:96BDE663DF6442F4B8663AB1E9E6C2A5":{"__typename":"CISResourceBlogRouteType","id":"96BDE663DF6442F4B8663AB1E9E6C2A5","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fblog\u002FBalancing Your Healthcare Cybersecurity and Compliance Efforts","url":"\u002Finsights\u002Fblog\u002Fbalancing-your-healthcare-cybersecurity-and-compliance-efforts","displayName":"Balancing Your Healthcare Cybersecurity & Compliance Efforts","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"Balancing Your Healthcare Cybersecurity & Compliance Efforts"},"template":{"__ref":"ItemTemplate:2AAF7415514F5C10B597D162F39A1E4E"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1713185520000}},"CISResourceWhitePaperRouteType:83D8DF1CD7F848E69C7636C9FF64A33D":{"__typename":"CISResourceWhitePaperRouteType","id":"83D8DF1CD7F848E69C7636C9FF64A33D","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fwhite-papers\u002FRansomware Defense-in-Depth","url":"\u002Finsights\u002Fwhite-papers\u002Fransomware-defense-in-depth","displayName":"Ransomware Defense-in-Depth","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"Ransomware Defense-in-Depth"},"template":{"__ref":"ItemTemplate:A0F8790640805FF7AAA73E7F2EF7A26A"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1696979400000}},"CISInfoHubPages:02832523BA2F429EA73E6592C79292BE":{"__typename":"CISInfoHubPages","id":"02832523BA2F429EA73E6592C79292BE","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002FContent\u002FInfoHub\u002Fhealthcare-sector","field({\"name\":\"owner\"})":{"__typename":"ReferenceField","value":"{C49BDBA9-72C2-53FC-A7CC-24C35CD5CF6A}"},"field({\"name\":\"isGeneric\"})":{"__typename":"CheckboxField","boolValue":false},"field({\"name\":\"isHomepage\"})":{"__typename":"CheckboxField","boolValue":false},"field({\"name\":\"subTitle\"})":{"__typename":"TextField","value":"Healthcare & Life Sciences"},"field({\"name\":\"pages\"})":{"__typename":"MultilistField","targetItems":[{"__ref":"CISResourceWebinarRouteType:CC0178180D774B989DEBDC7721BD1483"},{"__ref":"CISResourceWhitePaperRouteType:EA41EADB11684722A116FE25E1F52AE3"},{"__ref":"CISResourceBlogRouteType:96BDE663DF6442F4B8663AB1E9E6C2A5"},{"__ref":"CISResourceWhitePaperRouteType:83D8DF1CD7F848E69C7636C9FF64A33D"}]}},"CISResourceAdvisoryRouteType:907F86AD633BE5FE40076C9117E6C900":{"__typename":"CISResourceAdvisoryRouteType","id":"907F86AD633BE5FE40076C9117E6C900","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Fadvisory\u002Fmultiple-vulnerabilities-in-mozilla-products-could-allow-for-arbitrary-code-execution_2025-035","url":"\u002Fadvisory\u002Fmultiple-vulnerabilities-in-mozilla-products-could-allow-for-arbitrary-code-execution_2025-035","displayName":"2025-035: Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution"},"template":{"__ref":"ItemTemplate:194F40483FF15ABF9DD3E54CCA4A7376"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1743715363000}},"CISInfoHubPages:0237798C95A64FC197A657EAE49DC881":{"__typename":"CISInfoHubPages","id":"0237798C95A64FC197A657EAE49DC881","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002FContent\u002FInfoHub\u002FHomepage","field({\"name\":\"owner\"})":{"__typename":"ReferenceField","value":""},"field({\"name\":\"isGeneric\"})":{"__typename":"CheckboxField","boolValue":false},"field({\"name\":\"isHomepage\"})":{"__typename":"CheckboxField","boolValue":true},"field({\"name\":\"subTitle\"})":{"__typename":"TextField","value":"What's New"},"field({\"name\":\"pages\"})":{"__typename":"MultilistField","targetItems":[{"__ref":"CISResourceBlogRouteType:9C39AB11F4DB4837B7637FF8404FE4BE"},{"__ref":"CISResourceAdvisoryRouteType:907F86AD633BE5FE40076C9117E6C900"},{"__ref":"CISResourceAdvisoryRouteType:97509C544B2B281A0C77BBE19C355694"},{"__ref":"CISResourceWhitePaperRouteType:ED798A6970E8405C8EC195C488E1CF4D"}]}},"CISResourceWhitePaperRouteType:D2ACCB48018D4B7A864D0697B22A9456":{"__typename":"CISResourceWhitePaperRouteType","id":"D2ACCB48018D4B7A864D0697B22A9456","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fwhite-papers\u002Fstrengthening-critical-infrastructure-sltt-progress-priorities","url":"\u002Finsights\u002Fwhite-papers\u002Fstrengthening-critical-infrastructure-sltt-progress-priorities","displayName":"Strengthening Critical Infrastructure: SLTT Progress & Priorities","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"Strengthening Critical Infrastructure: SLTT Progress & Priorities"},"template":{"__ref":"ItemTemplate:A0F8790640805FF7AAA73E7F2EF7A26A"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1740577020000}},"CISInfoHubPages:7B9BEED144F44AEAB00C315AFD9358A7":{"__typename":"CISInfoHubPages","id":"7B9BEED144F44AEAB00C315AFD9358A7","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002FContent\u002FInfoHub\u002Fmsisac-owner","field({\"name\":\"owner\"})":{"__typename":"ReferenceField","value":"{D41DF5F5-1997-5662-BBBB-4AE63430599E}"},"field({\"name\":\"isGeneric\"})":{"__typename":"CheckboxField","boolValue":false},"field({\"name\":\"isHomepage\"})":{"__typename":"CheckboxField","boolValue":false},"field({\"name\":\"subTitle\"})":{"__typename":"TextField","value":"MS-ISAC"},"field({\"name\":\"pages\"})":{"__typename":"MultilistField","targetItems":[{"__ref":"CISResourceAdvisoryRouteType:907F86AD633BE5FE40076C9117E6C900"},{"__ref":"CISResourceAdvisoryRouteType:97509C544B2B281A0C77BBE19C355694"},{"__ref":"CISResourceWhitePaperRouteType:A029869A07E94126AFCCCD22A4B7F3F4"},{"__ref":"CISResourceWhitePaperRouteType:D2ACCB48018D4B7A864D0697B22A9456"}]}},"CISResourceWebinarRouteType:005F72E9B7D64C0CA3FC89DDFB0C21AA":{"__typename":"CISResourceWebinarRouteType","id":"005F72E9B7D64C0CA3FC89DDFB0C21AA","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fwebinar\u002FAdd Value to Your Bottom Line with CIS SecureSuite","url":"\u002Finsights\u002Fwebinar\u002Fadd-value-to-your-bottom-line-with-cis-securesuite","displayName":"Add Value to Your Bottom Line with CIS SecureSuite","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"Add Value to Your Bottom Line with CIS SecureSuite"},"template":{"__ref":"ItemTemplate:166E538304785F8D9F5861A81B056FC4"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1723521600000}},"CISResourceBlogRouteType:D9E6BBC02F6C1E9EC53A0FBDC125AAC8":{"__typename":"CISResourceBlogRouteType","id":"D9E6BBC02F6C1E9EC53A0FBDC125AAC8","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fblog\u002Fcis-benchmarks-community-volunteer-spotlight-bruce-bading","url":"\u002Finsights\u002Fblog\u002Fcis-benchmarks-community-volunteer-spotlight-bruce-bading","displayName":"CIS Benchmarks Community Volunteer Spotlight: Bruce Bading","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"CIS Benchmarks Community Volunteer Spotlight: Bruce Bading"},"template":{"__ref":"ItemTemplate:2AAF7415514F5C10B597D162F39A1E4E"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1715089980000}},"CISResourceCaseStudyRouteType:B82EFF34F99549E1A0A57D57EE8C294C":{"__typename":"CISResourceCaseStudyRouteType","id":"B82EFF34F99549E1A0A57D57EE8C294C","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fcase-study\u002FExpert Driven Cybersecurity Audits for Clients in Less Time","url":"\u002Finsights\u002Fcase-study\u002Fexpert-driven-cybersecurity-audits-for-clients-in-less-time","displayName":"Expert Driven Cybersecurity Audits for Clients in Less Time","field({\"name\":\"resourceTitle\"})":{"__typename":"TextField","value":"Expert-Driven Cybersecurity Audits for Clients in Less Time"},"template":{"__ref":"ItemTemplate:09A0529BD4EA5F2DBA29426950E364E6"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","dateValue":1702406220000}},"CISInfoHubPages:84490FCECA324111840F5395C8E25AA2":{"__typename":"CISInfoHubPages","id":"84490FCECA324111840F5395C8E25AA2","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002FContent\u002FInfoHub\u002Ftechnology-industry","field({\"name\":\"owner\"})":{"__typename":"ReferenceField","value":"{67384E63-79EE-57ED-8614-AF999768E345}"},"field({\"name\":\"isGeneric\"})":{"__typename":"CheckboxField","boolValue":false},"field({\"name\":\"isHomepage\"})":{"__typename":"CheckboxField","boolValue":false},"field({\"name\":\"subTitle\"})":{"__typename":"TextField","value":"Technology"},"field({\"name\":\"pages\"})":{"__typename":"MultilistField","targetItems":[{"__ref":"CISResourceWebinarRouteType:CC0178180D774B989DEBDC7721BD1483"},{"__ref":"CISResourceWebinarRouteType:005F72E9B7D64C0CA3FC89DDFB0C21AA"},{"__ref":"CISResourceBlogRouteType:D9E6BBC02F6C1E9EC53A0FBDC125AAC8"},{"__ref":"CISResourceCaseStudyRouteType:B82EFF34F99549E1A0A57D57EE8C294C"}]}},"UnknownItem:73FC51D2D08F4C038427C7906A6F7327":{"__typename":"UnknownItem","id":"73FC51D2D08F4C038427C7906A6F7327","children":[{"__ref":"CISInfoHubPages:A2B19B758C094CF69DAA49356FC44805"},{"__ref":"CISInfoHubPages:20F7065F4F1243398CBBCD03B7078864"},{"__ref":"CISInfoHubPages:8EB2420933EA4B8FA255D62F0E0975D3"},{"__ref":"CISInfoHubPages:D9871457DE8442A48189FB5F598C6623"},{"__ref":"CISInfoHubPages:F8A03F8DD436493CAECA77CA3842B715"},{"__ref":"CISInfoHubPages:BAFCBB62482E44B99D30E19EE5803D10"},{"__ref":"CISInfoHubPages:7409946519974EAF9D11333D64790219"},{"__ref":"CISInfoHubPages:FAB4BF7ADA164C65A7A5BBA79CE0E6B2"},{"__ref":"CISInfoHubPages:F96AC088E5A3429B9CC1D0FDACB75C3C"},{"__ref":"CISInfoHubPages:C8E4BAB3B2D64698981752904F30BDBE"},{"__ref":"CISInfoHubPages:02832523BA2F429EA73E6592C79292BE"},{"__ref":"CISInfoHubPages:0237798C95A64FC197A657EAE49DC881"},{"__ref":"CISInfoHubPages:7B9BEED144F44AEAB00C315AFD9358A7"},{"__ref":"CISInfoHubPages:84490FCECA324111840F5395C8E25AA2"}]},"UnknownItem:05104A9745674C0897E7122D45274800":{"__typename":"UnknownItem","id":"05104A9745674C0897E7122D45274800","name":"App Route","displayName":"App Route"},"UnknownItem:25976F8932E35E5F89CF43A9E6FDD9D1":{"__typename":"UnknownItem","id":"25976F8932E35E5F89CF43A9E6FDD9D1","name":"CIS-Accordion Rendering Parameters","displayName":"Accordion Rendering Parameters"},"UnknownItem:654A5326D5FE507FAE99203CF07A6D97":{"__typename":"UnknownItem","id":"654A5326D5FE507FAE99203CF07A6D97","name":"CIS-Accordion-Item","displayName":"Accordion Item"},"UnknownItem:61970B12AFFD52FEAB5682734F8CF49E":{"__typename":"UnknownItem","id":"61970B12AFFD52FEAB5682734F8CF49E","name":"CIS-Accordion-Item Rendering Parameters","displayName":"Accordion Item Rendering Parameters"},"UnknownItem:EDD596891C295A83B23D0B8E7D0AF200":{"__typename":"UnknownItem","id":"EDD596891C295A83B23D0B8E7D0AF200","name":"CIS-Alert","displayName":"Alert Primary"},"UnknownItem:36573E59D96254AD9D477CE46A2D7A4E":{"__typename":"UnknownItem","id":"36573E59D96254AD9D477CE46A2D7A4E","name":"CIS-Alert Rendering Parameters","displayName":"Alert Primary Rendering Parameters"},"UnknownItem:0222735171775548871E8344357F03C1":{"__typename":"UnknownItem","id":"0222735171775548871E8344357F03C1","name":"CIS-Alert-Secondary","displayName":"Alert Secondary"},"UnknownItem:B6A5D9D14F665A4B8FFE74A4D3FE19DB":{"__typename":"UnknownItem","id":"B6A5D9D14F665A4B8FFE74A4D3FE19DB","name":"CIS-Alert-Secondary Rendering Parameters","displayName":"Alert Secondary Rendering Parameters"},"UnknownItem:99DF8D58A5965DD4B0654D6396C97AF7":{"__typename":"UnknownItem","id":"99DF8D58A5965DD4B0654D6396C97AF7","name":"CIS-Banner","displayName":"Banner"},"UnknownItem:1CFB0CEA8963547FA61132C3F6F995A2":{"__typename":"UnknownItem","id":"1CFB0CEA8963547FA61132C3F6F995A2","name":"CIS-Banner Rendering Parameters","displayName":"Banner Rendering Parameters"},"UnknownItem:C2369A6D424859FA97876690FBCA9286":{"__typename":"UnknownItem","id":"C2369A6D424859FA97876690FBCA9286","name":"CIS-Benchmark-CIS-CAT-Pro