CINXE.COM

<!DOCTYPE html><html data-vue-meta-server-rendered lang="en"><head><script type="text/javascript" src="https://web-static.archive.org/_static/js/bundle-playback.js?v=7YQSqjSh" charset="utf-8"></script> <script type="text/javascript" src="https://web-static.archive.org/_static/js/wombat.js?v=txqj7nKC" charset="utf-8"></script> <script>window.RufflePlayer=window.RufflePlayer||{};window.RufflePlayer.config={"autoplay":"on","unmuteOverlay":"hidden"};</script> <script type="text/javascript" src="https://web-static.archive.org/_static/js/ruffle/ruffle.js"></script> <script type="text/javascript"> __wm.init("http://web.archive.org/web"); __wm.wombat("https://www.cisecurity.org/","20240524191405","http://web.archive.org/","web","https://web-static.archive.org/_static/", "1716578045"); </script> <link rel="stylesheet" type="text/css" href="https://web-static.archive.org/_static/css/banner-styles.css?v=p7PEIJWi" /> <link rel="stylesheet" type="text/css" href="https://web-static.archive.org/_static/css/iconochive.css?v=3PDvdIFv" /> <!-- End Wayback Rewrite JS Include --> <title data-vm-ssr="true">CIS Center for Internet Security</title><link rel="canonical" href="http://web.archive.org/web/20240524191405/https://www.cisecurity.org/" data-vm-ssr="true"><meta name="description" content="CIS is a forward-thinking nonprofit that harnesses the power of a global IT community to safeguard public and private organizations against cyber threats." data-vm-ssr="true"><meta name="robots" content="index, follow" data-vm-ssr="true"><meta property="og:title" content="CIS" data-vm-ssr="true"><meta property="og:description" content="CIS is a forward-thinking nonprofit that harnesses the power of a global IT community to safeguard public and private organizations against cyber threats." data-vm-ssr="true"><meta property="og:image" content="http://web.archive.org/web/20240524191405im_/https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2018/10/2.png?h=627&amp;iar=0&amp;w=1200&amp;rev=7c1f874bd5d2483a83c05f895340cfeb&amp;hash=D9FE6DDD7E336F7711BDCA43043257C6" data-vm-ssr="true"><meta property="og:image:width" content="1200" data-vm-ssr="true"><meta property="og:image:height" content="627" data-vm-ssr="true"><meta property="og:locale" content="en_US" data-vm-ssr="true"><meta property="og:site_name" content="CIS" data-vm-ssr="true"><meta property="og:type" content="website" data-vm-ssr="true"><meta property="article:publisher" content="https://www.facebook.com/CenterforIntSec/" data-vm-ssr="true"><meta property="twitter:site" content="@CISecurity" data-vm-ssr="true"><meta property="twitter:creator" content="@CISecurity" data-vm-ssr="true"><meta property="twitter:title" content="CIS" data-vm-ssr="true"><meta property="twitter:description" content="CIS is a forward-thinking nonprofit that harnesses the power of a global IT community to safeguard public and private organizations against cyber threats." data-vm-ssr="true"><meta property="twitter:image" content="https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/logo-mobile.svg?h=60&amp;iar=0&amp;w=155&amp;rev=982608d429ea404fa13f0f7d84594a46&amp;hash=2BAFE86C729F1EC4BC759D586ECC0D49" data-vm-ssr="true"><!--teleport anchor--><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width,initial-scale=1"><meta name="VirtualFolder" content="/"><link rel="apple-touch-icon" sizes="180x180" href="/web/20240524191405im_/https://www.cisecurity.org/dist/cisecurity/img/icons/apple-touch-icon.png"><link rel="icon" type="image/png" sizes="32x32" href="/web/20240524191405im_/https://www.cisecurity.org/dist/cisecurity/img/icons/favicon-32x32.png"><link rel="icon" type="image/png" sizes="16x16" href="/web/20240524191405im_/https://www.cisecurity.org/dist/cisecurity/img/icons/favicon-16x16.png"><link rel="manifest" href="/web/20240524191405/https://www.cisecurity.org/dist/cisecurity/img/icons/site.webmanifest.json"><link rel="mask-icon" href="/web/20240524191405im_/https://www.cisecurity.org/dist/cisecurity/img/icons/safari-pinned-tab.svg" color="#5bbad5"><link rel="shortcut icon" href="/web/20240524191405im_/https://www.cisecurity.org/dist/cisecurity/img/icons/favicon.ico"><link rel="stylesheet" href="http://web.archive.org/web/20240524191405cs_/https://use.typekit.net/nap2dtl.css"><meta name="msapplication-TileColor" content="#2b5797"><meta name="msapplication-config" content="/dist/cisecurity/img/icons/browserconfig.xml"><meta name="msapplication-TileImage" content="/dist/cisecurity/img/icons/mstile-150x150.png"><meta name="theme-color" content="#ffffff"><script defer="defer" src="/web/20240524191405js_/https://www.cisecurity.org/dist/cisecurity/js/js-cookie/2.2.1/js.cookie.min.js"></script><script defer="defer" src="http://web.archive.org/web/20240524191405js_/https://code.jquery.com/jquery-3.6.0.min.js" integrity="" crossorigin="anonymous"></script><script defer="defer" src="http://web.archive.org/web/20240524191405js_/https://code.jquery.com/jquery-migrate-3.4.0.min.js" integrity="" crossorigin="anonymous"></script><script id="Cookiebot" src="http://web.archive.org/web/20240524191405js_/https://consent.cookiebot.com/uc.js" data-cbid="965d9c8b-6ef3-48b4-ba8f-11d8d9ba39c1" async></script><script>window.addEventListener("CookiebotOnAccept",(function(){Cookiebot.consent.marketing&&-1==document.cookie.indexOf("SC_TRACKING_CONSENT")&&fetch("/api/cookieconsent/giveconsent")}),!1)</script><script defer="defer" type="module" src="/web/20240524191405jm_/https://www.cisecurity.org/dist/cisecurity/js/chunk-vendors.f119dcaa.js"></script><script defer="defer" type="module" src="/web/20240524191405jm_/https://www.cisecurity.org/dist/cisecurity/js/app.ec330ff7.js"></script><link href="/web/20240524191405cs_/https://www.cisecurity.org/dist/cisecurity/css/app.fa0dd3bf.css" rel="stylesheet"><script defer="defer" src="/web/20240524191405js_/https://www.cisecurity.org/dist/cisecurity/js/chunk-vendors-legacy.e09e5005.js" nomodule></script><script defer="defer" src="/web/20240524191405js_/https://www.cisecurity.org/dist/cisecurity/js/app-legacy.f0c78958.js" nomodule></script></head><body><noscript>You need to enable JavaScript to run this app.</noscript><div id="root"><!--[--><div class="d-flex flex-column" data-v-2559b02d><!----></div><!--[--><!--[--><!--]--><div class="c-site" data-v-241726b0><!----><!----><div class="c-site__banner" data-v-241726b0><!--[--><!--[--><div data-v-241726b0 data-v-64cd0852><!--[--><div data-v-64cd0852><div class="c-banner" data-v-64cd0852><div class="c-banner__content" data-v-64cd0852><p>[NEW] A Guide to Defining Reasonable Cybersecurity | <a href="/web/20240524191405/https://www.cisecurity.org/insights/white-papers/reasonable-cybersecurity-guide">Learn More</a></p></div><button class="c-banner__close" data-v-64cd0852></button></div></div><!--]--></div><!--]--><!--]--></div><header class="c-site__header" role="banner" data-v-241726b0><div class="jss-placeholder" data-v-241726b0><!--[--><!--[--><div data-v-241726b0><a class="c-site__logo" href="/web/20240524191405/https://www.cisecurity.org/" target><!----><img alt="CIS Logo" width="300" height="86" class="c-site__logo--d" src="http://web.archive.org/web/20240524191405im_/https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-logo.png?h=86&amp;iar=0&amp;w=300&amp;rev=7ed3ffb78afd465c969c97d743c66d1c&amp;hash=A51D01D4D383E4ACD170D4227BA4606B"></a><div class="c-site__nav-container"><div class="c-site__nav-container-padding"><div class="c-nav-controls"><button type="button" class="c-button__close" aria-label="Mobile Close Menu Button"></button></div><div class="c-header-utility" aria-label="Utility Navigation"><div class="c-header-utility__item"><!--[--><a class="c-header-utility__link c-header-utility__security" href="/web/20240524191405/https://www.cisecurity.org/cis-hardened-image-list" title data-v-0094d80a>CIS Hardened Images</a><a class="c-header-utility__link c-header-utility__support" href="/web/20240524191405/https://www.cisecurity.org/support" target data-v-0094d80a>Support</a><a class="c-header-utility__link c-header-utility__signin" href="http://web.archive.org/web/20240524191405/https://workbench.cisecurity.org/" target data-v-0094d80a>CIS WorkBench Sign In</a><!--]--></div><!--[--><div class="c-header-utility__item c-alert" data-v-47d70404><div class="c-alert__level--blue c-alert__title" data-v-47d70404> Alert Level: <span class="c-alert__option" data-v-47d70404>guarded</span><span class="c-alert__button" data-v-47d70404></span></div><!----></div><!--]--></div><nav class="c-nav" role="navigation" aria-label="Main Navigation"><div class="c-nav__list"><!--[--><div class="" data-v-0e09efec><div class="c-nav__item" data-v-0e09efec><a class="c-nav__link" aria-haspopup="true" aria-expanded="false" href="/web/20240524191405/https://www.cisecurity.org/#/" title data-v-0e09efec>Company</a><div class="company c-nav-dropdown" aria-label="submenu" data-v-0e09efec><div class="c-nav-dropdown__container" data-v-0e09efec><div class="c-nav-controls" data-v-0e09efec><button type="button" class="c-button__back" data-v-0e09efec> Back </button><button type="button" class="c-button__close" aria-label="Mobile Back Button" data-v-0e09efec></button></div><span class="c-nav-dropdown__nav-title" data-v-0e09efec>Company</span><div class="c-nav-content" data-v-0e09efec><!