Rendering Parameters","displayName":"Benchmark CIS-CAT Pro Table Rendering Parameters"},"UnknownItem:C5630ECA1F1656A092300E023DC100EB":{"__typename":"UnknownItem","id":"C5630ECA1F1656A092300E023DC100EB","name":"CIS-Blockquote","displayName":"Blockquote"},"UnknownItem:0BDF9E5DC70E598A87EB7DF41327D232":{"__typename":"UnknownItem","id":"0BDF9E5DC70E598A87EB7DF41327D232","name":"CIS-Blockquote Rendering Parameters","displayName":"Blockquote Rendering Parameters"},"UnknownItem:E4D1EEC3E7D75ED2AF4C14202D2831BE":{"__typename":"UnknownItem","id":"E4D1EEC3E7D75ED2AF4C14202D2831BE","name":"CIS-Blockquote-Blue-Box","displayName":"Blockquote Blue Box"},"UnknownItem:3AA81F723B635263A817F0B32FAEF083":{"__typename":"UnknownItem","id":"3AA81F723B635263A817F0B32FAEF083","name":"CIS-Blockquote-Blue-Box Rendering Parameters","displayName":"Blockquote Blue Box Rendering Parameters"},"UnknownItem:B463F024F6015539920EE91D08688C76":{"__typename":"UnknownItem","id":"B463F024F6015539920EE91D08688C76","name":"CIS-Blockquote-Carousel","displayName":"Blockquote Carousel"},"UnknownItem:B3A875531ECE548FA0EB5B533F3ECF85":{"__typename":"UnknownItem","id":"B3A875531ECE548FA0EB5B533F3ECF85","name":"CIS-Blockquote-Carousel Rendering Parameters","displayName":"Blockquote Carousel Rendering Parameters"},"UnknownItem:2FA6748D8AA555AEAC324351916569A0":{"__typename":"UnknownItem","id":"2FA6748D8AA555AEAC324351916569A0","name":"CIS-Blockquote-Carousel-Item","displayName":"Blockquote Carousel Item"},"UnknownItem:82015A8049545625AFC4A4BDAEEA5F50":{"__typename":"UnknownItem","id":"82015A8049545625AFC4A4BDAEEA5F50","name":"CIS-Blockquote-Carousel-Item Rendering Parameters","displayName":"Blockquote Carousel Item Rendering Parameters"},"UnknownItem:6008CB52B8BB5ECDB94973AF83CF5F87":{"__typename":"UnknownItem","id":"6008CB52B8BB5ECDB94973AF83CF5F87","name":"CIS-Breadcrumb Rendering Parameters","displayName":"Breadcrumb Rendering Parameters"},"UnknownItem:28B02FB26C5C5043B23CC5C263EA3EC3":{"__typename":"UnknownItem","id":"28B02FB26C5C5043B23CC5C263EA3EC3","name":"CIS-Checkmark-Table","displayName":"Checkmark Table"},"UnknownItem:57E1FCDCD57F5CD799E79354F83DB4BC":{"__typename":"UnknownItem","id":"57E1FCDCD57F5CD799E79354F83DB4BC","name":"CIS-Checkmark-Table Rendering Parameters","displayName":"Checkmark Table Rendering Parameters"},"UnknownItem:FC1242F39F4F51F7A8BAF0005A2F39D0":{"__typename":"UnknownItem","id":"FC1242F39F4F51F7A8BAF0005A2F39D0","name":"CIS-Cloud-Provider","displayName":"CIS-Cloud-Provider"},"UnknownItem:617C085E6D3E56C5838439661DB554D2":{"__typename":"UnknownItem","id":"617C085E6D3E56C5838439661DB554D2","name":"CIS-ContentBlock","displayName":"Content Block"},"UnknownItem:B2E767A150C75BAD892F7A9227A27F01":{"__typename":"UnknownItem","id":"B2E767A150C75BAD892F7A9227A27F01","name":"CIS-ContentBlock Rendering Parameters","displayName":"Content Block Rendering Parameters"},"UnknownItem:31A8ED43B16F59919FECDBCFA7C76272":{"__typename":"UnknownItem","id":"31A8ED43B16F59919FECDBCFA7C76272","name":"CIS-Content-Block-With-CTA","displayName":"Content Block With CTA"},"UnknownItem:04AED49860C454DEA111B8D812456BF5":{"__typename":"UnknownItem","id":"04AED49860C454DEA111B8D812456BF5","name":"CIS-Content-Block-With-CTA Rendering Parameters","displayName":"Content Block With CTA Rendering Parameters"},"UnknownItem:9141EA22DBE05AE893ABC8308F85C390":{"__typename":"UnknownItem","id":"9141EA22DBE05AE893ABC8308F85C390","name":"CIS-Content-Block-With-Label","displayName":"Content Block With Label"},"UnknownItem:092FA848A9B25C73845767EA63EA5C67":{"__typename":"UnknownItem","id":"092FA848A9B25C73845767EA63EA5C67","name":"CIS-Content-Block-With-Label Rendering Parameters","displayName":"Content Block With Label Rendering Parameters"},"UnknownItem:3E10F74A18E45F48B35FBEFDAB530264":{"__typename":"UnknownItem","id":"3E10F74A18E45F48B35FBEFDAB530264","name":"CIS-Content-Blue-Box","displayName":"Content Blue Box"},"UnknownItem:3CF9E12DFDB55140994BEA50BF7EDAA5":{"__typename":"UnknownItem","id":"3CF9E12DFDB55140994BEA50BF7EDAA5","name":"CIS-Content-Blue-Box Rendering Parameters","displayName":"Content Blue Box Rendering Parameters"},"UnknownItem:E2606B523B1055D9AC84B092D206DDCD":{"__typename":"UnknownItem","id":"E2606B523B1055D9AC84B092D206DDCD","name":"CIS-Content-Card","displayName":"Content Card"},"UnknownItem:4B80CCF1E069534EBAB423577B68C0AD":{"__typename":"UnknownItem","id":"4B80CCF1E069534EBAB423577B68C0AD","name":"CIS-Content-Card Rendering Parameters","displayName":"Content Card Rendering Parameters"},"UnknownItem:C6C188CE6A135AB69DE29350758244A9":{"__typename":"UnknownItem","id":"C6C188CE6A135AB69DE29350758244A9","name":"CIS-Content-Cards","displayName":"Content Cards"},"UnknownItem:BBEA85A9DD3759449CAD4D2DAC98630B":{"__typename":"UnknownItem","id":"BBEA85A9DD3759449CAD4D2DAC98630B","name":"CIS-Content-Cards Rendering Parameters","displayName":"Content Cards Rendering Parameters"},"UnknownItem:5EB5CFE599F65F06B20287C257C24703":{"__typename":"UnknownItem","id":"5EB5CFE599F65F06B20287C257C24703","name":"CIS-Content-Carousel","displayName":"Content Carousel"},"UnknownItem:0DF4E0BF83B15DD6978516E6FE09F2E0":{"__typename":"UnknownItem","id":"0DF4E0BF83B15DD6978516E6FE09F2E0","name":"CIS-Content-Carousel Rendering Parameters","displayName":"Content Carousel Rendering Parameters"},"UnknownItem:276D0A2D3E835B8D93BCFF6E3550E2D7":{"__typename":"UnknownItem","id":"276D0A2D3E835B8D93BCFF6E3550E2D7","name":"CIS-Content-Carousel-Item","displayName":"Content Carousel Item"},"UnknownItem:2D17C4CFB694571EAB008FD21D4E428E":{"__typename":"UnknownItem","id":"2D17C4CFB694571EAB008FD21D4E428E","name":"CIS-Content-Carousel-Item Rendering Parameters","displayName":"Content Carousel Item Rendering Parameters"},"UnknownItem:C2ED25D7B79658958D0D6A50796213F2":{"__typename":"UnknownItem","id":"C2ED25D7B79658958D0D6A50796213F2","name":"CIS-Content-Gray-Box","displayName":"Content Gray Box"},"UnknownItem:DC747D8485C558EE9A6D095A13CF901B":{"__typename":"UnknownItem","id":"DC747D8485C558EE9A6D095A13CF901B","name":"CIS-Content-Gray-Box Rendering Parameters","displayName":"Content Gray Box Rendering Parameters"},"UnknownItem:C716DB1970125757ADC8B296A2BD352D":{"__typename":"UnknownItem","id":"C716DB1970125757ADC8B296A2BD352D","name":"CIS-Content-One-Column Rendering Parameters","displayName":"Content One Column Rendering Parameters"},"UnknownItem:2225924DDFF950C4918AFB1F930CD648":{"__typename":"UnknownItem","id":"2225924DDFF950C4918AFB1F930CD648","name":"CIS-Content-Three-Column","displayName":"Content Three Column"},"UnknownItem:B6EC178E989C55A39177F5D20BDFEDB0":{"__typename":"UnknownItem","id":"B6EC178E989C55A39177F5D20BDFEDB0","name":"CIS-Content-Three-Column Rendering Parameters","displayName":"Content Three Column Rendering Parameters"},"UnknownItem:35359F197DFF54EEA09CC9DCA96F2945":{"__typename":"UnknownItem","id":"35359F197DFF54EEA09CC9DCA96F2945","name":"CIS-Content-Two-Column","displayName":"Content Two Column"},"UnknownItem:42C9154F826C56758DE768D934557968":{"__typename":"UnknownItem","id":"42C9154F826C56758DE768D934557968","name":"CIS-Content-Two-Column Rendering Parameters","displayName":"Content Two Column Rendering Parameters"},"UnknownItem:6D1AA6DD55935A5983F18B56986A60FE":{"__typename":"UnknownItem","id":"6D1AA6DD55935A5983F18B56986A60FE","name":"CIS-Control","displayName":"CIS-Control"},"UnknownItem:062C868D36955AEBBF7F9633892B5549":{"__typename":"UnknownItem","id":"062C868D36955AEBBF7F9633892B5549","name":"CIS-Control-Mapping","displayName":"CIS-Control-Mapping"},"UnknownItem:3C9A9E1FB1935100BFC7011C5357665E":{"__typename":"UnknownItem","id":"3C9A9E1FB1935100BFC7011C5357665E","name":"CIS-Control-MappingElement","displayName":"CIS-Control-MappingElement"},"UnknownItem:C55226DC395550AABCECD4BCF7CCE202":{"__typename":"UnknownItem","id":"C55226DC395550AABCECD4BCF7CCE202","name":"CIS-Control-Safeguard","displayName":"CIS-Control-Safeguard"},"UnknownItem:56B4ED956812564B81B8D7742E90CCFD":{"__typename":"UnknownItem","id":"56B4ED956812564B81B8D7742E90CCFD","name":"CIS-Controls-Navigator","displayName":"Controls Navigator"},"UnknownItem:F7E49042DE9A56918991E65D94831AF0":{"__typename":"UnknownItem","id":"F7E49042DE9A56918991E65D94831AF0","name":"CIS-Controls-Navigator Rendering Parameters","displayName":"Controls Navigator Rendering Parameters"},"UnknownItem:A8ECE93CD2D55F8086D5E35045120FA3":{"__typename":"UnknownItem","id":"A8ECE93CD2D55F8086D5E35045120FA3","name":"CIS-Controls-Navigator-Selector","displayName":"Controls Navigator Selector"},"UnknownItem:86D8FE2241F358A0B6EF8CE8E7CD23F4":{"__typename":"UnknownItem","id":"86D8FE2241F358A0B6EF8CE8E7CD23F4","name":"CIS-Controls-Navigator-Selector Rendering Parameters","displayName":"Controls Navigator Selector Rendering Parameters"},"UnknownItem:4BDC4A1E54305EF595AB7DB3B8806B65":{"__typename":"UnknownItem","id":"4BDC4A1E54305EF595AB7DB3B8806B65","name":"CIS-Controls-Navigator-Selector-Item","displayName":"Controls Navigator Selector Item"},"UnknownItem:6A72ED2F0E9851C38834DA5CDD4AC402":{"__typename":"UnknownItem","id":"6A72ED2F0E9851C38834DA5CDD4AC402","name":"CIS-Controls-Resources","displayName":"Controls Resources"},"UnknownItem:14827B7DB5395EE4A29E477B9C17CCE2":{"__typename":"UnknownItem","id":"14827B7DB5395EE4A29E477B9C17CCE2","name":"CIS-Controls-Resources Rendering Parameters","displayName":"Controls Resources Rendering Parameters"},"UnknownItem:4800E7D5D2765501BA934DEC4C0410ED":{"__typename":"UnknownItem","id":"4800E7D5D2765501BA934DEC4C0410ED","name":"CIS-Controls-ResourcesData","displayName":"CIS-Controls-ResourcesData"},"UnknownItem:8EA112C7D8705C03A04AF92AA2645DFE":{"__typename":"UnknownItem","id":"8EA112C7D8705C03A04AF92AA2645DFE","name":"CIS-CTA-Carousel","displayName":"CTA Carousel"},"UnknownItem:CECA807BE4D0536C926CC8FAB7BE4773":{"__typename":"UnknownItem","id":"CECA807BE4D0536C926CC8FAB7BE4773","name":"CIS-CTA-Carousel Rendering Parameters","displayName":"CTA Carousel Rendering Parameters"},"UnknownItem:112FE6BF57565AF6B31EB59D5C937B13":{"__typename":"UnknownItem","id":"112FE6BF57565AF6B31EB59D5C937B13","name":"CIS-CTA-Carousel-Item","displayName":"CTA Carousel Item"},"UnknownItem:6A8CD26E9A6E5DD0A08268474074D0A5":{"__typename":"UnknownItem","id":"6A8CD26E9A6E5DD0A08268474074D0A5","name":"CIS-CTA-Carousel-Item Rendering Parameters","displayName":"CTA Carousel Item Rendering Parameters"},"UnknownItem:4A502403686757B782CD29CCC125AEBC":{"__typename":"UnknownItem","id":"4A502403686757B782CD29CCC125AEBC","name":"CIS-CTA-Carousel-Item-CTA","displayName":"CTA Carousel Item - CTA"},"UnknownItem:13E2C7EB1819568E8C83BE5856650CFB":{"__typename":"UnknownItem","id":"13E2C7EB1819568E8C83BE5856650CFB","name":"CIS-CTA-Carousel-Item-CTA Rendering Parameters","displayName":"CTA Carousel Item - CTA Rendering Parameters"},"UnknownItem:BE4D2A0641EB5F19966ABD29E166D62F":{"__typename":"UnknownItem","id":"BE4D2A0641EB5F19966ABD29E166D62F","name":"CIS-CTA-Primary","displayName":"CTA - Primary"},"UnknownItem:0F6FB27DEEA550DC985B0D1C634A9EDC":{"__typename":"UnknownItem","id":"0F6FB27DEEA550DC985B0D1C634A9EDC","name":"CIS-CTA-Primary Rendering Parameters","displayName":"CTA - Primary Rendering Parameters"},"UnknownItem:8191F46236375E248461969F5B6F83E7":{"__typename":"UnknownItem","id":"8191F46236375E248461969F5B6F83E7","name":"CIS-CTA-Secondary","displayName":"CTA - Secondary"},"UnknownItem:5ACAB8BF85D3566EBD76545C2B76255B":{"__typename":"UnknownItem","id":"5ACAB8BF85D3566EBD76545C2B76255B","name":"CIS-CTA-Secondary Rendering Parameters","displayName":"CTA - Secondary Rendering Parameters"},"UnknownItem:5DC368C7496B55E993F08EE79087E6B3":{"__typename":"UnknownItem","id":"5DC368C7496B55E993F08EE79087E6B3","name":"CIS-CTA-Tertiary","displayName":"CTA - Tertiary"},"UnknownItem:3AA48A34B4005CDF9EBA63FD96C1073B":{"__typename":"UnknownItem","id":"3AA48A34B4005CDF9EBA63FD96C1073B","name":"CIS-CTA-Tertiary Rendering Parameters","displayName":"CTA - Tertiary Rendering Parameters"},"UnknownItem:784D976034CC579FA1A913547B803B97":{"__typename":"UnknownItem","id":"784D976034CC579FA1A913547B803B97","name":"CIS-Cybersecurity-Tools","displayName":"Cybersecurity Tools"},"UnknownItem:656AA2AF4DB7584B9E50CE8AE18099BC":{"__typename":"UnknownItem","id":"656AA2AF4DB7584B9E50CE8AE18099BC","name":"CIS-Cybersecurity-Tools Rendering Parameters","displayName":"Cybersecurity Tools Rendering Parameters"},"UnknownItem:DC573AEEA6E4586287E1A6988044CE50":{"__typename":"UnknownItem","id":"DC573AEEA6E4586287E1A6988044CE50","name":"CIS-Cybersecurity-Tools-Cost-Item","displayName":"Cybersecurity Tools Cost Item"},"UnknownItem:420A2A16E07054D4B9180C3856058F96":{"__typename":"UnknownItem","id":"420A2A16E07054D4B9180C3856058F96","name":"CIS-Cybersecurity-Tools-Item","displayName":"Cybersecurity Tools Item"},"UnknownItem:9BBBFFE7A8715E54BB20981D7051C96E":{"__typename":"UnknownItem","id":"9BBBFFE7A8715E54BB20981D7051C96E","name":"CIS-DropDown-ContentWithLinks","displayName":"Drop Down Content With Links"},"UnknownItem:4BFFEE1C5D385C6D951FCE9AC6283A37":{"__typename":"UnknownItem","id":"4BFFEE1C5D385C6D951FCE9AC6283A37","name":"CIS-DropDown-ContentWithLinks Rendering Parameters","displayName":"Drop Down Content With Links Rendering Parameters"},"UnknownItem:696DF76BC39C52D295BA0F473A40D663":{"__typename":"UnknownItem","id":"696DF76BC39C52D295BA0F473A40D663","name":"CIS-DropDown-FullWidthLinks","displayName":"Drop Down Full Width With Links"},"UnknownItem:4C3E12653C2A5BEDA207439400B29465":{"__typename":"UnknownItem","id":"4C3E12653C2A5BEDA207439400B29465","name":"CIS-DropDown-FullWidthLinks Rendering Parameters","displayName":"Drop Down Full Width With Links Rendering Parameters"},"UnknownItem:FC4C00AC3E155F00BD9C001818185FE7":{"__typename":"UnknownItem","id":"FC4C00AC3E155F00BD9C001818185FE7","name":"CIS-DropDown-FullWidthLinkSection","displayName":"Drop Down Full Width With Link Section"},"UnknownItem:A54B1EB8E6405DCBAC5EE4AA3D1EC082":{"__typename":"UnknownItem","id":"A54B1EB8E6405DCBAC5EE4AA3D1EC082","name":"CIS-DropDown-FullWidthLinkSection Rendering Parameters","displayName":"Drop Down Full Width With Link Section Rendering Parameters"},"UnknownItem:C218753CEEA059338124CE3572B926F6":{"__typename":"UnknownItem","id":"C218753CEEA059338124CE3572B926F6","name":"CIS-DropDown-LinkSection","displayName":"Dropdown Link Section"},"UnknownItem:386ADEAFB07C5770ADD8A2CA88364BE1":{"__typename":"UnknownItem","id":"386ADEAFB07C5770ADD8A2CA88364BE1","name":"CIS-DropDown-LinkSection Rendering Parameters","displayName":"Dropdown Link Section Rendering Parameters"},"UnknownItem:118EC5FD205C59649BE8B4B922C13649":{"__typename":"UnknownItem","id":"118EC5FD205C59649BE8B4B922C13649","name":"CIS-DropDown-LinkSection-Bordered","displayName":"Dropdown Link Section with Border"},"UnknownItem:4F9E6E6C6FA65BF589A01FA725432210":{"__typename":"UnknownItem","id":"4F9E6E6C6FA65BF589A01FA725432210","name":"CIS-DropDown-LinkSection-Bordered Rendering Parameters","displayName":"Dropdown Link Section with Border Rendering Parameters"},"UnknownItem:898785BA5D11569687481E7F2CB79332":{"__typename":"UnknownItem","id":"898785BA5D11569687481E7F2CB79332","name":"CIS-DropDown-LinkSectionWithBg","displayName":"Dropdown Link Section with Background"},"UnknownItem:EE422D1B38C8506AAD62DF9D3FB8DCD9":{"__typename":"UnknownItem","id":"EE422D1B38C8506AAD62DF9D3FB8DCD9","name":"CIS-DropDown-LinkSectionWithBg Rendering Parameters","displayName":"Dropdown Link Section with Background Rendering Parameters"},"UnknownItem:4EBBF67DE3375F5BAFD7EE12035EAA4A":{"__typename":"UnknownItem","id":"4EBBF67DE3375F5BAFD7EE12035EAA4A","name":"CIS-DropDown-TwoColumn","displayName":"Dropdown Two Column"},"UnknownItem:20DCE8E195B3535CAF2747B0665585D2":{"__typename":"UnknownItem","id":"20DCE8E195B3535CAF2747B0665585D2","name":"CIS-DropDown-TwoColumn Rendering Parameters","displayName":"Dropdown Two Column Rendering Parameters"},"UnknownItem:E0EBEB5488795970892012E1A3B2EEC8":{"__typename":"UnknownItem","id":"E0EBEB5488795970892012E1A3B2EEC8","name":"CIS-Facebook-Metadata","displayName":"CIS-Facebook-Metadata"},"UnknownItem:AAE201A7D95A5F73A84226B9872101FA":{"__typename":"UnknownItem","id":"AAE201A7D95A5F73A84226B9872101FA","name":"CIS-FAQ Rendering Parameters","displayName":"Accordion Cluster Rendering Parameters"},"UnknownItem:78903705A2265316A99DE32C4B3A2327":{"__typename":"UnknownItem","id":"78903705A2265316A99DE32C4B3A2327","name":"CIS-FAQ-Item","displayName":"Accordion Cluster Item"},"UnknownItem:7D5BDF64319555B3B844667F01A09976":{"__typename":"UnknownItem","id":"7D5BDF64319555B3B844667F01A09976","name":"CIS-FAQ-Item Rendering Parameters","displayName":"Accordion Cluster Item Rendering Parameters"},"UnknownItem:C0CCBDBEC3155BC6A8FB6D5536B04665":{"__typename":"UnknownItem","id":"C0CCBDBEC3155BC6A8FB6D5536B04665","name":"CIS-FAQ-Item-Headline","displayName":"Accordion Headline"},"UnknownItem:202B65178FC55A20AA4DB43497D36821":{"__typename":"UnknownItem","id":"202B65178FC55A20AA4DB43497D36821","name":"CIS-FAQ-Item-Headline Rendering Parameters","displayName":"Accordion Headline Rendering Parameters"},"UnknownItem:6831C6A81E745D67ACC0CE24B06C62AA":{"__typename":"UnknownItem","id":"6831C6A81E745D67ACC0CE24B06C62AA","name":"CIS-Featured-Article","displayName":"Featured Article"},"UnknownItem:5E636F6F024058EFA4F1C47EDD8A972A":{"__typename":"UnknownItem","id":"5E636F6F024058EFA4F1C47EDD8A972A","name":"CIS-Featured-Article Rendering Parameters","displayName":"Featured Article Rendering Parameters"},"UnknownItem:C247A3EC9E29516A8FDE72D00650A5F0":{"__typename":"UnknownItem","id":"C247A3EC9E29516A8FDE72D00650A5F0","name":"CIS-Footer","displayName":"Footer"},"UnknownItem:C8AC4ADE75345A1B94B1DD6E5D3BC600":{"__typename":"UnknownItem","id":"C8AC4ADE75345A1B94B1DD6E5D3BC600","name":"CIS-Footer Rendering Parameters","displayName":"Footer Rendering Parameters"},"UnknownItem:AC4F3F00796D597B8F4AF9D256D0F1CA":{"__typename":"UnknownItem","id":"AC4F3F00796D597B8F4AF9D256D0F1CA","name":"CIS-Footer-Copyright","displayName":"Footer Copyright"},"UnknownItem:02FDC9D9D16151E5894D95560A04D73F":{"__typename":"UnknownItem","id":"02FDC9D9D16151E5894D95560A04D73F","name":"CIS-Footer-Copyright Rendering Parameters","displayName":"Footer Copyright Rendering Parameters"},"UnknownItem:F7FDFD6A992F50DFB680E3DE7A3EB529":{"__typename":"UnknownItem","id":"F7FDFD6A992F50DFB680E3DE7A3EB529","name":"CIS-Footer-NavList","displayName":"Footer Nav List"},"UnknownItem:F12C40A742B6529EA6C20B1BDFBA6303":{"__typename":"UnknownItem","id":"F12C40A742B6529EA6C20B1BDFBA6303","name":"CIS-Footer-NavList Rendering Parameters","displayName":"Footer Nav List Rendering Parameters"},"UnknownItem:FE8F1176CC0258B3AD21AB3D508C1FB4":{"__typename":"UnknownItem","id":"FE8F1176CC0258B3AD21AB3D508C1FB4","name":"CIS-Footer-NavList-Link","displayName":"Footer Nav List Link"},"UnknownItem:BFF01B2277575BCB97258B95C3535F18":{"__typename":"UnknownItem","id":"BFF01B2277575BCB97258B95C3535F18","name":"CIS-Footer-NavList-Link Rendering Parameters","displayName":"Footer Nav List Link Rendering Parameters"},"UnknownItem:153312F5F50E5AE79F17158C113F2C8E":{"__typename":"UnknownItem","id":"153312F5F50E5AE79F17158C113F2C8E","name":"CIS-Footer-NavList-Spacer","displayName":"Footer Nav List Spacer"},"UnknownItem:9DB128C7A6D85F56A96730879A1BD396":{"__typename":"UnknownItem","id":"9DB128C7A6D85F56A96730879A1BD396","name":"CIS-Footer-NavList-Spacer Rendering Parameters","displayName":"Footer Nav List Spacer Rendering Parameters"},"UnknownItem:994158FB84FD5389B5ACC2CAC39ADE87":{"__typename":"UnknownItem","id":"994158FB84FD5389B5ACC2CAC39ADE87","name":"CIS-Footer-SocialLink","displayName":"Footer Social Link"},"UnknownItem:ABFFA93AA91250458F112C29F70F6F7D":{"__typename":"UnknownItem","id":"ABFFA93AA91250458F112C29F70F6F7D","name":"CIS-Footer-SocialLink Rendering Parameters","displayName":"Footer Social Link Rendering Parameters"},"UnknownItem:D3AF384DA6BE5640BBCE12A2829A3117":{"__typename":"UnknownItem","id":"D3AF384DA6BE5640BBCE12A2829A3117","name":"CIS-Footer-UtilityLink","displayName":"Footer Utility Link"},"UnknownItem:E6FDCD56D42556D7B9E9A430099BE0EB":{"__typename":"UnknownItem","id":"E6FDCD56D42556D7B9E9A430099BE0EB","name":"CIS-Footer-UtilityLink Rendering Parameters","displayName":"Footer Utility Link Rendering Parameters"},"UnknownItem:BCC27A5567705492B762462F7078EDAB":{"__typename":"UnknownItem","id":"BCC27A5567705492B762462F7078EDAB","name":"CIS-From-The-Blog","displayName":"From The Blog"},"UnknownItem:7BA0A22DBC305563A05279C1E967C7EE":{"__typename":"UnknownItem","id":"7BA0A22DBC305563A05279C1E967C7EE","name":"CIS-From-The-Blog Rendering Parameters","displayName":"From The Blog Rendering Parameters"},"UnknownItem:3AB3983031785EC2A3BCD292205A22C8":{"__typename":"UnknownItem","id":"3AB3983031785EC2A3BCD292205A22C8","name":"CIS-Grid","displayName":"Grid Layout"},"UnknownItem:2BB8EA6BB9F45FA6986A95D073BC32B2":{"__typename":"UnknownItem","id":"2BB8EA6BB9F45FA6986A95D073BC32B2","name":"CIS-Grid Rendering Parameters","displayName":"Grid Layout Rendering Parameters"},"UnknownItem:C1B0C68ECF4C5D73B3982D26AC440AB0":{"__typename":"UnknownItem","id":"C1B0C68ECF4C5D73B3982D26AC440AB0","name":"CIS-Grid-Item","displayName":"Grid Item"},"UnknownItem:EDD6C28F70395477ADAAC58A5D1494D4":{"__typename":"UnknownItem","id":"EDD6C28F70395477ADAAC58A5D1494D4","name":"CIS-Grid-Item Rendering Parameters","displayName":"Grid Item Rendering Parameters"},"UnknownItem:DB3E06E34FA05875B8DD9637690C69F2":{"__typename":"UnknownItem","id":"DB3E06E34FA05875B8DD9637690C69F2","name":"CIS-Hardened-Images-Cloud-Provider-List","displayName":"Hardened Image Cloud Provider List"},"UnknownItem:00377F20DC545E458687D0565817C413":{"__typename":"UnknownItem","id":"00377F20DC545E458687D0565817C413","name":"CIS-Hardened-Images-Cloud-Provider-List Rendering Parameters","displayName":"Hardened Image Cloud Provider List Rendering Parameters"},"UnknownItem:1C8BAAFCDF095160B6B5649E6903E350":{"__typename":"UnknownItem","id":"1C8BAAFCDF095160B6B5649E6903E350","name":"CIS-Hardened-Images-List","displayName":"Hardened Image List"},"UnknownItem:EA2824034B1F5C678FE6CAE3A5955930":{"__typename":"UnknownItem","id":"EA2824034B1F5C678FE6CAE3A5955930","name":"CIS-Hardened-Images-List Rendering Parameters","displayName":"Hardened Image List Rendering Parameters"},"UnknownItem:2376E6C621EA527FA049447F1E5BF190":{"__typename":"UnknownItem","id":"2376E6C621EA527FA049447F1E5BF190","name":"CIS-Hardened-Images-List-Column-Header","displayName":"Hardened Image List Column Header"},"UnknownItem:A7DBE6CB9983568B88A975D2F7D320D8":{"__typename":"UnknownItem","id":"A7DBE6CB9983568B88A975D2F7D320D8","name":"CIS-Hardened-Images-List-Column-Header Rendering Parameters","displayName":"Hardened Image List Column Header Rendering Parameters"},"UnknownItem:046A6C634A715853938CB128738AA365":{"__typename":"UnknownItem","id":"046A6C634A715853938CB128738AA365","name":"CIS-Header","displayName":"Header"},"UnknownItem:EBE9A9E0CE9D56058FC985B0BF0410DF":{"__typename":"UnknownItem","id":"EBE9A9E0CE9D56058FC985B0BF0410DF","name":"CIS-Header