--[--><div data-v-0e09efec><div class="c-nav-dropdown__content"><span class="c-nav-dropdown__headline">Who We Are</span><span class="c-nav-dropdown__text">CIS is an independent, nonprofit organization with a mission to create confidence in the connected world.</span></div><div class="c-nav-dropdown__divider"></div><div class="c-nav-dropdown__links"><div class="c-link-list"><!--[--><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/about-us" title>About Us</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/about-us/cis-leadership-principles" title>Leadership Principles</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/about-us/leadership" title>Leadership Team</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/testimonials" title>Testimonials</a><!----></div><!--]--></div><div class="c-link-list"><!--[--><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/about-us/media" title>Media</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/event-calendar" title>Events</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="http://web.archive.org/web/20240524191405/https://learn.cisecurity.org/contact-us" target>Contact Us</a><!----></div><!--]--></div><div class="c-link-list-bottom"><!----></div></div></div><!--]--></div></div></div></div></div><div class="" data-v-0e09efec><div class="c-nav__item" data-v-0e09efec><a class="c-nav__link" aria-haspopup="true" aria-expanded="false" href="/web/20240524191405/https://www.cisecurity.org/" target data-v-0e09efec>Solutions</a><div class="solutions c-nav-dropdown" aria-label="submenu" data-v-0e09efec><div class="nav-full-width c-nav-dropdown__container" data-v-0e09efec><div class="c-nav-controls" data-v-0e09efec><button type="button" class="c-button__back" data-v-0e09efec> Back </button><button type="button" class="c-button__close" aria-label="Mobile Back Button" data-v-0e09efec></button></div><span class="c-nav-dropdown__nav-title" data-v-0e09efec>Solutions</span><div class="c-nav-content" data-v-0e09efec><!--[--><div class="u-flex-full" data-v-0e09efec data-v-01f15fe7><div class="c-nav-dropdown__half" data-v-01f15fe7><!--[--><div class="c-nav-dropdown__links nav-with-icon" data-v-01f15fe7 data-v-edfd60ce><img alt="Icon" width="31" height="40" class="c-nav-dropdown__icon" src="http://web.archive.org/web/20240524191405im_/https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2023/icon-organization.svg?h=40&amp;iar=0&amp;w=31&amp;rev=3ac90ee26d3e44cb9933bfb4fe833319&amp;hash=F0300BD206B3EAE393C39355F9A7736B" data-v-edfd60ce><span class="c-nav-dropdown__headline" data-v-edfd60ce>Secure Your Organization</span><div class="c-link-list-half c-link-list" data-v-edfd60ce><!--[--><div class="c-link-list__item" data-v-edfd60ce><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/controls" title>CIS Critical Security Controls</a><span class="c-link-list__desc">Prioritized &amp; simplified best practices</span></div><div class="c-link-list__item" data-v-edfd60ce><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/communities/controls" title>CIS Controls Community</a><span class="c-link-list__desc">Help develop and maintain the Controls</span></div><div class="c-link-list__item" data-v-edfd60ce><a class="c-link-list__link" href="http://web.archive.org/web/20240524191405/https://learn.cisecurity.org/cis-ram" target>CIS RAM</a><span class="c-link-list__desc">Information security risk assessment method</span></div><div class="c-link-list__item" data-v-edfd60ce><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/controls/cis-controls-self-assessment-tool-cis-csat" title>CIS CSAT</a><span class="c-link-list__desc">Assess &amp; measure Controls implementation</span></div><!--]--></div></div><div class="c-nav-dropdown__links nav-with-icon" data-v-01f15fe7 data-v-edfd60ce><img alt="Icon" width="40" height="35" class="c-nav-dropdown__icon" src="http://web.archive.org/web/20240524191405im_/https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2023/icon-platform.svg?h=35&amp;iar=0&amp;w=40&amp;rev=2c16ba14f88d4801baf19fade4155fd3&amp;hash=E3AB8C80C49A2759831D92E1BD246E51" data-v-edfd60ce><span class="c-nav-dropdown__headline" data-v-edfd60ce>Secure Specific Platforms</span><div class="c-link-list-half c-link-list" data-v-edfd60ce><!--[--><div class="c-link-list__item" data-v-edfd60ce><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/cis-benchmarks" title target>CIS Benchmarks™</a><span class="c-link-list__desc">100+ vendor-neutral configuration guides</span></div><div class="c-link-list__item" data-v-edfd60ce><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/communities/benchmarks" title>CIS Benchmarks Community</a><span class="c-link-list__desc">Develop &amp; update secure configuration guides</span></div><div class="c-link-list__item" data-v-edfd60ce><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/cybersecurity-tools/cis-cat-pro" title>CIS-CAT®Pro</a><span class="c-link-list__desc">Assess system conformance to CIS Benchmarks</span></div><div class="c-link-list__item" data-v-edfd60ce><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/cis-hardened-images" title>CIS Hardened Images®</a><span class="c-link-list__desc">Virtual images hardened to CIS Benchmarks on cloud service provider marketplaces</span></div><!--]--></div></div><div class="c-nav-dropdown__links nav-with-icon bordered" data-v-01f15fe7><img alt="SecureSuite®" width="41" height="41" class="c-nav-dropdown__icon" src="http://web.archive.org/web/20240524191405im_/https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2023/icon-securesuite.svg?h=41&amp;iar=0&amp;w=41&amp;rev=c067c575dc7e48fa83e5a052d7029702&amp;hash=2F2655A91C693BD1463FD39D63A1349D"><!----><div class="c-link-list"><!--[--><div class="c-link-list__item" data-v-c1b279d2><div class="text-wrap" data-v-c1b279d2><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/cis-securesuite" title data-v-c1b279d2>CIS SecureSuite®</a><span class="c-link-list__desc" data-v-c1b279d2>Start secure and stay secure with integrated cybersecurity tools and resources designed to help you implement CIS Benchmarks and CIS Controls</span></div><div class="link-wrap" data-v-c1b279d2><a class="c-link-list__link--bottom c-cta--tertiary" href="/web/20240524191405/https://www.cisecurity.org/cis-securesuite" title data-v-c1b279d2>Learn More</a><a class="c-link-list__link--bottom c-cta--tertiary" href="http://web.archive.org/web/20240524191405/https://enroll.cisecurity.org/memberships/#/" target data-v-c1b279d2>Apply Now</a></div></div><!--]--></div></div><!--]--></div><div class="c-nav-dropdown__half" data-v-01f15fe7><div class="nav-with-bg" data-v-01f15fe7><!--[--><div class="c-nav-dropdown__links nav-with-icon" data-v-01f15fe7 data-v-65be1356><img alt="U.S. State, Local, Tribal &amp; Territorial Governments" width="41" height="41" class="c-nav-dropdown__icon" src="http://web.archive.org/web/20240524191405im_/https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2023/icon-government.svg?h=41&amp;iar=0&amp;w=41&amp;rev=16678d2dab0b478e97bd953706f9e35e&amp;hash=C18C652B4AC22AE85971DAFF9DD38A68" data-v-65be1356><span class="c-nav-dropdown__headline" data-v-65be1356>U.S. State, Local, Tribal &amp; Territorial Governments</span><div class="c-nav-dropdown__half" data-v-65be1356><div class="c-link-list" data-v-65be1356><!--[--><div data-v-65be1356><span class="c-nav-dropdown__subheadline">Memberships</span></div><div class="c-link-list__item" data-v-65be1356><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/ms-isac" title>MS-ISAC®</a><span class="c-link-list__desc">Cybersecurity resource for SLTT Governments</span></div><div class="c-link-list__item" data-v-65be1356><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/ei-isac" title>EI-ISAC®</a><span class="c-link-list__desc">Election-focused cyber defense suite</span></div><div data-v-65be1356><span class="c-nav-dropdown__subheadline">Elections</span></div><div class="c-link-list__item" data-v-65be1356><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/elections" title>Election Security Tools And Resources</a><span class="c-link-list__desc">Sources to support the cybersecurity needs of the election community</span></div><!--]--></div></div><div class="c-nav-dropdown__half" data-v-65be1356><div class="c-link-list" data-v-65be1356><!--[--><div data-v-65be1356><span class="c-nav-dropdown__subheadline">Services for Members</span></div><div class="c-link-list__item" data-v-65be1356><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/services/albert-network-monitoring" title>Albert Network Monitoring®</a><span class="c-link-list__desc">Cost-effective Intrusion Detection System</span></div><div class="c-link-list__item" data-v-65be1356><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/services/managed-security-services-mss" title>Managed Security Services</a><span class="c-link-list__desc">Security monitoring of enterprises devices</span></div><div class="c-link-list__item" data-v-65be1356><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/services/endpoint-security-services" title>CIS Endpoint Security Services</a><span class="c-link-list__desc">Device-level protection and response</span></div><div class="c-link-list__item" data-v-65be1356><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/services/cis-cybermarket" title>CIS CyberMarket®</a><span class="c-link-list__desc">Savings on training and software</span></div><div class="c-link-list__item" data-v-65be1356><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/services/mdbrplus" title target>Malicious Domain Blocking and Reporting Plus</a><span class="c-link-list__desc">Prevent connection to harmful web domains</span></div><!