Rendering Parameters","displayName":"Header Rendering Parameters"},"UnknownItem:CE964D4541AE529EA57908383DC012C8":{"__typename":"UnknownItem","id":"CE964D4541AE529EA57908383DC012C8","name":"CIS-HeaderUtility-Link","displayName":"Header Utility Link"},"UnknownItem:5A40906F82435F0FADAE690DB93DE446":{"__typename":"UnknownItem","id":"5A40906F82435F0FADAE690DB93DE446","name":"CIS-HeaderUtility-Link Rendering Parameters","displayName":"Header Utility Link Rendering Parameters"},"UnknownItem:DD0E876DC5235F2CA63CAFE1E1B75ABA":{"__typename":"UnknownItem","id":"DD0E876DC5235F2CA63CAFE1E1B75ABA","name":"CIS-Healthcare-Graphic","displayName":"Healthcare Graphic"},"UnknownItem:C261FF0F83B35FC59EC5693DB93E95FD":{"__typename":"UnknownItem","id":"C261FF0F83B35FC59EC5693DB93E95FD","name":"CIS-Healthcare-Graphic Rendering Parameters","displayName":"Healthcare Graphic Rendering Parameters"},"UnknownItem:5383A9B151F950FD8D507F4E37A58C02":{"__typename":"UnknownItem","id":"5383A9B151F950FD8D507F4E37A58C02","name":"CIS-Healthcare-Graphic-Card","displayName":"Healthcare Graphic - Card"},"UnknownItem:C2220DE8F68A599FA2149E246623E9ED":{"__typename":"UnknownItem","id":"C2220DE8F68A599FA2149E246623E9ED","name":"CIS-Healthcare-Graphic-Card Rendering Parameters","displayName":"Healthcare Graphic - Card Rendering Parameters"},"UnknownItem:8CAE35F4D54659BEB3B3BCE374ECB1D8":{"__typename":"UnknownItem","id":"8CAE35F4D54659BEB3B3BCE374ECB1D8","name":"CIS-Healthcare-Graphic-Data","displayName":"Healthcare Graphic - Data"},"UnknownItem:1FD4ED7ECBDD56F0B3D8CD0407E117E1":{"__typename":"UnknownItem","id":"1FD4ED7ECBDD56F0B3D8CD0407E117E1","name":"CIS-Healthcare-Graphic-Data Rendering Parameters","displayName":"Healthcare Graphic - Data Rendering Parameters"},"UnknownItem:8271F0875A8750A4B96CC4203BCBF164":{"__typename":"UnknownItem","id":"8271F0875A8750A4B96CC4203BCBF164","name":"CIS-Healthcare-Graphic-Footnote","displayName":"Healthcare Graphic - Footnote"},"UnknownItem:D9018F43C197527EAA0204E163D60A5A":{"__typename":"UnknownItem","id":"D9018F43C197527EAA0204E163D60A5A","name":"CIS-Healthcare-Graphic-Footnote Rendering Parameters","displayName":"Healthcare Graphic - Footnote Rendering Parameters"},"UnknownItem:F1398E73E3AA5BCA938143C32D7038B5":{"__typename":"UnknownItem","id":"F1398E73E3AA5BCA938143C32D7038B5","name":"CIS-Home-Blockquote","displayName":"Home Blockquote"},"UnknownItem:8B35B9816BC35A9BAA0AA48CDDB3FD86":{"__typename":"UnknownItem","id":"8B35B9816BC35A9BAA0AA48CDDB3FD86","name":"CIS-Home-Blockquote Rendering Parameters","displayName":"Home Blockquote Rendering Parameters"},"UnknownItem:E6C03D8DE5C955A78407E374DED68FB5":{"__typename":"UnknownItem","id":"E6C03D8DE5C955A78407E374DED68FB5","name":"CIS-Home-Blockquote-Item","displayName":"Home Blockquote Item"},"UnknownItem:70F8AA43D05C5675821F4DC6A2222FAD":{"__typename":"UnknownItem","id":"70F8AA43D05C5675821F4DC6A2222FAD","name":"CIS-Home-Blockquote-Item Rendering Parameters","displayName":"Home Blockquote Item Rendering Parameters"},"UnknownItem:DCF4671A8D0455119CDDA0F09CCEB528":{"__typename":"UnknownItem","id":"DCF4671A8D0455119CDDA0F09CCEB528","name":"CIS-Home-Card-Item","displayName":"Home Card Item"},"UnknownItem:91BADACAAFF15B07849F816E86C6DCAC":{"__typename":"UnknownItem","id":"91BADACAAFF15B07849F816E86C6DCAC","name":"CIS-Home-Card-Item Rendering Parameters","displayName":"Home Card Item Rendering Parameters"},"UnknownItem:AD2A0FA22C705BDFB211A2A50E4F18AE":{"__typename":"UnknownItem","id":"AD2A0FA22C705BDFB211A2A50E4F18AE","name":"CIS-Home-Cards","displayName":"Home Cards"},"UnknownItem:F3BEFD9FD7B85410BFCFBB0E2866035A":{"__typename":"UnknownItem","id":"F3BEFD9FD7B85410BFCFBB0E2866035A","name":"CIS-Home-Cards Rendering Parameters","displayName":"Home Cards Rendering Parameters"},"UnknownItem:395F5C17862159F6A613F4A7ADAF250E":{"__typename":"UnknownItem","id":"395F5C17862159F6A613F4A7ADAF250E","name":"CIS-Home-Featured-CTA","displayName":"Home Featured CTA"},"UnknownItem:B137FDD16C605323AA163AF145C57572":{"__typename":"UnknownItem","id":"B137FDD16C605323AA163AF145C57572","name":"CIS-Home-Featured-CTA Rendering Parameters","displayName":"Home Featured CTA Rendering Parameters"},"UnknownItem:92A36E1876F65A74AA34FE809080FBA4":{"__typename":"UnknownItem","id":"92A36E1876F65A74AA34FE809080FBA4","name":"CIS-Home-HeroLayout","displayName":"Home Hero"},"UnknownItem:BCC480AE4E925E2194A92E812F8E194B":{"__typename":"UnknownItem","id":"BCC480AE4E925E2194A92E812F8E194B","name":"CIS-Home-HeroLayout Rendering Parameters","displayName":"Home Hero Rendering Parameters"},"UnknownItem:30D8E852D99950C5B39F4EAA202E3D91":{"__typename":"UnknownItem","id":"30D8E852D99950C5B39F4EAA202E3D91","name":"CIS-Home-Industry","displayName":"Home Industry"},"UnknownItem:52FC3A1840285C408E4CE09B40C84079":{"__typename":"UnknownItem","id":"52FC3A1840285C408E4CE09B40C84079","name":"CIS-Home-Industry Rendering Parameters","displayName":"Home Industry Rendering Parameters"},"UnknownItem:81F23E2A4B0A504DB7148775FA211EC9":{"__typename":"UnknownItem","id":"81F23E2A4B0A504DB7148775FA211EC9","name":"CIS-Home-Masthead","displayName":"Home Masthead"},"UnknownItem:236314BACF3553DABA6AC99A345E2C74":{"__typename":"UnknownItem","id":"236314BACF3553DABA6AC99A345E2C74","name":"CIS-Home-Masthead Rendering Parameters","displayName":"Home Masthead Rendering Parameters"},"UnknownItem:1726A1AE39B15A5E8A4FCFFF8E553DED":{"__typename":"UnknownItem","id":"1726A1AE39B15A5E8A4FCFFF8E553DED","name":"CIS-Home-Update","displayName":"Home Update"},"UnknownItem:D57D08AD2A91573BB8CD77AE8F1A56E2":{"__typename":"UnknownItem","id":"D57D08AD2A91573BB8CD77AE8F1A56E2","name":"CIS-Home-Update Rendering Parameters","displayName":"Home Update Rendering Parameters"},"UnknownItem:444D8EAC9D3A5D1DB0A2ABDF515BCFA8":{"__typename":"UnknownItem","id":"444D8EAC9D3A5D1DB0A2ABDF515BCFA8","name":"CIS-Icon-Group","displayName":"Icon Group"},"UnknownItem:D477C0F08620512C93508AFBF7C4C1B4":{"__typename":"UnknownItem","id":"D477C0F08620512C93508AFBF7C4C1B4","name":"CIS-Icon-Group Rendering Parameters","displayName":"Icon Group Rendering Parameters"},"UnknownItem:EAF395020B585EF09218EAA9CA8E6959":{"__typename":"UnknownItem","id":"EAF395020B585EF09218EAA9CA8E6959","name":"CIS-Icon-Group-Item","displayName":"Icon Group Item"},"UnknownItem:E89983679BEF5851B6846678CB31BD87":{"__typename":"UnknownItem","id":"E89983679BEF5851B6846678CB31BD87","name":"CIS-Icon-Group-Item Rendering Parameters","displayName":"Icon Group Item Rendering Parameters"},"UnknownItem:D2F5F4FF5A7A5B8780337374B2B30578":{"__typename":"UnknownItem","id":"D2F5F4FF5A7A5B8780337374B2B30578","name":"CIS-Image-Carousel","displayName":"Image Carousel"},"UnknownItem:252133AF1CFD5B3EB328801FB0127623":{"__typename":"UnknownItem","id":"252133AF1CFD5B3EB328801FB0127623","name":"CIS-Image-Carousel Rendering Parameters","displayName":"Image Carousel Rendering Parameters"},"UnknownItem:69BA8F1B43FE53C694FBD25A16761567":{"__typename":"UnknownItem","id":"69BA8F1B43FE53C694FBD25A16761567","name":"CIS-Image-Carousel-Item","displayName":"Carousel Image"},"UnknownItem:4D9E877E460855A281E8B6E54D9DCD8C":{"__typename":"UnknownItem","id":"4D9E877E460855A281E8B6E54D9DCD8C","name":"CIS-Image-Carousel-Item Rendering Parameters","displayName":"Carousel Image Rendering Parameters"},"UnknownItem:653504ACEF2950DB98E146F565236D0B":{"__typename":"UnknownItem","id":"653504ACEF2950DB98E146F565236D0B","name":"CIS-InfoHub Rendering Parameters","displayName":"Info Hub Rendering Parameters"},"UnknownItem:7D0E0FFFBB6456A4B93D1FD4584448E2":{"__typename":"UnknownItem","id":"7D0E0FFFBB6456A4B93D1FD4584448E2","name":"CIS-InfoHub-Pages","displayName":"CIS-InfoHub-Pages"},"UnknownItem:54D28DD131695086AE57D1A48A4B16FB":{"__typename":"UnknownItem","id":"54D28DD131695086AE57D1A48A4B16FB","name":"CIS-K12-Graphic","displayName":"K12 Graphic"},"UnknownItem:9E35CF0246F35AA2B74B4B86B39305C5":{"__typename":"UnknownItem","id":"9E35CF0246F35AA2B74B4B86B39305C5","name":"CIS-K12-Graphic Rendering Parameters","displayName":"K12 Graphic Rendering Parameters"},"UnknownItem:5F4B92173F0E5EFBA8B86C6315C2761E":{"__typename":"UnknownItem","id":"5F4B92173F0E5EFBA8B86C6315C2761E","name":"CIS-K12-Graphic-Item","displayName":"K12 Graphic Item"},"UnknownItem:6C296BA33870564E8281721B5F0C16B5":{"__typename":"UnknownItem","id":"6C296BA33870564E8281721B5F0C16B5","name":"CIS-K12-Graphic-Item Rendering Parameters","displayName":"K12 Graphic Item Rendering Parameters"},"UnknownItem:A2C926D705115FFEB19CD0BCD186B5F8":{"__typename":"UnknownItem","id":"A2C926D705115FFEB19CD0BCD186B5F8","name":"CIS-Latest-Advisory","displayName":"Latest Advisory"},"UnknownItem:D08345B9EB8B58E5A865804D549C027C":{"__typename":"UnknownItem","id":"D08345B9EB8B58E5A865804D549C027C","name":"CIS-Latest-Advisory Rendering Parameters","displayName":"Latest Advisory Rendering Parameters"},"UnknownItem:EB8AFF6A2A3A504DA5FA70F766E9EA82":{"__typename":"UnknownItem","id":"EB8AFF6A2A3A504DA5FA70F766E9EA82","name":"CIS-Latest-Alert","displayName":"Latest Alert"},"UnknownItem:A9533A91B1DB5B3998F38F81504EE5DE":{"__typename":"UnknownItem","id":"A9533A91B1DB5B3998F38F81504EE5DE","name":"CIS-Latest-Alert Rendering Parameters","displayName":"Latest Alert Rendering Parameters"},"UnknownItem:9EDEBB2CC0375FBE887DA6B5CB16688F":{"__typename":"UnknownItem","id":"9EDEBB2CC0375FBE887DA6B5CB16688F","name":"CIS-Latest-Insights Rendering Parameters","displayName":"Latest Insights Rendering Parameters"},"UnknownItem:A2EA3F03953651CE8EC857EB6ABD9416":{"__typename":"UnknownItem","id":"A2EA3F03953651CE8EC857EB6ABD9416","name":"CIS-Latest-Insights-Item-Static","displayName":"Latest Insight Item - Static"},"UnknownItem:E20CAD936FCA5C918D4A040E9B24B430":{"__typename":"UnknownItem","id":"E20CAD936FCA5C918D4A040E9B24B430","name":"CIS-Latest-Insights-Item-Static Rendering Parameters","displayName":"Latest Insight Item - Static Rendering Parameters"},"UnknownItem:F3889DE07C015EDD94E35F249933700F":{"__typename":"UnknownItem","id":"F3889DE07C015EDD94E35F249933700F","name":"CIS-Latest-Spotlight","displayName":"Latest Spotlight"},"UnknownItem:4D349CFBCDE852C9AAD35B8CE63558E8":{"__typename":"UnknownItem","id":"4D349CFBCDE852C9AAD35B8CE63558E8","name":"CIS-Latest-Spotlight Rendering Parameters","displayName":"Latest Spotlight Rendering Parameters"},"UnknownItem:910376CC8EA9576F99888DB52F98414C":{"__typename":"UnknownItem","id":"910376CC8EA9576F99888DB52F98414C","name":"CIS-List-Landing","displayName":"Insights Latest Container"},"UnknownItem:16B6FCEED2B95D62BE126A22378878C5":{"__typename":"UnknownItem","id":"16B6FCEED2B95D62BE126A22378878C5","name":"CIS-List-Landing Rendering Parameters","displayName":"Insights Latest Container Rendering Parameters"},"UnknownItem:B3CA9A14E1DD5344B93DD34D3E0340D0":{"__typename":"UnknownItem","id":"B3CA9A14E1DD5344B93DD34D3E0340D0","name":"CIS-List-Landing-Featured","displayName":"Insight Featured Item"},"UnknownItem:5E2EE655CA0E59448490F3E6F85F5F67":{"__typename":"UnknownItem","id":"5E2EE655CA0E59448490F3E6F85F5F67","name":"CIS-List-Landing-Featured Rendering Parameters","displayName":"Insight Featured Item Rendering Parameters"},"UnknownItem:36A30DA2373E58778081E098C1320650":{"__typename":"UnknownItem","id":"36A30DA2373E58778081E098C1320650","name":"CIS-List-Landing-Item","displayName":"Insight Latest Item"},"UnknownItem:5843DF134D2757238C19FFA1A6927BB3":{"__typename":"UnknownItem","id":"5843DF134D2757238C19FFA1A6927BB3","name":"CIS-List-Landing-Item