--]--></div><a class="c-cta--tertiary" href="/web/20240524191405/https://www.cisecurity.org/services" title data-v-65be1356>View All CIS Services</a></div></div><!--]--></div><a class="c-cta--secondary" href="/web/20240524191405/https://www.cisecurity.org/cybersecurity-tools" title data-v-01f15fe7>View All Products &amp; Services</a></div></div><!--]--></div></div></div></div></div><div class="" data-v-0e09efec><div class="c-nav__item" data-v-0e09efec><a class="c-nav__link" aria-haspopup="true" aria-expanded="false" href="/web/20240524191405/https://www.cisecurity.org/insights" title data-v-0e09efec>Insights</a><div class="insights c-nav-dropdown" aria-label="submenu" data-v-0e09efec><div class="nav-full-width c-nav-dropdown__container" data-v-0e09efec><div class="c-nav-controls" data-v-0e09efec><button type="button" class="c-button__back" data-v-0e09efec> Back </button><button type="button" class="c-button__close" aria-label="Mobile Back Button" data-v-0e09efec></button></div><span class="c-nav-dropdown__nav-title" data-v-0e09efec>Insights</span><div class="c-nav-content" data-v-0e09efec><!--[--><div data-v-0e09efec><div class="c-nav-dropdown__content"><span class="c-nav-dropdown__headline">Insights</span><span class="c-nav-dropdown__text">Explore trending articles, expert perspectives, real-world applications, and more from the best minds in cybersecurity and IT.</span></div><div class="c-nav-dropdown__divider"></div><div class="c-nav-dropdown__links"><div class="c-link-list"><!--[--><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/advisory" title>Advisories</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/insights/blog" title>Blog</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/insights/case-study" title>Case Studies</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/insights/spotlight" title>Spotlights</a><!----></div><!--]--></div><div class="c-link-list"><!--[--><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/insights/newsletter" title>Newsletters</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/insights/podcast" title>Podcasts</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/insights/webinar" title>Webinars</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/insights/white-papers" title>Whitepapers</a><!----></div><!--]--></div><div class="c-link-list-bottom"><!--[--><div><a class="c-cta--secondary" href="/web/20240524191405/https://www.cisecurity.org/insights/all" title>View All Insights</a></div><!--]--></div></div></div><!--]--></div></div></div></div></div><div class="" data-v-0e09efec><div class="c-nav__item" data-v-0e09efec><a class="c-nav__link" aria-haspopup="true" aria-expanded="false" href="/web/20240524191405/https://www.cisecurity.org/" target data-v-0e09efec>Join CIS</a><div class="joincis c-nav-dropdown" aria-label="submenu" data-v-0e09efec><div class="c-nav-dropdown__container" data-v-0e09efec><div class="c-nav-controls" data-v-0e09efec><button type="button" class="c-button__back" data-v-0e09efec> Back </button><button type="button" class="c-button__close" aria-label="Mobile Back Button" data-v-0e09efec></button></div><span class="c-nav-dropdown__nav-title" data-v-0e09efec>Join CIS</span><div class="c-nav-content" data-v-0e09efec><!--[--><div data-v-0e09efec><div class="c-nav-dropdown__content"><span class="c-nav-dropdown__headline">Get Involved</span><span class="c-nav-dropdown__text">Join us on our mission to secure online experiences for all. Become a CIS member, partner, or volunteer—and explore our career opportunities.</span></div><div class="c-nav-dropdown__divider"></div><div class="c-nav-dropdown__links"><div class="c-link-list"><!--[--><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/cis-securesuite" title>CIS SecureSuite® Membership</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/ms-isac" title>Multi-State ISAC (MS-ISAC®)</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/ei-isac" title>Elections Infrastructure ISAC (EI-ISAC®)</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/services/cis-cybermarket/vendor-information" title>CIS CyberMarket® Vendors</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/communities" title>CIS Communities</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="http://web.archive.org/web/20240524191405/https://careers-cisecurity.icims.com/jobs/search?hashed=-626009842&amp;mobile=false&amp;width=1492&amp;height=500&amp;bga=true&amp;needsRedirect=false&amp;jan1offset=-300&amp;jun1offset=-240" target>Careers</a><!----></div><!--]--></div><div class="c-link-list"><!----></div><div class="c-link-list-bottom"><!----></div></div></div><!--]--></div></div></div></div></div><!--]--></div></nav></div></div><div class="c-site__search"><div class="wrapper"><button type="button" class="c-search-button" aria-label="Search Open Button"></button><input class="c-search-input" placeholder="" aria-label="Search"><button type="button" class="c-search-submit" aria-label="Search Submit Button"></button><button type="button" class="c-search-close" aria-label="Search Close Button"></button></div></div><button type="button" class="c-site__hamburger" aria-label="Mobile Hamburger Button"><span class="hamburger-inner"></span></button></div><!--]--><!--]--></div></header><main class="c-site__main" role="main" data-v-241726b0><div class="jss-placeholder c-site__breadcrumb" data-v-241726b0><!----></div><div class="jss-placeholder c-site__content" data-v-241726b0><!--[--><div class="c-home-masthead" data-v-241726b0 data-v-4888a0c2><div class="c-home-masthead__headlines" data-v-4888a0c2><h1 data-v-4888a0c2>Creating Confidence in the Connected World™</h1><h2 data-v-4888a0c2>At CIS®, we’re harnessing the power of the global IT community to safeguard public and private organizations against cyber threats. Join us.</h2></div><div class="c-home-masthead__gradient" data-v-4888a0c2><div class="c-home-masthead__features" data-v-4888a0c2><div class="left" data-v-4888a0c2><!--[--><div class="featured-article padding" data-v-4888a0c2 data-v-4968cb7c><div class="featured-article__image" data-v-4968cb7c><img alt="Reasonable-Cybersecurity-Guide--Website" width="900" height="570" src="http://web.archive.org/web/20240524191405im_/https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2024/05/reasonable-cybersecurity-guide--website-feature--900x570.png?h=570&amp;iar=0&amp;w=900&amp;rev=9096fd63c1c7415ca4e91e56520d2829&amp;hash=CEDE0411434264D35F96E93D1029A2BD" data-v-4968cb7c></div><div class="featured-article__content" data-v-4968cb7c><span class="label" data-v-4968cb7c>FEATURED</span><h3 class="featured-article__title" data-v-4968cb7c>[NEW] A Guide to Defining Reasonable Cybersecurity!</h3><div class="featured-article__intro" data-v-4968cb7c><p>There has been no real definition of what "reasonable" cybersecurity is...until now!</p></div><a class="c-cta--primary" href="/web/20240524191405/https://www.cisecurity.org/insights/white-papers/reasonable-cybersecurity-guide" title target data-v-4968cb7c>Download the guide</a><!----></div></div><!--]--></div><div class="right" data-v-4888a0c2><!--[--><div class="c-industry" data-v-4888a0c2 data-v-b42594e2><span class="label" data-v-b42594e2>Our Industries</span><h4 class="headline" data-v-b42594e2>Cybersecurity threats and solutions by industry</h4><a class="c-cta--tertiary" href="/web/20240524191405/https://www.cisecurity.org/industry" title target data-v-b42594e2>View Industry List</a></div><div class="from-the-blog" data-v-4888a0c2 data-v-dc136d42><div class="from-the-blog__date" data-v-dc136d42><span data-v-dc136d42>From The Blog 05.21.2024</span></div><span class="from-the-blog__title" data-v-dc136d42>CIS Benchmarks Volunteer Spotlight: Hardeep Mehrotara</span><a class="c-cta--tertiary" href="/web/20240524191405/https://www.cisecurity.org/insights/blog/cis-benchmarks-volunteer-spotlight-hardeep-mehrotara" data-v-dc136d42>Read More</a></div><!--]--></div><div class="bottom" data-v-4888a0c2><!----></div></div><!--[--><div data-v-4888a0c2 data-v-5c6c38f6><div class="c-cards" data-v-5c6c38f6><h2 class="c-cards__title" data-v-5c6c38f6>World-Renowned Best Practices and Expert Communities</h2><div data-v-5c6c38f6><!--[--><div class="c-cards__item" data-v-5c6c38f6><div class="card-image"><img alt="CIS Controls" width="402" height="72" src="http://web.archive.org/web/20240524191405im_/https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-controls-card.png?h=72&amp;iar=0&amp;w=402&amp;rev=763ae927d7524afd939143b042219cf3&amp;hash=7F2D59BEC512E86A7256E91B3FF78072"></div><div class="card-content">Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.</div><a class="c-cta--secondary" href="/web/20240524191405/https://www.cisecurity.org/controls" title>Download &amp; Explore</a><button aria-label="Expand" class="card-expand"></button><!