Rendering Parameters","displayName":"Insight Latest Item Rendering Parameters"},"UnknownItem:9A3984E0D778571FAC5AF64EB0196402":{"__typename":"UnknownItem","id":"9A3984E0D778571FAC5AF64EB0196402","name":"CIS-List-Landing-Link","displayName":"Insight Link"},"UnknownItem:6C3AA03CE4C05028BC488B435F54E1F8":{"__typename":"UnknownItem","id":"6C3AA03CE4C05028BC488B435F54E1F8","name":"CIS-List-Landing-Link Rendering Parameters","displayName":"Insight Link Rendering Parameters"},"UnknownItem:A12E230AC82950E8AE9F86C827246C50":{"__typename":"UnknownItem","id":"A12E230AC82950E8AE9F86C827246C50","name":"CIS-List-Link","displayName":"List Link with Description"},"UnknownItem:E1F874813B5F57048A42679D169A0122":{"__typename":"UnknownItem","id":"E1F874813B5F57048A42679D169A0122","name":"CIS-List-Link Rendering Parameters","displayName":"List Link with Description Rendering Parameters"},"UnknownItem:6DB95BC2B30D5EF2A352A05E39B74967":{"__typename":"UnknownItem","id":"6DB95BC2B30D5EF2A352A05E39B74967","name":"CIS-List-Link-Extra-Links","displayName":"List Link with Description and Extra Link"},"UnknownItem:964BBE01167C50C780FC1D2CE678AC35":{"__typename":"UnknownItem","id":"964BBE01167C50C780FC1D2CE678AC35","name":"CIS-List-Link-Extra-Links Rendering Parameters","displayName":"List Link with Description and Extra Link Rendering Parameters"},"UnknownItem:D43E662CFB3D55C0BAD12F52CA617FAA":{"__typename":"UnknownItem","id":"D43E662CFB3D55C0BAD12F52CA617FAA","name":"CIS-List-Link-Title","displayName":"List Link Title"},"UnknownItem:DAF5C3E5E2A559FBA2210FC5D27B67D6":{"__typename":"UnknownItem","id":"DAF5C3E5E2A559FBA2210FC5D27B67D6","name":"CIS-List-Link-Title Rendering Parameters","displayName":"List Link Title Rendering Parameters"},"UnknownItem:55013E0B942755EC913C7F7067C70A52":{"__typename":"UnknownItem","id":"55013E0B942755EC913C7F7067C70A52","name":"CIS-List-Page-Hero","displayName":"Masthead - List Page"},"UnknownItem:F83C767529055750B9938BBB966A36CB":{"__typename":"UnknownItem","id":"F83C767529055750B9938BBB966A36CB","name":"CIS-List-Page-Hero Rendering Parameters","displayName":"Masthead - List Page Rendering Parameters"},"UnknownItem:5EDDFE57B6755C4A808F85614464562D":{"__typename":"UnknownItem","id":"5EDDFE57B6755C4A808F85614464562D","name":"CIS-List-Page-Link","displayName":"List Page Link"},"UnknownItem:959984F5A91A541A9380D355C77DC1C4":{"__typename":"UnknownItem","id":"959984F5A91A541A9380D355C77DC1C4","name":"CIS-List-Page-Link Rendering Parameters","displayName":"List Page Link Rendering Parameters"},"UnknownItem:0500B9F16B4D5DDBADB6CC4391C3DA5E":{"__typename":"UnknownItem","id":"0500B9F16B4D5DDBADB6CC4391C3DA5E","name":"CIS-List-Page-Right-Rail","displayName":"List Page Right Rail"},"UnknownItem:A4D7BE5BD1835923AC3C8F8C2A10587E":{"__typename":"UnknownItem","id":"A4D7BE5BD1835923AC3C8F8C2A10587E","name":"CIS-List-Page-Right-Rail Rendering Parameters","displayName":"List Page Right Rail Rendering Parameters"},"UnknownItem:F7BA692A157758BDB7B71D197F89E3DD":{"__typename":"UnknownItem","id":"F7BA692A157758BDB7B71D197F89E3DD","name":"CIS-Masthead","displayName":"Masthead"},"UnknownItem:B54AFC730D8E5ADC9939BB721816FD31":{"__typename":"UnknownItem","id":"B54AFC730D8E5ADC9939BB721816FD31","name":"CIS-Masthead Rendering Parameters","displayName":"Masthead Rendering Parameters"},"UnknownItem:BE7EDD930A2B5788A8B4405D1E1D72D7":{"__typename":"UnknownItem","id":"BE7EDD930A2B5788A8B4405D1E1D72D7","name":"CIS-Masthead-Two-Column","displayName":"Masthead - Two Column"},"UnknownItem:F508BC49B0935789AAB0B39F7BDEADB5":{"__typename":"UnknownItem","id":"F508BC49B0935789AAB0B39F7BDEADB5","name":"CIS-Masthead-Two-Column Rendering Parameters","displayName":"Masthead - Two Column Rendering Parameters"},"UnknownItem:AFD6C4B46C725F1B96787E6348C9909F":{"__typename":"UnknownItem","id":"AFD6C4B46C725F1B96787E6348C9909F","name":"CIS-Masthead-Two-Column-Link","displayName":"Masthead - Two Column - Link"},"UnknownItem:7BA6EB1829EF571285070EE2E54E6D3C":{"__typename":"UnknownItem","id":"7BA6EB1829EF571285070EE2E54E6D3C","name":"CIS-Masthead-Two-Column-Link Rendering Parameters","displayName":"Masthead - Two Column - Link Rendering Parameters"},"UnknownItem:50B66FE734E25303B53DDCD85344A866":{"__typename":"UnknownItem","id":"50B66FE734E25303B53DDCD85344A866","name":"CIS-Media-Masthead","displayName":"Masthead - Media"},"UnknownItem:328DEDB2152156EE96FF05CC9157CC3D":{"__typename":"UnknownItem","id":"328DEDB2152156EE96FF05CC9157CC3D","name":"CIS-Media-Masthead Rendering Parameters","displayName":"Masthead - Media Rendering Parameters"},"UnknownItem:C70919BB34205AE2B73D91B528D56BA1":{"__typename":"UnknownItem","id":"C70919BB34205AE2B73D91B528D56BA1","name":"CIS-Members","displayName":"Members"},"UnknownItem:FEA285046AE45FF2AC2CD252DFCA5A56":{"__typename":"UnknownItem","id":"FEA285046AE45FF2AC2CD252DFCA5A56","name":"CIS-Members Rendering Parameters","displayName":"Members Rendering Parameters"},"UnknownItem:CCB307E9DD345725BA6BA2DDFCD577C3":{"__typename":"UnknownItem","id":"CCB307E9DD345725BA6BA2DDFCD577C3","name":"CIS-Members-List","displayName":"CIS-Members-List"},"UnknownItem:11C3528DEC6D5207AB9C7EE3799B302B":{"__typename":"UnknownItem","id":"11C3528DEC6D5207AB9C7EE3799B302B","name":"CIS-Navigation-Link","displayName":"Navigation Link"},"UnknownItem:5F8C08E81A435CAE97B4574FD0905908":{"__typename":"UnknownItem","id":"5F8C08E81A435CAE97B4574FD0905908","name":"CIS-Navigation-Link Rendering Parameters","displayName":"Navigation Link Rendering Parameters"},"UnknownItem:318DF222DFF654C3B489EE28AC2520F7":{"__typename":"UnknownItem","id":"318DF222DFF654C3B489EE28AC2520F7","name":"CIS-PageTitle","displayName":"Page Title"},"UnknownItem:8E14DB3CE8795825841E5FF1596BF615":{"__typename":"UnknownItem","id":"8E14DB3CE8795825841E5FF1596BF615","name":"CIS-PageTitle Rendering Parameters","displayName":"Page Title Rendering Parameters"},"UnknownItem:40AA99715B8652E7B6F5A0503BE0DB52":{"__typename":"UnknownItem","id":"40AA99715B8652E7B6F5A0503BE0DB52","name":"CIS-Partners","displayName":"Partners"},"UnknownItem:833EFD7B35CD547491C6801BC4059CB0":{"__typename":"UnknownItem","id":"833EFD7B35CD547491C6801BC4059CB0","name":"CIS-Partners Rendering Parameters","displayName":"Partners Rendering Parameters"},"UnknownItem:96B48102D50C5B01B95BA370C69527F3":{"__typename":"UnknownItem","id":"96B48102D50C5B01B95BA370C69527F3","name":"CIS-Partners-Item","displayName":"Partners Item"},"UnknownItem:CA7177A01B9A5CD9BF00BEA950B834EB":{"__typename":"UnknownItem","id":"CA7177A01B9A5CD9BF00BEA950B834EB","name":"CIS-Partners-Item Rendering Parameters","displayName":"Partners Item Rendering Parameters"},"UnknownItem:B3A46468ADD85D9C805303DEC7CB5384":{"__typename":"UnknownItem","id":"B3A46468ADD85D9C805303DEC7CB5384","name":"CIS-Price-Selector","displayName":"Price Selector"},"UnknownItem:4C020199764C526085BDB439D21B68C8":{"__typename":"UnknownItem","id":"4C020199764C526085BDB439D21B68C8","name":"CIS-Price-Selector Rendering Parameters","displayName":"Price Selector Rendering Parameters"},"UnknownItem:95EEB1A74C0D5319B158811FD219BEDC":{"__typename":"UnknownItem","id":"95EEB1A74C0D5319B158811FD219BEDC","name":"CIS-Profile","displayName":"Profile"},"UnknownItem:F753E5B931FD57B89E1B4EF795712795":{"__typename":"UnknownItem","id":"F753E5B931FD57B89E1B4EF795712795","name":"CIS-Profile Rendering Parameters","displayName":"Profile Rendering Parameters"},"UnknownItem:13692319006254AA84F68BB34BE6909C":{"__typename":"UnknownItem","id":"13692319006254AA84F68BB34BE6909C","name":"CIS-Profile-List","displayName":"Profile List"},"UnknownItem:693A0858A647565DB86D01C646473972":{"__typename":"UnknownItem","id":"693A0858A647565DB86D01C646473972","name":"CIS-Profile-List Rendering Parameters","displayName":"Profile List Rendering Parameters"},"UnknownItem:688BBDF259CC5B26A00AB24E4BA13D17":{"__typename":"UnknownItem","id":"688BBDF259CC5B26A00AB24E4BA13D17","name":"CIS-Profile-List-Item","displayName":"Profile Item"},"UnknownItem:9C7DDA01D64F5A258689B5C164B5ED4D":{"__typename":"UnknownItem","id":"9C7DDA01D64F5A258689B5C164B5ED4D","name":"CIS-Profile-List-Item Rendering Parameters","displayName":"Profile Item Rendering Parameters"},"UnknownItem:A3E29A4121815B74877D1B795F1F9EFB":{"__typename":"UnknownItem","id":"A3E29A4121815B74877D1B795F1F9EFB","name":"CIS-Related-Resources","displayName":"Related Resources"},"UnknownItem:CAA3E9BEAEC25791ADD1DC33BA3E69E6":{"__typename":"UnknownItem","id":"CAA3E9BEAEC25791ADD1DC33BA3E69E6","name":"CIS-Related-Resources Rendering Parameters","displayName":"Related Resources Rendering Parameters"},"UnknownItem:30BAB4FCAC7B51B4BA325E71D94C2F66":{"__typename":"UnknownItem","id":"30BAB4FCAC7B51B4BA325E71D94C2F66","name":"CIS-Resource-Advisory Rendering Parameters","displayName":"Resource Advisory Rendering Parameters"},"UnknownItem:125340D5B2E7558B94F5108929AACD3D":{"__typename":"UnknownItem","id":"125340D5B2E7558B94F5108929AACD3D","name":"CIS-Resource-Advisory-AffectedSystem","displayName":"Advisory Affected System"},"UnknownItem:C3CBBCCF1FE15D09A7BD13C50D29699E":{"__typename":"UnknownItem","id":"C3CBBCCF1FE15D09A7BD13C50D29699E","name":"CIS-Resource-Advisory-Data","displayName":"CIS-Resource-Advisory-Data"},"UnknownItem:3FC3F80139C5566384B97B7420D7C624":{"__typename":"UnknownItem","id":"3FC3F80139C5566384B97B7420D7C624","name":"CIS-Resource-Advisory-Reference","displayName":"Advisory Reference"},"UnknownItem:27ECC5523FDE5A27892EC0CDA82CFD66":{"__typename":"UnknownItem","id":"27ECC5523FDE5A27892EC0CDA82CFD66","name":"CIS-Resource-Advisory-RelatedBenchmark","displayName":"Advisory Related Benchmark"},"UnknownItem:6DC7FA8E868454D2B2DCF5B97657ECB8":{"__typename":"UnknownItem","id":"6DC7FA8E868454D2B2DCF5B97657ECB8","name":"CIS-Resource-Advisory-RelatedControl","displayName":"Advisory Related Control"},"UnknownItem:147B87A8A3CB5C30AA3C4FB03A5248A7":{"__typename":"UnknownItem","id":"147B87A8A3CB5C30AA3C4FB03A5248A7","name":"CIS-Resource-Advisory-RiskCategory","displayName":"Advisory Risk Category"},"UnknownItem:194F40483FF15ABF9DD3E54CCA4A7376":{"__typename":"UnknownItem","id":"194F40483FF15ABF9DD3E54CCA4A7376","name":"CIS-Resource-Advisory-RouteType","displayName":"Advisory"},"UnknownItem:1808651C2A0E55648EFE2366BA808C7E":{"__typename":"UnknownItem","id":"1808651C2A0E55648EFE2366BA808C7E","name":"CIS-Resource-Alert-Level","displayName":"CIS-Resource-Alert-Level"},"UnknownItem:7CC9CE1E6F995662842EBE89DFDFF4D9":{"__typename":"UnknownItem","id":"7CC9CE1E6F995662842EBE89DFDFF4D9","name":"CIS-Resource-BaseData","displayName":"CIS-Resource-BaseData"},"UnknownItem:ED0E8EBABB475DEBBCB9BF70CB9BBBA2":{"__typename":"UnknownItem","id":"ED0E8EBABB475DEBBCB9BF70CB9BBBA2","name":"CIS-Resource-Benchmark Rendering Parameters","displayName":"Resource Benchmark Rendering Parameters"},"UnknownItem:C7ABA2502D035544872C5B9818B52DBD":{"__typename":"UnknownItem","id":"C7ABA2502D035544872C5B9818B52DBD","name":"CIS-Resource-Benchmark-APIKey","displayName":"Benchmark API Key"},"UnknownItem:CC86B67E845C5AD2A87C892DEC4C3B76":{"__typename":"UnknownItem","id":"CC86B67E845C5AD2A87C892DEC4C3B76","name":"CIS-Resource-Benchmark-Category","displayName":"CIS-Resource-Benchmark-Category"},"UnknownItem:69983C19C96C59989222BFD93FBD8751":{"__typename":"UnknownItem","id":"69983C19C96C59989222BFD93FBD8751","name":"CIS-Resource-Benchmark-Data","displayName":"CIS-Resource-Benchmark-Data"},"UnknownItem:F269AFF026215E32A431B9C6F42AB1E1":{"__typename":"UnknownItem","id":"F269AFF026215E32A431B9C6F42AB1E1","name":"CIS-Resource-Benchmark-Document","displayName":"CIS-Resource-Benchmark-Document"},"UnknownItem:39C2722D5E6C529AA876A950F1E31877":{"__typename":"UnknownItem","id":"39C2722D5E6C529AA876A950F1E31877","name":"CIS-Resource-Benchmark-GlobalData","displayName":"CIS-Resource-Benchmark-GlobalData"},"UnknownItem:3C88265EA01854F6A3F36760AD7B687F":{"__typename":"UnknownItem","id":"3C88265EA01854F6A3F36760AD7B687F","name":"CIS-Resource-Benchmark-Image","displayName":"CIS-Resource-Benchmark-Image"},"UnknownItem:1A74FA0D1E235428B690FDBBE0EFE239":{"__typename":"UnknownItem","id":"1A74FA0D1E235428B690FDBBE0EFE239","name":"CIS-Resource-Benchmark-List","displayName":"Benchmark List"},"UnknownItem:BB68988BF4885C72882E906D330F3EB8":{"__typename":"UnknownItem","id":"BB68988BF4885C72882E906D330F3EB8","name":"CIS-Resource-Benchmark-List Rendering Parameters","displayName":"Benchmark List Rendering Parameters"},"UnknownItem:DADCF81C9FC95CBF8DFE797F2B8C7231":{"__typename":"UnknownItem","id":"DADCF81C9FC95CBF8DFE797F2B8C7231","name":"CIS-Resource-Benchmark-RemediationKit","displayName":"CIS-Resource-Benchmark-RemediationKit"},"UnknownItem:502B5A53D16B5975A78DA7395E2F0A98":{"__typename":"UnknownItem","id":"502B5A53D16B5975A78DA7395E2F0A98","name":"CIS-Resource-Benchmark-RouteType","displayName":"Benchmark"},"UnknownItem:3BFDF7DFDA885700BB3D967BDA4C6C4E":{"__typename":"UnknownItem","id":"3BFDF7DFDA885700BB3D967BDA4C6C4E","name":"CIS-Resource-Benchmark-SubCategory","displayName":"CIS-Resource-Benchmark-SubCategory"},"UnknownItem:973E7527271A583D856ACFBE53F1CAE1":{"__typename":"UnknownItem","id":"973E7527271A583D856ACFBE53F1CAE1","name":"CIS-Resource-Benchmark-Version","displayName":"CIS-Resource-Benchmark-Version"},"UnknownItem:035EFDEC2F745269B5F5067C548D6FFE":{"__typename":"UnknownItem","id":"035EFDEC2F745269B5F5067C548D6FFE","name":"CIS-Resource-Blog Rendering Parameters","displayName":"Resource Blog Rendering Parameters"},"UnknownItem:29BE4F22C5D25ADC9F0F8308B50DFD7E":{"__typename":"UnknownItem","id":"29BE4F22C5D25ADC9F0F8308B50DFD7E","name":"CIS-Resource-BlogData","displayName":"CIS-Resource-BlogData"},"UnknownItem:2AAF7415514F5C10B597D162F39A1E4E":{"__typename":"UnknownItem","id":"2AAF7415514F5C10B597D162F39A1E4E","name":"CIS-Resource-Blog-RouteType","displayName":"Blog Post"},"UnknownItem:F8B7FED43FC0532A9E8B542D91EE8B49":{"__typename":"UnknownItem","id":"F8B7FED43FC0532A9E8B542D91EE8B49","name":"CIS-Resource-BroadcastData","displayName":"CIS-Resource-BroadcastData"},"UnknownItem:FFD66550A4C65101B6EFCF78618EC398":{"__typename":"UnknownItem","id":"FFD66550A4C65101B6EFCF78618EC398","name":"CIS-Resource-CaseStudy Rendering Parameters","displayName":"Resource Case Study Rendering Parameters"},"UnknownItem:09A0529BD4EA5F2DBA29426950E364E6":{"__typename":"UnknownItem","id":"09A0529BD4EA5F2DBA29426950E364E6","name":"CIS-Resource-CaseStudy-RouteType","displayName":"Case Study"},"UnknownItem:60B95E41BA065AF1AC2CE2AF87A6530B":{"__typename":"UnknownItem","id":"60B95E41BA065AF1AC2CE2AF87A6530B","name":"CIS-Resource-DownloadData","displayName":"CIS-Resource-DownloadData"},"UnknownItem:F6BED3FDFC6153549D0F8BD6D2076594":{"__typename":"UnknownItem","id":"F6BED3FDFC6153549D0F8BD6D2076594","name":"CIS-Resource-GenericPage Rendering Parameters","displayName":"Resource Generic Page Rendering Parameters"},"UnknownItem:963B37F6E98D55AC9BBCF8B1D5AA6167":{"__typename":"UnknownItem","id":"963B37F6E98D55AC9BBCF8B1D5AA6167","name":"CIS-Resource-GenericPage-RouteType","displayName":"Page"},"UnknownItem:E34C3C769B66543EB1613C5005A8D03A":{"__typename":"UnknownItem","id":"E34C3C769B66543EB1613C5005A8D03A","name":"CIS-Resource-Media-Mention Rendering Parameters","displayName":"Resource Media-Mention Rendering Parameters"},"UnknownItem:E001258F71DE57F0B3F393D727CEEDFB":{"__typename":"UnknownItem","id":"E001258F71DE57F0B3F393D727CEEDFB","name":"CIS-Resource-Media-Mention-RouteType","displayName":"Media Mention"},"UnknownItem:7776D6D4A49359278BF8C83FCD9BB365":{"__typename":"UnknownItem","id":"7776D6D4A49359278BF8C83FCD9BB365","name":"CIS-Resource-Newsletter Rendering Parameters","displayName":"Resource Newsletter Rendering Parameters"},"UnknownItem:0765C5AF96C2563A95C540E594154990":{"__typename":"UnknownItem","id":"0765C5AF96C2563A95C540E594154990","name":"CIS-Resource-Newsletter-RouteType","displayName":"Newsletter"},"UnknownItem:048A45EF900D5F09A874B53D77BC0B51":{"__typename":"UnknownItem","id":"048A45EF900D5F09A874B53D77BC0B51","name":"CIS-Resource-PagedListing","displayName":"Resource Paged Listing"},"UnknownItem:6E5CF9FA5FBC5BF0BEE528D44FD3DFD9":{"__typename":"UnknownItem","id":"6E5CF9FA5FBC5BF0BEE528D44FD3DFD9","name":"CIS-Resource-PagedListing Rendering Parameters","displayName":"Resource Paged Listing Rendering Parameters"},"UnknownItem:200790A8CD1D5ED39B47950C646DB4B5":{"__typename":"UnknownItem","id":"200790A8CD1D5ED39B47950C646DB4B5","name":"CIS-Resource-Partner Rendering Parameters","displayName":"Resource Partner Rendering Parameters"},"UnknownItem:38C00DBC3B365694B6A7D81B4E8F9B84":{"__typename":"UnknownItem","id":"38C00DBC3B365694B6A7D81B4E8F9B84","name":"CIS-Resource-PartnerData","displayName":"CIS-Resource-PartnerData"},"UnknownItem:31EE34ECA3D75395A289BA4123DA4E47":{"__typename":"UnknownItem","id":"31EE34ECA3D75395A289BA4123DA4E47","name":"CIS-Resource-PartnerListing","displayName":"Resource Partner Listing"},"UnknownItem:E842AF90C86D57499E6972A670F7D681":{"__typename":"UnknownItem","id":"E842AF90C86D57499E6972A670F7D681","name":"CIS-Resource-PartnerListing Rendering Parameters","displayName":"Resource Partner Listing Rendering Parameters"},"UnknownItem:7E7F44FB002B5B30800228800FEE145A":{"__typename":"UnknownItem","id":"7E7F44FB002B5B30800228800FEE145A","name":"CIS-Resource-Partner-RouteType","displayName":"Partner"},"UnknownItem:DFE144D5F7555281A9DB71B116B53E2B":{"__typename":"UnknownItem","id":"DFE144D5F7555281A9DB71B116B53E2B","name":"CIS-Resource-Podcast Rendering Parameters","displayName":"Resource Podcast Rendering Parameters"},"UnknownItem:9487C5E63F2855EE9EB12FE0A6A46565":{"__typename":"UnknownItem","id":"9487C5E63F2855EE9EB12FE0A6A46565","name":"CIS-Resource-PodcastData","displayName":"CIS-Resource-PodcastData"},"UnknownItem:6AB0BFCE1D02553AB542DE97C987A320":{"__typename":"UnknownItem","id":"6AB0BFCE1D02553AB542DE97C987A320","name":"CIS-Resource-Podcast-RouteType","displayName":"Podcast"},"UnknownItem:FEF5C6C274D354738D889A8ABE8C646C":{"__typename":"UnknownItem","id":"FEF5C6C274D354738D889A8ABE8C646C","name":"CIS-Resource-Press-Release Rendering Parameters","displayName":"Resource Press Release Rendering Parameters"},"UnknownItem:510C9D3F0B8D5A05930577D10935B86D":{"__typename":"UnknownItem","id":"510C9D3F0B8D5A05930577D10935B86D","name":"CIS-Resource-Press-Release-RouteType","displayName":"Press Release"},"UnknownItem:BF3A1850BC55585C9A04533C04BBD88C":{"__typename":"UnknownItem","id":"BF3A1850BC55585C9A04533C04BBD88C","name":"CIS-Resource-RightColumn","displayName":"CIS-Resource-RightColumn"},"UnknownItem:7B48088D89C65CFF813C788DAEE7802F":{"__typename":"UnknownItem","id":"7B48088D89C65CFF813C788DAEE7802F","name":"CIS-Resource-Spotlight Rendering Parameters","displayName":"Resource Spotlight Rendering Parameters"},"UnknownItem:53C5AB74679E52F08FECE7E095753E8A":{"__typename":"UnknownItem","id":"53C5AB74679E52F08FECE7E095753E8A","name":"CIS-Resource-Spotlight-RouteType","displayName":"Spotlight"},"UnknownItem:F89ED44AC7B855898E3180A51103610F":{"__typename":"UnknownItem","id":"F89ED44AC7B855898E3180A51103610F","name":"CIS-Resource-Taxonomy-Item","displayName":"CIS-Resource-Taxonomy-Item"},"UnknownItem:9558B53B433154F493D98C04FBB32FF6":{"__typename":"UnknownItem","id":"9558B53B433154F493D98C04FBB32FF6","name":"CIS-Resource-Webinar Rendering Parameters","displayName":"Resource Webinar Rendering Parameters"},"UnknownItem:166E538304785F8D9F5861A81B056FC4":{"__typename":"UnknownItem","id":"166E538304785F8D9F5861A81B056FC4","name":"CIS-Resource-Webinar-RouteType","displayName":"Webinar"},"UnknownItem:E9D29EA3371C57D39316C141534E3FF0":{"__typename":"UnknownItem","id":"E9D29EA3371C57D39316C141534E3FF0","name":"CIS-Resource-White-Paper Rendering Parameters","displayName":"Resource White-Paper Rendering Parameters"},"UnknownItem:AB5D1D61C3AE5C3598756F87D4355D76":{"__typename":"UnknownItem","id":"AB5D1D61C3AE5C3598756F87D4355D76","name":"CIS-Resource-White-PaperData","displayName":"CIS-Resource-White-PaperData"},"UnknownItem:A0F8790640805FF7AAA73E7F2EF7A26A":{"__typename":"UnknownItem","id":"A0F8790640805FF7AAA73E7F2EF7A26A","name":"CIS-Resource-White-Paper-RouteType","displayName":"White Paper"},"UnknownItem:6A25C6670BD9598FB8FDB150DD205FE1":{"__typename":"UnknownItem","id":"6A25C6670BD9598FB8FDB150DD205FE1","name":"CIS-RichText","displayName":"Rich Text Editor"},"UnknownItem:A57C58E2245A58B0B2CA6CFC40706C78":{"__typename":"UnknownItem","id":"A57C58E2245A58B0B2CA6CFC40706C78","name":"CIS-RichText Rendering Parameters","displayName":"Rich Text Editor Rendering Parameters"},"UnknownItem:48978CB175F55CC08219AB06AA7070E6":{"__typename":"UnknownItem","id":"48978CB175F55CC08219AB06AA7070E6","name":"CIS-Search","displayName":"Search"},"UnknownItem:AF3C68B1DD2B5496AFB8BD99A6E11340":{"__typename":"UnknownItem","id":"AF3C68B1DD2B5496AFB8BD99A6E11340","name":"CIS-Search Rendering Parameters","displayName":"Search Rendering Parameters"},"UnknownItem:03C7F09B67F15218BF053C8B6836FDA7":{"__typename":"UnknownItem","id":"03C7F09B67F15218BF053C8B6836FDA7","name":"CIS-Steps-Carousel","displayName":"Steps Carousel"},"UnknownItem:30320D8093DF5A6B96D2FE547DDB9701":{"__typename":"UnknownItem","id":"30320D8093DF5A6B96D2FE547DDB9701","name":"CIS-Steps-Carousel Rendering Parameters","displayName":"Steps Carousel Rendering Parameters"},"UnknownItem:339FEAAC693D54AAB6558B9F7A924EA1":{"__typename":"UnknownItem","id":"339FEAAC693D54AAB6558B9F7A924EA1","name":"CIS-Steps-Carousel-Item","displayName":"Steps Carousel Item"},"UnknownItem:10E31064ACA750A88C8E45A29225B244":{"__typename":"UnknownItem","id":"10E31064ACA750A88C8E45A29225B244","name":"CIS-Steps-Carousel-Item Rendering Parameters","displayName":"Steps Carousel Item Rendering Parameters"},"UnknownItem:DE1B850B35B655D8B32B71DF62117112":{"__typename":"UnknownItem","id":"DE1B850B35B655D8B32B71DF62117112","name":"CIS-StructuredData-ContactPoint","displayName":"Structured Data - Contact Point"},"UnknownItem:2857CAA42CD159229CED9FCBBA6AE0D3":{"__typename":"UnknownItem","id":"2857CAA42CD159229CED9FCBBA6AE0D3","name":"CIS-StructuredData-Custom","displayName":"Structured Data - Custom"},"UnknownItem:EB91E94ECDD457D7B7D6A279DA3CC7B9":{"__typename":"UnknownItem","id":"EB91E94ECDD457D7B7D6A279DA3CC7B9","name":"CIS-StructuredData-Organization","displayName":"Structured Data - Organization"},"UnknownItem:6D7EB4DF242B52F5A54331BEA0A441CE":{"__typename":"UnknownItem","id":"6D7EB4DF242B52F5A54331BEA0A441CE","name":"CIS-StructuredData-PostalAddress","displayName":"Structured Data - Postal Address"},"UnknownItem:BDBA3B7C7B5F5A588D1F641A3CB32137":{"__typename":"UnknownItem","id":"BDBA3B7C7B5F5A588D1F641A3CB32137","name":"CIS-StructuredData-Webpage","displayName":"Structured Data - Webpage"},"UnknownItem:64012B51C04B56C5AE5F33DB85C15BC4":{"__typename":"UnknownItem","id":"64012B51C04B56C5AE5F33DB85C15BC4","name":"CIS-StructuredData-Website","displayName":"Structured Data - Website"},"UnknownItem:60AD78229E0F5F74B54714AB69F71461":{"__typename":"UnknownItem","id":"60AD78229E0F5F74B54714AB69F71461","name":"CIS-StructuredData-Website