--teleport start--><!--teleport end--></div><div class="c-cards__item" data-v-5c6c38f6><div class="card-image"><img alt="CIS Benchmarks" width="482" height="68" src="http://web.archive.org/web/20240524191405im_/https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2022/11/cis-benchmarks-card.png?h=68&amp;iar=0&amp;w=482&amp;rev=16d3360d8b964603853cfe81b17e05b5&amp;hash=EAE0DAFD457E55BC68924452C35FB0DE"></div><div class="card-content">Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.</div><a class="c-cta--secondary" href="/web/20240524191405/https://www.cisecurity.org/cis-benchmarks" title>Download Latest</a><button aria-label="Expand" class="card-expand"></button><!--teleport start--><!--teleport end--></div><div class="c-cards__item" data-v-5c6c38f6><div class="card-image"><img alt="CIS SecureSuite" width="482" height="72" src="http://web.archive.org/web/20240524191405im_/https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-securesuite-card.png?h=72&amp;iar=0&amp;w=482&amp;rev=0a6e8cbf135c4d319640226604d1947a&amp;hash=F0B2C44589BB26A13A46094FCBE647FB"></div><div class="card-content">Secure your organization with resources and tools designed to harness the power of CIS Benchmarks and CIS Controls.</div><a class="c-cta--secondary" href="/web/20240524191405/https://www.cisecurity.org/cis-securesuite" title>Learn More</a><button aria-label="Expand" class="card-expand"></button><!--teleport start--><!--teleport end--></div><div class="c-cards__item" data-v-5c6c38f6><div class="card-image"><img alt="MS-ISAC EI-ISAC" width="480" height="52" src="http://web.archive.org/web/20240524191405im_/https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/msisac-eiisac-card.png?h=52&amp;iar=0&amp;w=480&amp;rev=b7d47be946504deb93c4af2f5079ee39&amp;hash=47AA8FCA9BBCAD0ACCC2F53C097B2A32"></div><div class="card-content">Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.</div><a class="c-cta--secondary" href="/web/20240524191405/https://www.cisecurity.org/isac" title>Learn More</a><button aria-label="Expand" class="card-expand"></button><!--teleport start--><!--teleport end--></div><!--]--></div></div></div><!--]--></div></div><div class="home-blockquote" data-v-241726b0><div class="home-blockquote__title"><h2>What The Experts Are Saying</h2></div><div class="home-blockquote__quotes"><div class="splide" aria-label="Quotes"><div class="splide__track"><ul class="splide__list"><!--[--><!--[--><!--[--><li class="splide__slide"><!--[--><div class="home-blockquote-item" data-v-241726b0 data-v-d12e3600><div class="home-blockquote-item__quote" data-v-d12e3600>The CIS Controls take the background and knowledge of cybersecurity experts literally around the world and help focus efforts on things that are of most value. Directly impacting the adversaries and challenges we face today on our networks.</div><div class="home-blockquote-item__name" data-v-d12e3600>Harley Parkes</div><div data-v-d12e3600><span class="home-blockquote-item__title" data-v-d12e3600>Director</span><span data-v-d12e3600>, </span><span class="home-blockquote-item__organization" data-v-d12e3600>ACD (Integrated Adaptive Cyber Defense)</span></div></div><!--]--></li><li class="splide__slide"><!--[--><div class="home-blockquote-item" data-v-241726b0 data-v-d12e3600><div class="home-blockquote-item__quote" data-v-d12e3600>Without this resource, the hardening of our devices would have taken a lot longer and required many meetings between IT and Security to debate which configuration settings to change and the impact they could have. The CIS Benchmarks provided the necessary information to alleviate many of the fears IT may have had with changing specific settings.</div><div class="home-blockquote-item__name" data-v-d12e3600>Adam</div><div data-v-d12e3600><span class="home-blockquote-item__title" data-v-d12e3600>Banking Information Security Engineer</span><!----><!----></div></div><!--]--></li><li class="splide__slide"><!--[--><div class="home-blockquote-item" data-v-241726b0 data-v-d12e3600><div class="home-blockquote-item__quote" data-v-d12e3600>We work with sensitive information on a daily basis. The CIS Controls along with CIS-CAT Pro, a proven and indispensable tool, helps us to evaluate and maintain a security baseline for our IT infrastructure.</div><div class="home-blockquote-item__name" data-v-d12e3600>Sasawat Malaivongs</div><div data-v-d12e3600><span class="home-blockquote-item__title" data-v-d12e3600>Business Director</span><span data-v-d12e3600>, </span><span class="home-blockquote-item__organization" data-v-d12e3600>ACinfotec</span></div></div><!--]--></li><!--]--><!--]--><!--]--></ul></div></div></div></div><div class="featured-cta" data-v-241726b0 data-v-34178946><div class="featured-cta__img" data-v-34178946><a class="" href="/web/20240524191405/https://www.cisecurity.org/communities/controls" title="CIS Controls Community" data-v-34178946><!----><img alt=" " width="400" height="118" src="http://web.archive.org/web/20240524191405im_/https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/homepage-featured-space/2022/homepage-controls-community.png?h=118&amp;iar=0&amp;w=400&amp;rev=fac50a0f5b6544cb8ff157ffdc089678&amp;hash=4404504FB5DFE568E0EBC4BB12A4684A" data-v-34178946></a><a class="" href="/web/20240524191405/https://www.cisecurity.org/communities/benchmarks" title data-v-34178946><!----><img alt=" " width="400" height="114" src="http://web.archive.org/web/20240524191405im_/https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/homepage-featured-space/2022/homepage-benchmarks-community.png?h=114&amp;iar=0&amp;w=400&amp;rev=498de6d6d6724375b4671230afa70722&amp;hash=905A57FFA64678C0A570A059D0849ABB" data-v-34178946></a></div><div class="featured-cta__text" data-v-34178946><h2 class="cta-title" data-v-34178946>Together, We Can Make a Difference</h2><div class="featured-cta__content" data-v-34178946>Our CIS Controls and CIS Benchmarks communities connect IT security practitioners from around the globe to help secure our ever-changing world. Our Ambassadors champion the CIS best practices, making it easier for enterprises everywhere to strengthen their cyber defenses and streamline their compliance efforts. We hope you’ll add your voice.</div><a class="c-cta--secondary" href="/web/20240524191405/https://www.cisecurity.org/communities" title data-v-34178946>Learn More</a></div></div><div data-v-241726b0><div class="rich-text-home"> <h2>Why We Do What We Do</h2> <p class="c-intro-text">At CIS, we believe in secure online experiences for all. We&rsquo;re driven by our mission to develop, validate, and promote timely best practice solutions that help people, businesses, and governments protect themselves against pervasive cyber threats.</p> <a class="c-cta--secondary" href="/web/20240524191405/https://www.cisecurity.org/about-us">About Us</a>&nbsp;</div></div><!--]--></div><div class="jss-placeholder c-site__infoHub" data-v-241726b0><!--[--><div class="c-infohub home" data-v-241726b0><div class="c-infohub__header"><h2>Information Hub</h2><h3>What&#39;s New</h3><!----></div><div class="c-infohub__inner"><!--[--><div class="c-infohub-link"><div class="c-infohub-link__header"><span class="c-infohub-link__type">Advisory</span><span class="c-infohub-link__date">05.24.2024</span></div><div class="c-infohub-link__inner"><a href="/web/20240524191405/https://www.cisecurity.org/advisory/a-vulnerability-in-google-chrome-could-allow-for-arbitrary-code-execution_2024-061">2024-061: A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution</a></div><div class="c-infohub-link__footer"><a href="/web/20240524191405/https://www.cisecurity.org/advisory/a-vulnerability-in-google-chrome-could-allow-for-arbitrary-code-execution_2024-061">Read More</a></div></div><div class="c-infohub-link"><div class="c-infohub-link__header"><span class="c-infohub-link__type">Advisory</span><span class="c-infohub-link__date">05.23.2024</span></div><div class="c-infohub-link__inner"><a href="/web/20240524191405/https://www.cisecurity.org/advisory/a-vulnerability-in-github-enterprise-server-ghes-could-allow-for-authentication-bypass_2024-060">2024-060: A Vulnerability in GitHub Enterprise Server (GHES) Could Allow for Authentication Bypass</a></div><div class="c-infohub-link__footer"><a href="/web/20240524191405/https://www.cisecurity.org/advisory/a-vulnerability-in-github-enterprise-server-ghes-could-allow-for-authentication-bypass_2024-060">Read More</a></div></div><div class="c-infohub-link"><div class="c-infohub-link__header"><span class="c-infohub-link__type">Blog Post</span><span class="c-infohub-link__date">05.21.2024</span></div><div class="c-infohub-link__inner"><a href="/web/20240524191405/https://www.cisecurity.org/insights/blog/cis-benchmarks-volunteer-spotlight-hardeep-mehrotara">CIS Benchmarks Volunteer Spotlight: Hardeep Mehrotara</a></div><div class="c-infohub-link__footer"><a href="/web/20240524191405/https://www.cisecurity.org/insights/blog/cis-benchmarks-volunteer-spotlight-hardeep-mehrotara">Read More</a></div></div><div class="c-infohub-link"><div class="c-infohub-link__header"><span class="c-infohub-link__type">Press Release</span><span class="c-infohub-link__date">05.21.2024</span></div><div class="c-infohub-link__inner"><a href="/web/20240524191405/https://www.cisecurity.org/about-us/media/press-release/cis-controls-featured-as-recommended-defenses-in-verizons-2024-data-breach-investigations-report">CIS Controls Featured as Recommended Defenses in Verizon&#39;s 2024 Data Breach Investigations Report</a></div><div class="c-infohub-link__footer"><a href="/web/20240524191405/https://www.cisecurity.org/about-us/media/press-release/cis-controls-featured-as-recommended-defenses-in-verizons-2024-data-breach-investigations-report">Read More</a></div></div><!