Rendering Parameters","displayName":"Structured Data - Website Rendering Parameters"},"UnknownItem:4227B8C768F150A3B40E2697A1BAD18E":{"__typename":"UnknownItem","id":"4227B8C768F150A3B40E2697A1BAD18E","name":"CIS-Tabs","displayName":"Tabs"},"UnknownItem:52BCFF5D33065E5FB78CD2EEECFC6D09":{"__typename":"UnknownItem","id":"52BCFF5D33065E5FB78CD2EEECFC6D09","name":"CIS-Tabs Rendering Parameters","displayName":"Primary Tabs Rendering Parameters"},"UnknownItem:9C403E89D2A75C39B1C215923BD89AB0":{"__typename":"UnknownItem","id":"9C403E89D2A75C39B1C215923BD89AB0","name":"CIS-Tabs-Secondary Rendering Parameters","displayName":"Secondary Tabs Rendering Parameters"},"UnknownItem:F447686915225B598646FF382090A87E":{"__typename":"UnknownItem","id":"F447686915225B598646FF382090A87E","name":"CIS-Tabs-Secondary-Tab","displayName":"Secondary Tab"},"UnknownItem:A0C93C477119552C8350B9D2B6F4AA3F":{"__typename":"UnknownItem","id":"A0C93C477119552C8350B9D2B6F4AA3F","name":"CIS-Tabs-Secondary-Tab Rendering Parameters","displayName":"Secondary Tab Rendering Parameters"},"UnknownItem:5B88FEA7730450B1BAC34CF3DC101403":{"__typename":"UnknownItem","id":"5B88FEA7730450B1BAC34CF3DC101403","name":"CIS-Tabs-Tab","displayName":"Primary Tab"},"UnknownItem:67E5E17DF31352CCB54064453E14552E":{"__typename":"UnknownItem","id":"67E5E17DF31352CCB54064453E14552E","name":"CIS-Tabs-Tab Rendering Parameters","displayName":"Primary Tab Rendering Parameters"},"UnknownItem:038312E3572A588EBAD75F31B86FD7AF":{"__typename":"UnknownItem","id":"038312E3572A588EBAD75F31B86FD7AF","name":"CIS-Twitter-Metadata","displayName":"CIS-Twitter-Metadata"},"UnknownItem:98B7B741A7705274976B6D806B68716A":{"__typename":"UnknownItem","id":"98B7B741A7705274976B6D806B68716A","name":"CIS-UX-Example Rendering Parameters","displayName":"CIS-UX-Example Rendering Parameters"},"UnknownItem:BB241A05B0DD524FB1EAC3E8D263AA92":{"__typename":"UnknownItem","id":"BB241A05B0DD524FB1EAC3E8D263AA92","name":"CIS-Wistia-Audio","displayName":"Wistia Audio"},"UnknownItem:9DB239DD80965560BDEE6770152182FD":{"__typename":"UnknownItem","id":"9DB239DD80965560BDEE6770152182FD","name":"CIS-Wistia-Audio Rendering Parameters","displayName":"Wistia Audio Rendering Parameters"},"UnknownItem:869265FDB4AE5AC787492EAFBD4C7B08":{"__typename":"UnknownItem","id":"869265FDB4AE5AC787492EAFBD4C7B08","name":"CIS-Wistia-Video","displayName":"Wistia Video"},"UnknownItem:DA945E767701558896CD5DE45D218BC4":{"__typename":"UnknownItem","id":"DA945E767701558896CD5DE45D218BC4","name":"CIS-Wistia-Video Rendering Parameters","displayName":"Wistia Video Rendering Parameters"},"UnknownItem:A24ADDD331684CD09120699142CE3DE4":{"__typename":"UnknownItem","id":"A24ADDD331684CD09120699142CE3DE4","name":"JSS Site","displayName":"JSS Site"},"UnknownItem:CF8359885E1B4973A59A85213ABBE2EB":{"__typename":"UnknownItem","id":"CF8359885E1B4973A59A85213ABBE2EB","name":"JSS Tenant","displayName":"JSS Tenant"},"UnknownItem:A5BD9FFD747745C9AD722783D9A37624":{"__typename":"UnknownItem","id":"A5BD9FFD747745C9AD722783D9A37624","name":"Page Design Folder","displayName":"Page Design Folder"},"UnknownItem:9A2ACB7D84554065957400ACDE859860":{"__typename":"UnknownItem","id":"9A2ACB7D84554065957400ACDE859860","name":"Page Designs","displayName":"Page Designs"},"UnknownItem:5565E5DE7BFC4CFB940D54E0A1E88A98":{"__typename":"UnknownItem","id":"5565E5DE7BFC4CFB940D54E0A1E88A98","name":"Partial Design Folder","displayName":"Partial Design Folder"},"UnknownItem:FCE3B13C6CA64D128AA3FAB67EE575B4":{"__typename":"UnknownItem","id":"FCE3B13C6CA64D128AA3FAB67EE575B4","name":"Partial Designs","displayName":"Partial Designs"},"UnknownItem:CABDAE87F424560CBBD3ED0D5163D620":{"__typename":"UnknownItem","id":"CABDAE87F424560CBBD3ED0D5163D620","name":"PartialDesignDynamicPlaceholder","displayName":"PartialDesignDynamicPlaceholder"},"UnknownItem:01F0CB85AB265ABD99941A09128C91F5":{"__typename":"UnknownItem","id":"01F0CB85AB265ABD99941A09128C91F5","name":"PartialDesignDynamicPlaceholder Rendering Parameters","displayName":"PartialDesignDynamicPlaceholder Rendering Parameters"},"UnknownItem:AC1A0CD072EF5B5882C474D5840EAF28":{"__typename":"UnknownItem","id":"AC1A0CD072EF5B5882C474D5840EAF28","name":"Test-Tracker Rendering Parameters","displayName":"Test-Tracker Rendering Parameters"},"UnknownItem:B64A1395065A4ECFBEBA7F52E1DA72FA":{"__typename":"UnknownItem","id":"B64A1395065A4ECFBEBA7F52E1DA72FA","children":[{"__ref":"UnknownItem:05104A9745674C0897E7122D45274800"},{"__ref":"UnknownItem:25976F8932E35E5F89CF43A9E6FDD9D1"},{"__ref":"UnknownItem:654A5326D5FE507FAE99203CF07A6D97"},{"__ref":"UnknownItem:61970B12AFFD52FEAB5682734F8CF49E"},{"__ref":"UnknownItem:EDD596891C295A83B23D0B8E7D0AF200"},{"__ref":"UnknownItem:36573E59D96254AD9D477CE46A2D7A4E"},{"__ref":"UnknownItem:0222735171775548871E8344357F03C1"},{"__ref":"UnknownItem:B6A5D9D14F665A4B8FFE74A4D3FE19DB"},{"__ref":"UnknownItem:99DF8D58A5965DD4B0654D6396C97AF7"},{"__ref":"UnknownItem:1CFB0CEA8963547FA61132C3F6F995A2"},{"__ref":"UnknownItem:C2369A6D424859FA97876690FBCA9286"},{"__ref":"UnknownItem:C5630ECA1F1656A092300E023DC100EB"},{"__ref":"UnknownItem:0BDF9E5DC70E598A87EB7DF41327D232"},{"__ref":"UnknownItem:E4D1EEC3E7D75ED2AF4C14202D2831BE"},{"__ref":"UnknownItem:3AA81F723B635263A817F0B32FAEF083"},{"__ref":"UnknownItem:B463F024F6015539920EE91D08688C76"},{"__ref":"UnknownItem:B3A875531ECE548FA0EB5B533F3ECF85"},{"__ref":"UnknownItem:2FA6748D8AA555AEAC324351916569A0"},{"__ref":"UnknownItem:82015A8049545625AFC4A4BDAEEA5F50"},{"__ref":"UnknownItem:6008CB52B8BB5ECDB94973AF83CF5F87"},{"__ref":"UnknownItem:28B02FB26C5C5043B23CC5C263EA3EC3"},{"__ref":"UnknownItem:57E1FCDCD57F5CD799E79354F83DB4BC"},{"__ref":"UnknownItem:FC1242F39F4F51F7A8BAF0005A2F39D0"},{"__ref":"UnknownItem:617C085E6D3E56C5838439661DB554D2"},{"__ref":"UnknownItem:B2E767A150C75BAD892F7A9227A27F01"},{"__ref":"UnknownItem:31A8ED43B16F59919FECDBCFA7C76272"},{"__ref":"UnknownItem:04AED49860C454DEA111B8D812456BF5"},{"__ref":"UnknownItem:9141EA22DBE05AE893ABC8308F85C390"},{"__ref":"UnknownItem:092FA848A9B25C73845767EA63EA5C67"},{"__ref":"UnknownItem:3E10F74A18E45F48B35FBEFDAB530264"},{"__ref":"UnknownItem:3CF9E12DFDB55140994BEA50BF7EDAA5"},{"__ref":"UnknownItem:E2606B523B1055D9AC84B092D206DDCD"},{"__ref":"UnknownItem:4B80CCF1E069534EBAB423577B68C0AD"},{"__ref":"UnknownItem:C6C188CE6A135AB69DE29350758244A9"},{"__ref":"UnknownItem:BBEA85A9DD3759449CAD4D2DAC98630B"},{"__ref":"UnknownItem:5EB5CFE599F65F06B20287C257C24703"},{"__ref":"UnknownItem:0DF4E0BF83B15DD6978516E6FE09F2E0"},{"__ref":"UnknownItem:276D0A2D3E835B8D93BCFF6E3550E2D7"},{"__ref":"UnknownItem:2D17C4CFB694571EAB008FD21D4E428E"},{"__ref":"UnknownItem:C2ED25D7B79658958D0D6A50796213F2"},{"__ref":"UnknownItem:DC747D8485C558EE9A6D095A13CF901B"},{"__ref":"UnknownItem:C716DB1970125757ADC8B296A2BD352D"},{"__ref":"UnknownItem:2225924DDFF950C4918AFB1F930CD648"},{"__ref":"UnknownItem:B6EC178E989C55A39177F5D20BDFEDB0"},{"__ref":"UnknownItem:35359F197DFF54EEA09CC9DCA96F2945"},{"__ref":"UnknownItem:42C9154F826C56758DE768D934557968"},{"__ref":"UnknownItem:6D1AA6DD55935A5983F18B56986A60FE"},{"__ref":"UnknownItem:062C868D36955AEBBF7F9633892B5549"},{"__ref":"UnknownItem:3C9A9E1FB1935100BFC7011C5357665E"},{"__ref":"UnknownItem:C55226DC395550AABCECD4BCF7CCE202"},{"__ref":"UnknownItem:56B4ED956812564B81B8D7742E90CCFD"},{"__ref":"UnknownItem:F7E49042DE9A56918991E65D94831AF0"},{"__ref":"UnknownItem:A8ECE93CD2D55F8086D5E35045120FA3"},{"__ref":"UnknownItem:86D8FE2241F358A0B6EF8CE8E7CD23F4"},{"__ref":"UnknownItem:4BDC4A1E54305EF595AB7DB3B8806B65"},{"__ref":"UnknownItem:6A72ED2F0E9851C38834DA5CDD4AC402"},{"__ref":"UnknownItem:14827B7DB5395EE4A29E477B9C17CCE2"},{"__ref":"UnknownItem:4800E7D5D2765501BA934DEC4C0410ED"},{"__ref":"UnknownItem:8EA112C7D8705C03A04AF92AA2645DFE"},{"__ref":"UnknownItem:CECA807BE4D0536C926CC8FAB7BE4773"},{"__ref":"UnknownItem:112FE6BF57565AF6B31EB59D5C937B13"},{"__ref":"UnknownItem:6A8CD26E9A6E5DD0A08268474074D0A5"},{"__ref":"UnknownItem:4A502403686757B782CD29CCC125AEBC"},{"__ref":"UnknownItem:13E2C7EB1819568E8C83BE5856650CFB"},{"__ref":"UnknownItem:BE4D2A0641EB5F19966ABD29E166D62F"},{"__ref":"UnknownItem:0F6FB27DEEA550DC985B0D1C634A9EDC"},{"__ref":"UnknownItem:8191F46236375E248461969F5B6F83E7"},{"__ref":"UnknownItem:5ACAB8BF85D3566EBD76545C2B76255B"},{"__ref":"UnknownItem:5DC368C7496B55E993F08EE79087E6B3"},{"__ref":"UnknownItem:3AA48A34B4005CDF9EBA63FD96C1073B"},{"__ref":"UnknownItem:784D976034CC579FA1A913547B803B97"},{"__ref":"UnknownItem:656AA2AF4DB7584B9E50CE8AE18099BC"},{"__ref":"UnknownItem:DC573AEEA6E4586287E1A6988044CE50"},{"__ref":"UnknownItem:420A2A16E07054D4B9180C3856058F96"},{"__ref":"UnknownItem:9BBBFFE7A8715E54BB20981D7051C96E"},{"__ref":"UnknownItem:4BFFEE1C5D385C6D951FCE9AC6283A37"},{"__ref":"UnknownItem:696DF76BC39C52D295BA0F473A40D663"},{"__ref":"UnknownItem:4C3E12653C2A5BEDA207439400B29465"},{"__ref":"UnknownItem:FC4C00AC3E155F00BD9C001818185FE7"},{"__ref":"UnknownItem:A54B1EB8E6405DCBAC5EE4AA3D1EC082"},{"__ref":"UnknownItem:C218753CEEA059338124CE3572B926F6"},{"__ref":"UnknownItem:386ADEAFB07C5770ADD8A2CA88364BE1"},{"__ref":"UnknownItem:118EC5FD205C59649BE8B4B922C13649"},{"__ref":"UnknownItem:4F9E6E6C6FA65BF589A01FA725432210"},{"__ref":"UnknownItem:898785BA5D11569687481E7F2CB79332"},{"__ref":"UnknownItem:EE422D1B38C8506AAD62DF9D3FB8DCD9"},{"__ref":"UnknownItem:4EBBF67DE3375F5BAFD7EE12035EAA4A"},{"__ref":"UnknownItem:20DCE8E195B3535CAF2747B0665585D2"},{"__ref":"UnknownItem:E0EBEB5488795970892012E1A3B2EEC8"},{"__ref":"UnknownItem:AAE201A7D95A5F73A84226B9872101FA"},{"__ref":"UnknownItem:78903705A2265316A99DE32C4B3A2327"},{"__ref":"UnknownItem:7D5BDF64319555B3B844667F01A09976"},{"__ref":"UnknownItem:C0CCBDBEC3155BC6A8FB6D5536B04665"},{"__ref":"UnknownItem:202B65178FC55A20AA4DB43497D36821"},{"__ref":"UnknownItem:6831C6A81E745D67ACC0CE24B06C62AA"},{"__ref":"UnknownItem:5E636F6F024058EFA4F1C47EDD8A972A"},{"__ref":"UnknownItem:C247A3EC9E29516A8FDE72D00650A5F0"},{"__ref":"UnknownItem:C8AC4ADE75345A1B94B1DD6E5D3BC600"},{"__ref":"UnknownItem:AC4F3F00796D597B8F4AF9D256D0F1CA"},{"__ref":"UnknownItem:02FDC9D9D16151E5894D95560A04D73F"},{"__ref":"UnknownItem:F7FDFD6A992F50DFB680E3DE7A3EB529"},{"__ref":"UnknownItem:F12C40A742B6529EA6C20B1BDFBA6303"},{"__ref":"UnknownItem:FE8F1176CC0258B3AD21AB3D508C1FB4"},{"__ref":"UnknownItem:BFF01B2277575BCB97258B95C3535F18"},{"__ref":"UnknownItem:153312F5F50E5AE79F17158C113F2C8E"},{"__ref":"UnknownItem:9DB128C7A6D85F56A96730879A1BD396"},{"__ref":"UnknownItem:994158FB84FD5389B5ACC2CAC39ADE87"},{"__ref":"UnknownItem:ABFFA93AA91250458F112C29F70F6F7D"},{"__ref":"UnknownItem:D3AF384DA6BE5640BBCE12A2829A3117"},{"__ref":"UnknownItem:E6FDCD56D42556D7B9E9A430099BE0EB"},{"__ref":"UnknownItem:BCC27A5567705492B762462F7078EDAB"},{"__ref":"UnknownItem:7BA0A22DBC305563A05279C1E967C7EE"},{"__ref":"UnknownItem:3AB3983031785EC2A3BCD292205A22C8"},{"__ref":"UnknownItem:2BB8EA6BB9F45FA6986A95D073BC32B2"},{"__ref":"UnknownItem:C1B0C68ECF4C5D73B3982D26AC440AB0"},{"__ref":"UnknownItem:EDD6C28F70395477ADAAC58A5D1494D4"},{"__ref":"UnknownItem:DB3E06E34FA05875B8DD9637690C69F2"},{"__ref":"UnknownItem:00377F20DC545E458687D0565817C413"},{"__ref":"UnknownItem:1C8BAAFCDF095160B6B5649E6903E350"},{"__ref":"UnknownItem:EA2824034B1F5C678FE6CAE3A5955930"},{"__ref":"UnknownItem:2376E6C621EA527FA049447F1E5BF190"},{"__ref":"UnknownItem:A7DBE6CB9983568B88A975D2F7D320D8"},{"__ref":"UnknownItem:046A6C634A715853938CB128738AA365"},{"__ref":"UnknownItem:EBE9A9E0CE9D56058FC985B0BF0410DF"},{"__ref":"UnknownItem:CE964D4541AE529EA57