--]--></div></div><!--]--></div></main><footer class="c-site__footer" role="contentinfo" data-v-241726b0><div class="jss-placeholder" data-v-241726b0><!--[--><!--[--><div class="c-footer" data-v-241726b0 data-v-5689c325><nav class="c-footer__nav" aria-label="Footer Navigation" data-v-5689c325><div data-v-5689c325><!--[--><div class="c-nav__list" data-v-5689c325><a class="c-nav__header" href="/web/20240524191405/https://www.cisecurity.org/about-us" title>About</a><div class="c-link-list-container"><div class="c-link-list"><!--[--><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/about-us/leadership" title>Leadership</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/about-us/board" title>Board</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/communities" title>Communities</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="http://web.archive.org/web/20240524191405/https://careers-cisecurity.icims.com/" target>Careers</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/about-us/media" title>Media</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/testimonials" title>Testimonials</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/event-calendar" title>Events</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="http://web.archive.org/web/20240524191405/http://www.uscyberchallenge.org/" target>US Cyber Challenge</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/support" title>Support</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="http://web.archive.org/web/20240524191405/https://learn.cisecurity.org/contact-us" target>Contact</a></div><!--]--></div></div></div><div class="c-nav__list" data-v-5689c325><a class="c-nav__header" href="/web/20240524191405/https://www.cisecurity.org/cybersecurity-tools" title>Products And Tools</a><div class="c-link-list-container"><div class="c-link-list"><!--[--><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/controls" title target>CIS Critical Security Controls®</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/cis-benchmarks" title>CIS Benchmarks™</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/cis-hardened-images" title>CIS Hardened Images®</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/cis-securesuite" title>CIS SecureSuite®</a></div><div class="c-link-list__item c-link-list__item--spacer"></div><div class="c-link-list__item"><a class="c-link-list__link" href="http://web.archive.org/web/20240524191405/https://learn.cisecurity.org/cis-cat-lite" target>CIS-CAT®Lite</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/cybersecurity-tools/cis-cat-pro" title>CIS-CAT®Pro</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="http://web.archive.org/web/20240524191405/https://learn.cisecurity.org/cis-ram" target>CIS RAM</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/controls/cis-controls-self-assessment-tool-cis-csat" title>CIS CSAT</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="http://web.archive.org/web/20240524191405/https://workbench.cisecurity.org/" target>CIS WorkBench</a></div><!--]--></div></div></div><div class="c-nav__list" data-v-5689c325><a class="c-nav__header" href="/web/20240524191405/https://www.cisecurity.org/isac" title>For SLTT Governments</a><div class="c-link-list-container"><div class="c-link-list"><!--[--><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/ms-isac" title>MS-ISAC®</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/ei-isac" title>EI-ISAC®</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/elections" title>Election Resources</a></div><div class="c-link-list__item c-link-list__item--spacer"></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/services" title target>CIS Services®</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/services/albert-network-monitoring" title>Albert Network Monitoring</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/services/managed-security-services-mss" title>Managed Security Services</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/services/endpoint-security-services" title>Endpoint Security Services</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/services/mdbrplus" title target>Malicious Domain Blocking and Reporting Plus</a></div><div class="c-link-list__item c-link-list__item--spacer"></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/services/cis-cybermarket" title>CIS CyberMarket®</a></div><!--]--></div></div></div><div class="c-nav__list" data-v-5689c325><a class="c-nav__header" href="/web/20240524191405/https://www.cisecurity.org/insights" title>Explore</a><div class="c-link-list-container"><div class="c-link-list"><!--[--><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/insights/blog" title>Blog</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/insights/white-papers" title>Whitepapers</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/insights/newsletter" title>Newsletters</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/insights/webinar" title>Webinars</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/insights/case-study" title>Case Studies</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/web/20240524191405/https://www.cisecurity.org/insights/spotlight" title>Spotlights</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="http://web.archive.org/web/20240524191405/https://www.youtube.com/user/TheCISecurity" target="_blank">Videos</a></div><!--]--></div></div></div><!--]--></div></nav><div class="c-footer__global" data-v-5689c325><div class="c-footer__links" data-v-5689c325><!--[--><p class="c-footer__copyright" data-v-5689c325> Copyright © 2024 Center for Internet Security® </p><a class="c-footer__link" data-v-5689c325 href="/web/20240524191405/https://www.cisecurity.org/privacy-notice" title target>Privacy Notice</a><!--]--></div><div class="c-footer__social" data-v-5689c325><!--[--><a class="c-footer__icon twitter" data-v-5689c325 href="http://web.archive.org/web/20240524191405/https://twitter.com/CISecurity/" target="_blank">Twitter</a><a class="c-footer__icon facebook" data-v-5689c325 href="http://web.archive.org/web/20240524191405/https://www.facebook.com/CenterforIntSec/" target="_blank">Facebook</a><a class="c-footer__icon youtube" data-v-5689c325 href="http://web.archive.org/web/20240524191405/https://www.youtube.com/user/TheCISecurity/" target="_blank">YouTube</a><a class="c-footer__icon linkedin" data-v-5689c325 href="http://web.archive.org/web/20240524191405/https://www.linkedin.com/company/the-center-for-internet-security/" target="_blank">LinkedIn</a><!--]--></div></div></div><!--]--><!--]--></div></footer><!--[--><!--]--><!--teleport start--><!--teleport end--><!--teleport start--><!--teleport end--></div><!--]--><!--]--></div><script type="application/json" id="__JSS_STATE__">{"sitecore":{"context":{"pageEditing":false,"site":{"name":"cisecurity"},"pageState":"normal","canonicalUrl":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fwww.cisecurity.org","language":"en","itemPath":"\u002F"},"route":{"name":"home","displayName":"home","fields":{"canonicalUrl":{"value":""},"cdnMaxAge":{"value":300},"excludeFromSearch":{"value":false},"pageDescription":{"value":"CIS is a forward-thinking nonprofit that harnesses the power of a global IT community to safeguard public and private organizations against cyber threats."