908383DC012C8"},{"__ref":"UnknownItem:5A40906F82435F0FADAE690DB93DE446"},{"__ref":"UnknownItem:DD0E876DC5235F2CA63CAFE1E1B75ABA"},{"__ref":"UnknownItem:C261FF0F83B35FC59EC5693DB93E95FD"},{"__ref":"UnknownItem:5383A9B151F950FD8D507F4E37A58C02"},{"__ref":"UnknownItem:C2220DE8F68A599FA2149E246623E9ED"},{"__ref":"UnknownItem:8CAE35F4D54659BEB3B3BCE374ECB1D8"},{"__ref":"UnknownItem:1FD4ED7ECBDD56F0B3D8CD0407E117E1"},{"__ref":"UnknownItem:8271F0875A8750A4B96CC4203BCBF164"},{"__ref":"UnknownItem:D9018F43C197527EAA0204E163D60A5A"},{"__ref":"UnknownItem:F1398E73E3AA5BCA938143C32D7038B5"},{"__ref":"UnknownItem:8B35B9816BC35A9BAA0AA48CDDB3FD86"},{"__ref":"UnknownItem:E6C03D8DE5C955A78407E374DED68FB5"},{"__ref":"UnknownItem:70F8AA43D05C5675821F4DC6A2222FAD"},{"__ref":"UnknownItem:DCF4671A8D0455119CDDA0F09CCEB528"},{"__ref":"UnknownItem:91BADACAAFF15B07849F816E86C6DCAC"},{"__ref":"UnknownItem:AD2A0FA22C705BDFB211A2A50E4F18AE"},{"__ref":"UnknownItem:F3BEFD9FD7B85410BFCFBB0E2866035A"},{"__ref":"UnknownItem:395F5C17862159F6A613F4A7ADAF250E"},{"__ref":"UnknownItem:B137FDD16C605323AA163AF145C57572"},{"__ref":"UnknownItem:92A36E1876F65A74AA34FE809080FBA4"},{"__ref":"UnknownItem:BCC480AE4E925E2194A92E812F8E194B"},{"__ref":"UnknownItem:30D8E852D99950C5B39F4EAA202E3D91"},{"__ref":"UnknownItem:52FC3A1840285C408E4CE09B40C84079"},{"__ref":"UnknownItem:81F23E2A4B0A504DB7148775FA211EC9"},{"__ref":"UnknownItem:236314BACF3553DABA6AC99A345E2C74"},{"__ref":"UnknownItem:1726A1AE39B15A5E8A4FCFFF8E553DED"},{"__ref":"UnknownItem:D57D08AD2A91573BB8CD77AE8F1A56E2"},{"__ref":"UnknownItem:444D8EAC9D3A5D1DB0A2ABDF515BCFA8"},{"__ref":"UnknownItem:D477C0F08620512C93508AFBF7C4C1B4"},{"__ref":"UnknownItem:EAF395020B585EF09218EAA9CA8E6959"},{"__ref":"UnknownItem:E89983679BEF5851B6846678CB31BD87"},{"__ref":"UnknownItem:D2F5F4FF5A7A5B8780337374B2B30578"},{"__ref":"UnknownItem:252133AF1CFD5B3EB328801FB0127623"},{"__ref":"UnknownItem:69BA8F1B43FE53C694FBD25A16761567"},{"__ref":"UnknownItem:4D9E877E460855A281E8B6E54D9DCD8C"},{"__ref":"UnknownItem:653504ACEF2950DB98E146F565236D0B"},{"__ref":"UnknownItem:7D0E0FFFBB6456A4B93D1FD4584448E2"},{"__ref":"UnknownItem:54D28DD131695086AE57D1A48A4B16FB"},{"__ref":"UnknownItem:9E35CF0246F35AA2B74B4B86B39305C5"},{"__ref":"UnknownItem:5F4B92173F0E5EFBA8B86C6315C2761E"},{"__ref":"UnknownItem:6C296BA33870564E8281721B5F0C16B5"},{"__ref":"UnknownItem:A2C926D705115FFEB19CD0BCD186B5F8"},{"__ref":"UnknownItem:D08345B9EB8B58E5A865804D549C027C"},{"__ref":"UnknownItem:EB8AFF6A2A3A504DA5FA70F766E9EA82"},{"__ref":"UnknownItem:A9533A91B1DB5B3998F38F81504EE5DE"},{"__ref":"UnknownItem:9EDEBB2CC0375FBE887DA6B5CB16688F"},{"__ref":"UnknownItem:A2EA3F03953651CE8EC857EB6ABD9416"},{"__ref":"UnknownItem:E20CAD936FCA5C918D4A040E9B24B430"},{"__ref":"UnknownItem:F3889DE07C015EDD94E35F249933700F"},{"__ref":"UnknownItem:4D349CFBCDE852C9AAD35B8CE63558E8"},{"__ref":"UnknownItem:910376CC8EA9576F99888DB52F98414C"},{"__ref":"UnknownItem:16B6FCEED2B95D62BE126A22378878C5"},{"__ref":"UnknownItem:B3CA9A14E1DD5344B93DD34D3E0340D0"},{"__ref":"UnknownItem:5E2EE655CA0E59448490F3E6F85F5F67"},{"__ref":"UnknownItem:36A30DA2373E58778081E098C1320650"},{"__ref":"UnknownItem:5843DF134D2757238C19FFA1A6927BB3"},{"__ref":"UnknownItem:9A3984E0D778571FAC5AF64EB0196402"},{"__ref":"UnknownItem:6C3AA03CE4C05028BC488B435F54E1F8"},{"__ref":"UnknownItem:A12E230AC82950E8AE9F86C827246C50"},{"__ref":"UnknownItem:E1F874813B5F57048A42679D169A0122"},{"__ref":"UnknownItem:6DB95BC2B30D5EF2A352A05E39B74967"},{"__ref":"UnknownItem:964BBE01167C50C780FC1D2CE678AC35"},{"__ref":"UnknownItem:D43E662CFB3D55C0BAD12F52CA617FAA"},{"__ref":"UnknownItem:DAF5C3E5E2A559FBA2210FC5D27B67D6"},{"__ref":"UnknownItem:55013E0B942755EC913C7F7067C70A52"},{"__ref":"UnknownItem:F83C767529055750B9938BBB966A36CB"},{"__ref":"UnknownItem:5EDDFE57B6755C4A808F85614464562D"},{"__ref":"UnknownItem:959984F5A91A541A9380D355C77DC1C4"},{"__ref":"UnknownItem:0500B9F16B4D5DDBADB6CC4391C3DA5E"},{"__ref":"UnknownItem:A4D7BE5BD1835923AC3C8F8C2A10587E"},{"__ref":"UnknownItem:F7BA692A157758BDB7B71D197F89E3DD"},{"__ref":"UnknownItem:B54AFC730D8E5ADC9939BB721816FD31"},{"__ref":"UnknownItem:BE7EDD930A2B5788A8B4405D1E1D72D7"},{"__ref":"UnknownItem:F508BC49B0935789AAB0B39F7BDEADB5"},{"__ref":"UnknownItem:AFD6C4B46C725F1B96787E6348C9909F"},{"__ref":"UnknownItem:7BA6EB1829EF571285070EE2E54E6D3C"},{"__ref":"UnknownItem:50B66FE734E25303B53DDCD85344A866"},{"__ref":"UnknownItem:328DEDB2152156EE96FF05CC9157CC3D"},{"__ref":"UnknownItem:C70919BB34205AE2B73D91B528D56BA1"},{"__ref":"UnknownItem:FEA285046AE45FF2AC2CD252DFCA5A56"},{"__ref":"UnknownItem:CCB307E9DD345725BA6BA2DDFCD577C3"},{"__ref":"UnknownItem:11C3528DEC6D5207AB9C7EE3799B302B"},{"__ref":"UnknownItem:5F8C08E81A435CAE97B4574FD0905908"},{"__ref":"UnknownItem:318DF222DFF654C3B489EE28AC2520F7"},{"__ref":"UnknownItem:8E14DB3CE8795825841E5FF1596BF615"},{"__ref":"UnknownItem:40AA99715B8652E7B6F5A0503BE0DB52"},{"__ref":"UnknownItem:833EFD7B35CD547491C6801BC4059CB0"},{"__ref":"UnknownItem:96B48102D50C5B01B95BA370C69527F3"},{"__ref":"UnknownItem:CA7177A01B9A5CD9BF00BEA950B834EB"},{"__ref":"UnknownItem:B3A46468ADD85D9C805303DEC7CB5384"},{"__ref":"UnknownItem:4C020199764C526085BDB439D21B68C8"},{"__ref":"UnknownItem:95EEB1A74C0D5319B158811FD219BEDC"},{"__ref":"UnknownItem:F753E5B931FD57B89E1B4EF795712795"},{"__ref":"UnknownItem:13692319006254AA84F68BB34BE6909C"},{"__ref":"UnknownItem:693A0858A647565DB86D01C646473972"},{"__ref":"UnknownItem:688BBDF259CC5B26A00AB24E4BA13D17"},{"__ref":"UnknownItem:9C7DDA01D64F5A258689B5C164B5ED4D"},{"__ref":"UnknownItem:A3E29A4121815B74877D1B795F1F9EFB"},{"__ref":"UnknownItem:CAA3E9BEAEC25791ADD1DC33BA3E69E6"},{"__ref":"UnknownItem:30BAB4FCAC7B51B4BA325E71D94C2F66"},{"__ref":"UnknownItem:125340D5B2E7558B94F5108929AACD3D"},{"__ref":"UnknownItem:C3CBBCCF1FE15D09A7BD13C50D29699E"},{"__ref":"UnknownItem:3FC3F80139C5566384B97B7420D7C624"},{"__ref":"UnknownItem:27ECC5523FDE5A27892EC0CDA82CFD66"},{"__ref":"UnknownItem:6DC7FA8E868454D2B2DCF5B97657ECB8"},{"__ref":"UnknownItem:147B87A8A3CB5C30AA3C4FB03A5248A7"},{"__ref":"UnknownItem:194F40483FF15ABF9DD3E54CCA4A7376"},{"__ref":"UnknownItem:1808651C2A0E55648EFE2366BA808C7E"},{"__ref":"UnknownItem:7CC9CE1E6F995662842EBE89DFDFF4D9"},{"__ref":"UnknownItem:ED0E8EBABB475DEBBCB9BF70CB9BBBA2"},{"__ref":"UnknownItem:C7ABA2502D035544872C5B9818B52DBD"},{"__ref":"UnknownItem:CC86B67E845C5AD2A87C892DEC4C3B76"},{"__ref":"UnknownItem:69983C19C96C59989222BFD93FBD8751"},{"__ref":"UnknownItem:F269AFF026215E32A431B9C6F42AB1E1"},{"__ref":"UnknownItem:39C2722D5E6C529AA876A950F1E31877"},{"__ref":"UnknownItem:3C88265EA01854F6A3F36760AD7B687F"},{"__ref":"UnknownItem:1A74FA0D1E235428B690FDBBE0EFE239"},{"__ref":"UnknownItem:BB68988BF4885C72882E906D330F3EB8"},{"__ref":"UnknownItem:DADCF81C9FC95CBF8DFE797F2B8C7231"},{"__ref":"UnknownItem:502B5A53D16B5975A78DA7395E2F0A98"},{"__ref":"UnknownItem:3BFDF7DFDA885700BB3D967BDA4C6C4E"},{"__ref":"UnknownItem:973E7527271A583D856ACFBE53F1CAE1"},{"__ref":"UnknownItem:035EFDEC2F745269B5F5067C548D6FFE"},{"__ref":"UnknownItem:29BE4F22C5D25ADC9F0F8308B50DFD7E"},{"__ref":"UnknownItem:2AAF7415514F5C10B597D162F39A1E4E"},{"__ref":"UnknownItem:F8B7FED43FC0532A9E8B542D91EE8B49"},{"__ref":"UnknownItem:FFD66550A4C65101B6EFCF78618EC398"},{"__ref":"UnknownItem:09A0529BD4EA5F2DBA29426950E364E6"},{"__ref":"UnknownItem:60B95E41BA065AF1AC2CE2AF87A6530B"},{"__ref":"UnknownItem:F6BED3FDFC6153549D0F8BD6D2076594"},{"__ref":"UnknownItem:963B37F6E98D55AC9BBCF8B1D5AA6167"},{"__ref":"UnknownItem:E34C3C769B66543EB1613C5005A8D03A"},{"__ref":"UnknownItem:E001258F71DE57F0B3F393D727CEEDFB"},{"__ref":"UnknownItem:7776D6D4A49359278BF8C83FCD9BB365"},{"__ref":"UnknownItem:0765C5AF96C2563A95C540E594154990"},{"__ref":"UnknownItem:048A45EF900D5F09A874B53D77BC0B51"},{"__ref":"UnknownItem:6E5CF9FA5FBC5BF0BEE528D44FD3DFD9"},{"__ref":"UnknownItem:200790A8CD1D5ED39B47950C646DB4B5"},{"__ref":"UnknownItem:38C00DBC3B365694B6A7D81B4E8F9B84"},{"__ref":"UnknownItem:31EE34ECA3D75395A289BA4123DA4E47"},{"__ref":"UnknownItem:E842AF90C86D57499E6972A670F7D681"},{"__ref":"UnknownItem:7E7F44FB002B5B30800228800FEE145A"},{"__ref":"UnknownItem:DFE144D5F7555281A9DB71B116B53E2B"},{"__ref":"UnknownItem:9487C5E63F2855EE9EB12FE0A6A46565"},{"__ref":"UnknownItem:6AB0BFCE1D02553AB542DE97C987A320"},{"__ref":"UnknownItem:FEF5C6C274D354738D889A8ABE8C646C"},{"__ref":"UnknownItem:510C9D3F0B8D5A05930577D10935B86D"},{"__ref":"UnknownItem:BF3A1850BC55585C9A04533C04BBD88C"},{"__ref":"UnknownItem:7B48088D89C65CFF813C788DAEE7802F"},{"__ref":"UnknownItem:53C5AB74679E52F08FECE7E095753E8A"},{"__ref":"UnknownItem:F89ED44AC7B855898E3180A51103610F"},{"__ref":"UnknownItem:9558B53B433154F493D98C04FBB32FF6"},{"__ref":"UnknownItem:166E538304785F8D9F5861A81B056FC4"},{"__ref":"UnknownItem:E9D29EA3371C57D39316C141534E3FF0"},{"__ref":"UnknownItem:AB5D1D61C3AE5C3598756F87D4355D76"},{"__ref":"UnknownItem:A0F8790640805FF7AAA73E7F2EF7A26A"},{"__ref":"UnknownItem:6A25C6670BD9598FB8FDB150DD205FE1"},{"__ref":"UnknownItem:A57C58E2245A58B0B2CA6CFC40706C78"},{"__ref":"UnknownItem:48978CB175F55CC08219AB06AA7070E6"},{"__ref":"UnknownItem:AF3C68B1DD2B5496AFB8BD99A6E11340"},{"__ref":"UnknownItem:03C7F09B67F15218BF053C8B6836FDA7"},{"__ref":"UnknownItem:30320D8093DF5A6B96D2FE547DDB9701"},{"__ref":"UnknownItem:339FEAAC693D54AAB6558B9F7A924EA1"},{"__ref":"UnknownItem:10E31064ACA750A88C8E45A29225B244"},{"__ref":"UnknownItem:DE1B850B35B655D8B32B71DF62117112"},{"__ref":"UnknownItem:2857CAA42CD159229CED9FCBBA6AE0D3"},{"__ref":"UnknownItem:EB91E94ECDD457D7B7D6A279DA3CC7B9"},{"__ref":"UnknownItem:6D7EB4DF242B52F5A54331BEA0A441CE"},{"__ref":"UnknownItem:BDBA3B7C7B5F5A588D1F641A3CB32137"},{"__ref":"UnknownItem:64012B51C04B56C5AE5F33DB85C15BC4"},{"__ref":"UnknownItem:60AD78229E0F5F74B54714AB69F71461"},{"__ref":"UnknownItem:4227B8C768F150A3B40E2697A1BAD18E"},{"__ref":"UnknownItem:52BCFF5D33065E5FB78CD2EEECFC6D09"},{"__ref":"UnknownItem:9C403E89D2A75C39B1C215923BD89AB0"},{"__ref":"UnknownItem:F447686915225B598646FF382090A87E"},{"__ref":"UnknownItem:A0C93C477119552C8350B9D2B6F4AA3F"},{"__ref":"UnknownItem:5B88FEA7730450B1BAC34CF3DC101403"},{"__ref":"UnknownItem:67E5E17DF31352CCB54064453E14552E"},{"__ref":"UnknownItem:038312E3572A588EBAD75F31B86FD7AF"},{"__ref":"UnknownItem:98B7B741A7705274976B6D806B68716A"},{"__ref":"UnknownItem:BB241A05B0DD524FB1EAC3E8D263AA92"},{"__ref":"UnknownItem:9DB239DD80965560BDEE6770152182FD"},{"__ref":"UnknownItem:869265FDB4AE5AC787492EAFBD4C7B08"},{"__ref":"UnknownItem:DA945E767701558896CD5DE45D218BC4"},{"__ref":"UnknownItem:A24ADDD331684CD09120699142CE3DE4"},{"__ref":"UnknownItem:CF8359885E1B4973A59A85213ABBE2EB"},{"__ref":"UnknownItem:A5BD9FFD747745C9AD722783D9A37624"},{"__ref":"UnknownItem:9A2ACB7D84554065957400ACDE859860"},{"__ref":"UnknownItem:5565E5DE7BFC4CFB940D54E0A1E88A98"},{"__ref":"UnknownItem:FCE3B13C6CA64D128AA3FAB67EE575B4"},{"__ref":"UnknownItem:CABDAE87F424560CBBD3ED0D5163D620"},{"__ref":"UnknownItem:01F0CB85AB265ABD99941A09128C91F5"},{"__ref":"UnknownItem:AC1A0CD072EF5B5882C474D5840EAF28"}]},"ROOT_QUERY":{"__typename":"Query","item({\"path\":\"6e72cc69-c129-4c6a-b439-296957f13a11\"})":{"__ref":"C__AppRoute:6E72CC69C1294C6AB439296957F13A11"},"item({\"path\":\"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002FContent\u002FInfoHub\"})":{"__ref":"UnknownItem:73FC51D2D08F4C038427C7906A6F7327"},"item({\"path\":\"\u002Fsitecore\u002Ftemplates\u002FProject\u002Fngen\"})":{"__ref":"UnknownItem:B64A1395065A4ECFBEBA7F52E1DA72FA"}}}}</script></body></html>

Pages: 1 2 3 4 5 6 7 8 9 10