},"pageTitle":{"value":"CIS Center for Internet Security"},"robotsIndex":{"value":true},"robotsMaxVideoPreview":{"value":""},"featuredImage":{"value":{"src":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fwww.cisecurity.org\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Flogos-and-icons\u002F2022\u002Flogo-mobile.svg?h=60&iar=0&w=155&rev=982608d429ea404fa13f0f7d84594a46&hash=2BAFE86C729F1EC4BC759D586ECC0D49","alt":"CIS","width":"155","height":"60"}},"robotsFollow":{"value":true},"robotsMaxSnippet":{"value":""},"legacyUrl":{"value":""},"robotsMaxImagePreview":{"value":""},"Page Design":null,"facebookDescription":{"value":""},"facebookImage":{"value":{"src":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fwww.cisecurity.org\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fuploads\u002F2018\u002F10\u002F2.png?h=627&iar=0&w=1200&rev=7c1f874bd5d2483a83c05f895340cfeb&hash=D9FE6DDD7E336F7711BDCA43043257C6","alt":"Center for Internet Security","width":"1200","height":"627"}},"facebookLocale":{"value":""},"facebookSiteName":{"value":""},"facebookTitle":{"value":"CIS"},"facebookUrl":{"value":""},"articlePublisher":{"value":""},"facebookType":{"value":"website"},"articleModifiedTime":{"value":"0001-01-01T00:00:00Z"},"articlePublishedTime":{"value":"0001-01-01T00:00:00Z"},"twitterDescription":{"value":""},"twitterReadTime":{"value":""},"twitterTitle":{"value":"CIS"},"twitterCard":{"value":""},"twitterImage":{"value":{}},"twitterWrittenBy":{"value":""}},"databaseName":"web","deviceId":"fe5d7fdf-89c0-4d99-9aa3-b5fbd009c9f3","itemId":"6e72cc69-c129-4c6a-b439-296957f13a11","itemLanguage":"en","itemVersion":14,"layoutId":"96e5f4ba-a2cf-4a4c-a4e7-64da88226362","templateId":"05104a97-4567-4c08-97e7-122d45274800","templateName":"App Route","placeholders":{"jss-banner":[{"uid":"4e8f8918-36c3-46b7-a369-fc7d6d60b3eb","componentName":"PartialDesignDynamicPlaceholder","dataSource":"","params":{"sid":"{04FBF6E2-C039-4F1C-8C1B-B41CABA5CECA}","ph":"jss-banner","sig":"sxa-banner"},"placeholders":{"sxa-banner":[{"uid":"3c74800e-e981-47df-b975-64e0d73e46ca","componentName":"CIS-Banner","dataSource":"{E43A5261-F26B-4FBA-B0EB-4607E56770C8}","fields":{"content":{"value":"\u003Cp\u003E[NEW] A Guide to Defining Reasonable Cybersecurity | \u003Ca href=\"\u002Finsights\u002Fwhite-papers\u002Freasonable-cybersecurity-guide\"\u003ELearn More\u003C\u002Fa\u003E\u003C\u002Fp\u003E"}}}]}}],"jss-header":[{"uid":"0634ed11-f397-465f-b8e1-699d11b05e26","componentName":"PartialDesignDynamicPlaceholder","dataSource":"","params":{"sid":"{16968506-A352-48E5-AA44-4E6A4EA4CA96}","ph":"jss-header","sig":"sxa-header"},"placeholders":{"sxa-header":[{"uid":"328909f8-cbeb-44ef-a4fc-134ea9f6c4f9","componentName":"CIS-Header","dataSource":"{450033B1-BCBB-43F2-87ED-F2E8D2EF6614}","fields":{"logo":{"value":{"src":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fwww.cisecurity.org\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Flogos-and-icons\u002F2022\u002Fcis-logo.png?h=86&iar=0&w=300&rev=7ed3ffb78afd465c969c97d743c66d1c&hash=A51D01D4D383E4ACD170D4227BA4606B","alt":"CIS Logo","width":"300","height":"86"}},"logoLink":{"value":{"href":"\u002F","text":"Logo","linktype":"external","url":"\u002F","anchor":"","target":""}},"logoMobile":{"value":{"src":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fwww.cisecurity.org\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Flogos-and-icons\u002F2022\u002Flogo-mobile.svg?h=60&iar=0&w=155&rev=982608d429ea404fa13f0f7d84594a46&hash=2BAFE86C729F1EC4BC759D586ECC0D49","alt":"CIS Logo","width":"155","height":"60"}}},"placeholders":{"jss-global-links":[{"uid":"2126b36f-d96b-4d5c-842c-11541ddbf375","componentName":"CIS-HeaderUtility-Link","dataSource":"{73B049AB-6C79-4CEF-8FCE-853BD50E6146}","fields":{"link":{"value":{"text":"CIS Hardened Images","anchor":"","linktype":"internal","class":"c-header-utility__security","title":"","querystring":"","id":"{17A384ED-7A9D-E228-BE2B-EC5EC762A3F3}","href":"\u002Fcis-hardened-image-list"}}}},{"uid":"b90923e9-4fc7-419e-b99d-e6e3bde67cb7","componentName":"CIS-HeaderUtility-Link","dataSource":"{A3D61712-E370-4901-B7C9-4CE5F08BE2A3}","fields":{"link":{"value":{"linktype":"internal","text":"Support","class":"c-header-utility__support","querystring":"","target":"","id":"{34DDDDA5-FD41-E76F-9829-385B9EF35B03}","href":"\u002Fsupport"}}}},{"uid":"c78f0976-de6c-4dc5-81a7-679fd494eb1e","componentName":"CIS-HeaderUtility-Link","dataSource":"{C6AF05B5-D306-4FCB-A358-D9A14F1EEEC5}","fields":{"link":{"value":{"href":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fworkbench.cisecurity.org\u002F","linktype":"external","text":"CIS WorkBench Sign In","class":"c-header-utility__signin","url":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fworkbench.cisecurity.org\u002F","anchor":"","target":""}}}}],"jss-nav":[{"uid":"ed5cf878-93f0-470f-b35f-26445268d7bf","componentName":"CIS-Navigation-Link","dataSource":"{8A1E2376-A4AB-4437-879F-BBAF836A69CB}","fields":{"link":{"value":{"text":"Company","anchor":"\u002F","linktype":"internal","class":"","title":"","querystring":"","id":"{6E72CC69-C129-4C6A-B439-296957F13A11}","href":"\u002F"}},"title":{"value":"Company"},"content":{"value":""},"fullWidth":{"value":false}},"placeholders":{"jss-dropdown":[{"uid":"36f636cb-409a-48f5-968e-755e3b7d9b76","componentName":"CIS-DropDown-ContentWithLinks","dataSource":"{8AAD819E-E56E-459F-9523-0A0A4AFFE503}","fields":{"content":{"value":"CIS is an independent, nonprofit organization with a mission to create confidence in the connected world."},"heading":{"value":"Who We Are"}},"placeholders":{"jss-link":[{"uid":"cb1739f1-5b33-425a-83c7-6baaae630912","componentName":"CIS-List-Link","dataSource":"{3A4B3C38-FAB2-4B8D-BB4C-E0105B310100}","fields":{"description":{"value":""},"link":{"value":{"text":"About Us","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{CE0E4674-2099-1EFD-0872-24554C9B1BDF}","href":"\u002Fabout-us"}}}},{"uid":"0ebaac49-8f14-4235-99a2-bd808684dc78","componentName":"CIS-List-Link","dataSource":"{7E0B5AEC-66A1-4A71-B5E3-C61F123650D5}","fields":{"description":{"value":""},"link":{"value":{"text":"Leadership Principles","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{819935F0-5143-D949-EFE4-8FE50A244B11}","href":"\u002Fabout-us\u002Fcis-leadership-principles"}}}},{"uid":"bee24314-44d4-4ff4-8c5f-2e542cf0ffb6","componentName":"CIS-List-Link","dataSource":"{E413B8F2-7527-47F1-AF16-72EDDCC6BBAF}","fields":{"description":{"value":""},"link":{"value":{"text":"Leadership Team","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{38C7F30C-A0A6-1FCC-B555-0F0B31319356}","href":"\u002Fabout-us\u002Fleadership"}}}},{"uid":"5d62de7e-9cfd-412a-a09c-988c835c9c2f","componentName":"CIS-List-Link","dataSource":"{D0576333-B539-4B02-8C3A-AD80884C6879}","fields":{"description":{"value":""},"link":{"value":{"text":"Testimonials","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{96FDBB45-69F1-2EB3-2D0B-27983F625023}","href":"\u002Ftestimonials"}}}}],"jss-link-second":[{"uid":"87e688ef-b608-4f61-9903-f7f7d5a328bc","componentName":"CIS-List-Link","dataSource":"{C7D0A084-4227-4B5D-B13A-8913C1AF2F24}","fields":{"description":{"value":""},"link":{"value":{"id":"{C44F2D0C-7882-EF48-AAF0-ABD11D4FD831}","querystring":"","text":"Media","anchor":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Fabout-us\u002Fmedia","title":"","class":"","linktype":"internal","href":"\u002Fabout-us\u002Fmedia"}}}},{"uid":"354aab95-9bc5-42c5-b955-c9f2a3e89874","componentName":"CIS-List-Link","dataSource":"{91CF1D26-7AB6-49A3-A6C3-2CC23F90F277}","fields":{"description":{"value":""},"link":{"value":{"text":"Events","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{AF78681B-ADBD-0D67-43E1-A8933FB358B8}","href":"\u002Fevent-calendar"}}}},{"uid":"f3013010-169d-4a55-97d6-318429307a14","componentName":"CIS-List-Link","dataSource":"{33CC2B08-F08F-4D16-BD74-82D8D15C6DBA}","fields":{"description":{"value":""},"link":{"value":{"href":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Flearn.cisecurity.org\u002Fcontact-us","text":"Contact Us","linktype":"external","url":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Flearn.cisecurity.org\u002Fcontact-us","anchor":"","target":""}}}}],"jss-link-bottom":[]}}]}},{"uid":"a85daf89-b69b-4cbf-870e-16091f7dd676","componentName":"CIS-Navigation-Link","dataSource":"{3CF4048D-5468-4562-9D53-5548E34BCF35}","fields":{"link":{"value":{"href":"\u002F","text":"Solutions","linktype":"external","url":"\u002F","anchor":"","target":""}},"title":{"value":"Solutions"},"content":{"value":""},"fullWidth":{"value":true}},"placeholders":{"jss-dropdown":[{"uid":"c70af5ed-ac69-4708-938f-6b05f68e8b68","componentName":"CIS-DropDown-TwoColumn","dataSource":"{9D537D46-D706-45B3-B3B9-6FB2ACBCEF3C}","fields":{"linkRightBottom":{"value":{"text":"View All Products & Services","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{EEAB23B1-CC27-66BC-CB2F-6613F71BEA94}","href":"\u002Fcybersecurity-tools"}}},"placeholders":{"jss-column-left":[{"uid":"9a33d4bc-cf85-4bfc-ae58-68e08b995328","componentName":"CIS-DropDown-LinkSection","dataSource":"{9A662824-EA3A-4396-ACBF-32E1DB1EA03F}","fields":{"heading":{"value":"Secure Your Organization"},"listFullWidth":{"value":false},"icon":{"value":{"src":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fwww.cisecurity.org\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Flogos-and-icons\u002F2023\u002Ficon-organization.svg?h=40&iar=0&w=31&rev=3ac90ee26d3e44cb9933bfb4fe833319&hash=F0300BD206B3EAE393C39355F9A7736B","alt":"Icon","width":"31","height":"40"}}},"placeholders":{"jss-link":[{"uid":"0da76734-47f8-491f-b59a-cccc6ab8102f","componentName":"CIS-List-Link","dataSource":"{E93D3215-333B-46AD-8BB3-B2B53EF53C3F}","fields":{"description":{"value":"Prioritized & simplified best practices"},"link":{"value":{"text":"CIS Critical Security Controls","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{19BC09D8-ABED-CA6C-9B3B-169405015827}","href":"\u002Fcontrols"}}}},{"uid":"c1165c5c-73fc-4a73-9c15-5b9d2eb0cb6a","componentName":"CIS-List-Link","dataSource":"{AA55B710-CE50-4703-B678-84703152D96B}","fields":{"description":{"value":"Help develop and maintain the Controls"},"link":{"value":{"text":"CIS Controls Community","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{F14FD165-50F4-70A7-D717-B58EFF6B22F5}","href":"\u002Fcommunities\u002Fcontrols"}}}},{"uid":"eec305d5-f4de-4a05-93e1-002dc952fbf5","componentName":"CIS-List-Link","dataSource":"{295443A1-E804-4B38-BF30-A5D4A7BF97B3}","fields":{"description":{"value":"Information security risk assessment method"},"link":{"value":{"href":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Flearn.cisecurity.org\u002Fcis-ram","text":"CIS RAM","linktype":"external","url":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Flearn.cisecurity.org\u002Fcis-ram","anchor":"","target":""}}}},{"uid":"f2ea3e6e-905b-49a2-8bd9-cc0a704174c1","componentName":"CIS-List-Link","dataSource":"{2DE5F28D-4B75-427A-8F52-C40FB56E4175}","fields":{"description":{"value":"Assess & measure Controls implementation"},"link":{"value":{"text":"CIS CSAT","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{E28A0486-04C9-EE4A-D85D-A29A9045942C}","href":"\u002Fcontrols\u002Fcis-controls-self-assessment-tool-cis-csat"}}}}]}},{"uid":"b9c8b9bc-4547-4815-a72c-558cc28152ea","componentName":"CIS-DropDown-LinkSection","dataSource":"{E4C08ADE-58B0-452E-A8C4-18F18F1BD8B6}","fields":{"heading":{"value":"Secure Specific Platforms"},"listFullWidth":{"value":false},"icon":{"value":{"src":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fwww.cisecurity.org\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Flogos-and-icons\u002F2023\u002Ficon-platform.svg?h=35&iar=0&w=40&rev=2c16ba14f88d4801baf19fade4155fd3&hash=E3AB8C80C49A2759831D92E1BD246E51","alt":"Icon","width":"40","height":"35"}}},"placeholders":{"jss-link":[{"uid":"c1f0bb39-67cc-4be6-8eec-116856b737d3","componentName":"CIS-List-Link","dataSource":"{285291D8-B30A-4892-9118-4DF4AF15A8A8}","fields":{"description":{"value":"100+ vendor-neutral configuration guides"},"link":{"value":{"text":"CIS Benchmarks™","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{EEAD5F3F-F889-42AE-555F-AB0B21F4FF01}","href":"\u002Fcis-benchmarks"}}}},{"uid":"e53784f0-487c-4165-9580-cf3483b282e4","componentName":"CIS-List-Link","dataSource":"{FEA7DF03-9545-4D2E-8AD6-7BA46725D7F9}","fields":{"description":{"value":"Develop & update secure configuration guides"},"link":{"value":{"text":"CIS Benchmarks Community","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{E2E60C34-788C-3C5E-B4AB-D9B8D9AEF16D}","href":"\u002Fcommunities\u002Fbenchmarks"}}}},{"uid":"b5f73c72-b943-4992-b71f-2802011e3b51","componentName":"CIS-List-Link","dataSource":"{D4B85B15-8FFD-4423-95FF-AFD5D0AA16AF}","fields":{"description":{"value":"Assess system conformance to CIS Benchmarks"},"link":{"value":{"text":"CIS-CAT®Pro","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{1804D342-98D7-427D-0CB2-01136C37C047}","href":"\u002Fcybersecurity-tools\u002Fcis-cat-pro"}}}},{"uid":"add2f3f9-ca40-4b9a-b8ab-7fb1edf62543","componentName":"CIS-List-Link","dataSource":"{8A97B104-711B-4243-83F4-C1EDAECEB17D}","fields":{"description":{"value":"Virtual images hardened to CIS Benchmarks on cloud service provider marketplaces"},"link":{"value":{"text":"CIS Hardened Images®","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{E7B5656B-D504-03B9-3E90-66CACEFDC5AC}","href":"\u002Fcis-hardened-images"}}}}]}},{"uid":"84de6200-b476-4277-a087-a076ea002b28","componentName":"CIS-DropDown-LinkSection-Bordered","dataSource":"{7FE5ACDA-99FC-490D-9969-D6B1C2625D0F}","fields":{"heading":{"value":""},"icon":{"value":{"src":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fwww.cisecurity.org\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Flogos-and-icons\u002F2023\u002Ficon-securesuite.svg?h=41&iar=0&w=41&rev=c067c575dc7e48fa83e5a052d7029702&hash=2F2655A91C693BD1463FD39D63A1349D","alt":"SecureSuite®","width":"41","height":"41"}},"listFullWidth":{"value":true}},"placeholders":{"jss-link":[{"uid":"54bda5c1-72f4-41f3-9aa4-2e59b3daf380","componentName":"CIS-List-Link-Extra-Links","dataSource":"{B714D7A2-3ED3-45C5-8109-C2201314CB64}","fields":{"description":{"value":"Start secure and stay secure with integrated cybersecurity tools and resources designed to help you implement CIS Benchmarks and CIS Controls"},"link":{"value":{"text":"CIS SecureSuite®","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{A4AF0446-1D42-B77C-07A3-E39FBFA059A8}","href":"\u002Fcis-securesuite"}},"linkBottomOne":{"value":{"text":"Learn More","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{A4AF0446-1D42-B77C-07A3-E39FBFA059A8}","href":"\u002Fcis-securesuite"}},"linkBottomTwo":{"value":{"href":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fenroll.cisecurity.org\u002Fmemberships\u002F#\u002F","text":"Apply Now","linktype":"external","url":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fenroll.cisecurity.org\u002Fmemberships\u002F#\u002F","anchor":"","target":""}}}}]}}],"jss-column-right":[{"uid":"cfb2ba39-ed8d-49f6-8f21-7ef64cbfdf3c","componentName":"CIS-DropDown-LinkSectionWithBg","dataSource":"{D72FAEFA-3AE5-4624-86B1-30557751C0F5}","fields":{"heading":{"value":"U.S. State, Local, Tribal & Territorial Governments"},"headingRight":{"value":"Services for Members"},"icon":{"value":{"src":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fwww.cisecurity.org\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Flogos-and-icons\u002F2023\u002Ficon-government.svg?h=41&iar=0&w=41&rev=16678d2dab0b478e97bd953706f9e35e&hash=C18C652B4AC22AE85971DAFF9DD38A68","alt":"U.S. State, Local, Tribal & Territorial Governments","width":"41","height":"41"}},"linkBg":{"value":{"text":"View All CIS Services","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{2BF3F743-4F7D-2A44-9BA1-426B3A3CFCDD}","href":"\u002Fservices"}},"headingLeft":{"value":"Memberships"},"headingLeft_2":{"value":""},"link":{"value":{"text":"View All CIS Services","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{2BF3F743-4F7D-2A44-9BA1-426B3A3CFCDD}","href":"\u002Fservices"}}},"placeholders":{"jss-bg-left":[{"uid":"9936591d-cb1c-4e0f-ae0b-2efc99a50262","componentName":"CIS-List-Link-Title","dataSource":"{4A882BCE-E4A5-450B-AC2A-611708B9EBDA}","fields":{"heading":{"value":"Memberships"}}},{"uid":"01997673-069c-40b2-82da-97a50a39a88a","componentName":"CIS-List-Link","dataSource":"{74D9205C-915C-45C2-82DC-F72E255FFFA3}","fields":{"description":{"value":"Cybersecurity resource for SLTT Governments"},"link":{"value":{"text":"MS-ISAC®","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{D08DEDA9-3029-4145-7DDB-B71F23291CE5}","href":"\u002Fms-isac"}}}},{"uid":"2bd7b657-50e3-4975-8266-7993bdef3152","componentName":"CIS-List-Link","dataSource":"{A2F2C1C2-E2BC-423A-B7A8-DEC12746ACC5}","fields":{"description":{"value":"Election-focused cyber defense suite"},"link":{"value":{"text":"EI-ISAC®","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{52322A4C-A322-B46A-1626-350246729667}","href":"\u002Fei-isac"}}}},{"uid":"e8e546d1-fd1c-46be-9539-1d7b65e162b9","componentName":"CIS-List-Link-Title","dataSource":"{E20A50CE-5E81-4B56-8901-1F90571CACE3}","fields":{"heading":{"value":"Elections"}}},{"uid":"0920dc46-9497-4240-bc87-3c2f5dc3ca91","componentName":"CIS-List-Link","dataSource":"{4BC43D06-F4DA-4E88-901E-258B20EE2354}","fields":{"description":{"value":"Sources to support the cybersecurity needs of the election community"},"link":{"value":{"text":"Election Security Tools And Resources","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{BAFE31A6-43F2-4780-8A84-BF0146DF5BD5}","href":"\u002Felections"}}}}],"jss-bg-right":[{"uid":"0628201d-8988-4d62-b289-260aa03f1087","componentName":"CIS-List-Link-Title","dataSource":"{7BB43C52-ED1E-478E-B0DE-3F7325B225E4}","fields":{"heading":{"value":"Services for Members"}}},{"uid":"ee5eeb3f-075b-40e2-80a4-1c3cf08bf273","componentName":"CIS-List-Link","dataSource":"{FA210D02-EA30-45CE-81ED-572882AE5F93}","fields":{"description":{"value":"Cost-effective Intrusion Detection System"},"link":{"value":{"text":"Albert Network Monitoring®","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{B8C5738E-5FD1-C161-683D-3F5C78315E0E}","href":"\u002Fservices\u002Falbert-network-monitoring"}}}},{"uid":"70bed5cf-edf6-40eb-8d13-c04a6302d178","componentName":"CIS-List-Link","dataSource":"{BA57CC9E-8D21-4A2C-B833-4980B4A32FDE}","fields":{"description":{"value":"Security monitoring of enterprises devices"},"link":{"value":{"text":"Managed Security Services","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{E8E5D5A9-41BD-E30B-787D-134B9687DFBB}","href":"\u002Fservices\u002Fmanaged-security-services-mss"}}}},{"uid":"03dee259-e087-4707-b107-0baacde1d5d4","componentName":"CIS-List-Link","dataSource":"{3CFFA584-409D-4428-A43E-09E37A7B3D9B}","fields":{"description":{"value":"Device-level protection and response"},"link":{"value":{"text":"CIS Endpoint Security Services","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{FEC18F53-D2B1-59FF-1ADB-F7AE386AB4F2}","href":"\u002Fservices\u002Fendpoint-security-services"}}}},{"uid":"77e9bbb8-d5c4-4873-98b2-f65be8d5fcdd","componentName":"CIS-List-Link","dataSource":"{ED9D5296-EE40-4CAF-9195-8FCE68333DFA}","fields":{"description":{"value":"Savings on training and software"},"link":{"value":{"text":"CIS CyberMarket®","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{377369ED-DD43-D165-4A7E-156EBE490770}","href":"\u002Fservices\u002Fcis-cybermarket"}}}},{"uid":"fae63fa0-0e46-4d65-bb7d-5ba38d200cb1","componentName":"CIS-List-Link","dataSource":"{1465AC7B-EDF6-4F98-8840-BCCE1E5C9D95}","fields":{"description":{"value":"Prevent connection to harmful web domains"},"link":{"value":{"text":"Malicious Domain Blocking and Reporting Plus","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{C908677A-58DC-4788-97E1-DDE96D8766C3}","href":"\u002Fservices\u002Fmdbrplus"}}}}]}}]}}]}},{"uid":"7cc9bb04-9f20-42f1-b974-cde5b2c6094d","componentName":"CIS-Navigation-Link","dataSource":"{3D87CDC1-5AE3-4B1F-B95C-6AE07F6EBF71}","fields":{"link":{"value":{"text":"Insights","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{FB4E12C1-82FC-59D2-90B1-F58388DAACC3}","href":"\u002Finsights"}},"title":{"value":"Insights"},"content":{"value":""},"fullWidth":{"value":true}},"placeholders":{"jss-dropdown":[{"uid":"e4a27e4e-9031-4bfe-8bde-7a4123f2efe8","componentName":"CIS-DropDown-ContentWithLinks","dataSource":"{7E6BF5B0-FD02-404C-BA0E-FEAD337CB9EC}","fields":{"content":{"value":"Explore trending articles, expert perspectives, real-world applications, and more from the best minds in cybersecurity and IT."},"heading":{"value":"Insights"}},"placeholders":{"jss-link":[{"uid":"a88bb037-4188-4743-aeff-571c3f7ddfed","componentName":"CIS-List-Link","dataSource":"{28C31E26-1C34-4DCA-B662-C1C3064C860B}","fields":{"description":{"value":""},"link":{"value":{"text":"Advisories","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{977EDD7F-F11F-5770-ADD2-C7E2CA47B471}","href":"\u002Fadvisory"}}}},{"uid":"7afae56c-6aa3-4808-9323-24b3efdd4587","componentName":"CIS-List-Link","dataSource":"{F203FE56-AC25-409E-8E47-E2C7193CDAA9}","fields":{"description":{"value":""},"link":{"value":{"id":"{A699BE35-8674-5BE8-B3F4-C9769391F6FE}","querystring":"","text":"Blog","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights\u002Fblog","linktype":"internal","href":"\u002Finsights\u002Fblog"}}}},{"uid":"362d9a7f-c77e-481a-ab84-b4e71d2b77cd","componentName":"CIS-List-Link","dataSource":"{55CDE8FF-0116-482A-9D5A-0D6A4F396BAC}","fields":{"description":{"value":""},"link":{"value":{"id":"{2992CF52-4336-5643-BB61-EB5BF0A5DB2A}","querystring":"","text":"Case Studies","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights\u002Fcase-study","linktype":"internal","href":"\u002Finsights\u002Fcase-study"}}}},{"uid":"46693bbb-2607-4400-817a-669114598530","componentName":"CIS-List-Link","dataSource":"{2E11D16A-402E-4C9F-9AA3-6D0E66CB1B9C}","fields":{"description":{"value":""},"link":{"value":{"id":"{19FA18AC-9BBF-569D-AB84-45572D276F62}","querystring":"","text":"Spotlights","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights\u002Fspotlight","linktype":"internal","href":"\u002Finsights\u002Fspotlight"}}}}],"jss-link-second":[{"uid":"9632edf6-b084-42cf-b688-8feef21a06ed","componentName":"CIS-List-Link","dataSource":"{AF8DEABD-3EA5-4442-AFE4-2B7453F03C7F}","fields":{"description":{"value":""},"link":{"value":{"id":"{11C8CCFC-833F-576D-AF85-2C37560B1A67}","querystring":"","text":"Newsletters","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights\u002Fnewsletter","linktype":"internal","href":"\u002Finsights\u002Fnewsletter"}}}},{"uid":"a0ea545f-7d6d-43f4-891e-bfbdae1a3823","componentName":"CIS-List-Link","dataSource":"{DE522F3E-4549-4E11-AC31-389B394BDB59}","fields":{"description":{"value":""},"link":{"value":{"text":"Podcasts","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{02EAD54A-71B4-5BE2-9E78-83925450A1B3}","href":"\u002Finsights\u002Fpodcast"}}}},{"uid":"893e2d06-8485-4226-9c68-be0baf841f8d","componentName":"CIS-List-Link","dataSource":"{B828F752-13CE-4AE1-AA69-4BA39E9D9276}","fields":{"description":{"value":""},"link":{"value":{"id":"{F07F8DAA-8808-5FB4-BB19-1D0F5E5D8D9D}","querystring":"","text":"Webinars","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights\u002Fwebinar","linktype":"internal","href":"\u002Finsights\u002Fwebinar"}}}},{"uid":"704694f4-71e5-49a1-9448-82845348f643","componentName":"CIS-List-Link","dataSource":"{B7368F49-B590-45C3-992C-84974D94DC4D}","fields":{"description":{"value":""},"link":{"value":{"text":"Whitepapers","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{C74111A6-95B5-5A9E-A5DF-2E2A7D2884F9}","href":"\u002Finsights\u002Fwhite-papers"}}}}],"jss-link-bottom":[{"uid":"c7360426-3aaf-47f8-a97c-69c17bcbe335","componentName":"CIS-CTA-Secondary","dataSource":"{1DDC74DF-F8F7-4054-AA7A-AC7197A4F113}","fields":{"cta":{"value":{"text":"View All Insights","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{AA1576EB-41D5-5908-8670-7482A60EF2FE}","href":"\u002Finsights\u002Fall"}}}}]}}]}},{"uid":"210d76b3-a08a-4575-9c45-f573ce6634dc","componentName":"CIS-Navigation-Link","dataSource":"{709FA9B7-B6BB-43E9-8338-2292C3A1F8DE}","fields":{"link":{"value":{"href":"\u002F","text":"Join CIS","linktype":"external","url":"\u002F","anchor":"","target":""}},"title":{"value":"Join CIS"},"content":{"value":""},"fullWidth":{"value":false}},"placeholders":{"jss-dropdown":[{"uid":"9e7ad4da-90d4-4b39-b24b-06754d51dcb6","componentName":"CIS-DropDown-ContentWithLinks","dataSource":"{2D08E60E-967F-4BC0-96EA-E81EB0647361}","fields":{"content":{"value":"Join us on our mission to secure online experiences for all. Become a CIS member, partner, or volunteer—and explore our career opportunities."},"heading":{"value":"Get Involved"}},"placeholders":{"jss-link":[{"uid":"3997df11-bd24-421a-898c-56364f1c2c07","componentName":"CIS-List-Link","dataSource":"{6B8F8747-7ED6-4238-83C9-D05FE3636413}","fields":{"description":{"value":""},"link":{"value":{"text":"CIS SecureSuite® Membership","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{A4AF0446-1D42-B77C-07A3-E39FBFA059A8}","href":"\u002Fcis-securesuite"}}}},{"uid":"643776ab-eefe-46f1-9128-7b918f0ca3a6","componentName":"CIS-List-Link","dataSource":"{F06A46E0-940D-48A3-868A-9DC46B6705EC}","fields":{"description":{"value":""},"link":{"value":{"text":"Multi-State ISAC (MS-ISAC®)","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{D08DEDA9-3029-4145-7DDB-B71F23291CE5}","href":"\u002Fms-isac"}}}},{"uid":"d85631ff-9cf4-485e-afd3-de47bf00b2f6","componentName":"CIS-List-Link","dataSource":"{5926B4E2-A03F-4F82-80FE-3B280C220391}","fields":{"description":{"value":""},"link":{"value":{"text":"Elections Infrastructure ISAC (EI-ISAC®)","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{52322A4C-A322-B46A-1626-350246729667}","href":"\u002Fei-isac"}}}},{"uid":"1a086d84-0685-4edd-88c7-ec1914466913","componentName":"CIS-List-Link","dataSource":"{2B1A6AD2-4554-41EE-AB08-EEA7E555BCC7}","fields":{"description":{"value":""},"link":{"value":{"text":"CIS CyberMarket® Vendors","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{F4EA8918-FC81-DFEB-4F6C-95111021DD73}","href":"\u002Fservices\u002Fcis-cybermarket\u002Fvendor-information"}}}},{"uid":"367d33a8-9fdf-4368-8bf6-42ec6fa87b60","componentName":"CIS-List-Link","dataSource":"{3BDE9CF1-7D21-4B68-AAD4-8410098D4E9F}","fields":{"description":{"value":""},"link":{"value":{"text":"CIS Communities","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{C8DE7E1E-6D97-4675-2B7C-D7D191BE4FD1}","href":"\u002Fcommunities"}}}},{"uid":"ae84ead0-c256-4bf0-85ed-d2515a58d091","componentName":"CIS-List-Link","dataSource":"{72A11957-58AD-43F6-A3F2-4A061683EC8D}","fields":{"description":{"value":""},"link":{"value":{"href":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fcareers-cisecurity.icims.com\u002Fjobs\u002Fsearch?hashed=-626009842&mobile=false&width=1492&height=500&bga=true&needsRedirect=false&jan1offset=-300&jun1offset=-240","text":"Careers","linktype":"external","url":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fcareers-cisecurity.icims.com\u002Fjobs\u002Fsearch?hashed=-626009842&mobile=false&width=1492&height=500&bga=true&needsRedirect=false&jan1offset=-300&jun1offset=-240","anchor":"","target":""}}}}],"jss-link-second":[],"jss-link-bottom":[]}}]}}],"jss-alert":[{"uid":"be66fe6c-f368-42d0-a2a3-626fc41b05c0","componentName":"CIS-Alert","dataSource":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fcisecurity\u002FPresentation\u002FPartial Designs\u002FHeader\u002FData\u002FAlert","fields":{"alert":{"id":"a2b3d6ff-dd6a-411a-b3d9-bbcd6ef49a9c","url":"\u002Fcontent\u002Falertlevel\u002Falert_level","name":"alert_level","displayName":"Alert Level","fields":{"alertLevelDescription":{"value":"On May 22, the Cyber Threat Alert Level was evaluated and is remaining at Blue (Guarded) due to vulnerabilities in SolarWinds and Google products. On May 15, the MS-ISAC released two advisories. The first advisory for a vulnerability in SolarWinds Access Rights Manager that could allow for privilege escalation. The second advisory was for multiple vulnerabilities in Google Chrome, the most severe of which could allow for remote code execution. On May 21 the MS-ISAC released an advisory for multiple vulnerabilities in Google Chrome, the most severe of which could allow for arbitrary code execution. Organizations and users are advised to update and apply all appropriate vendor security patches to vulnerable systems and to continue to update their antivirus signatures daily. Another line of defense includes user awareness training regarding the threats posed by attachments and hypertext links contained in emails especially from un-trusted sources."},"color":{"value":"BLUE"},"legacyId":{"value":331},"publishedAt":{"value":"2024-05-22T11:07:56Z"},"threatLevel":{"value":"GUARDED"},"dateIssued":{"value":"2024-05-22T00:00:00Z"}}}}}]}}]}}],"jss-breadcrumb":[],"jss-main":[{"uid":"ca9c18bf-c531-464c-bf4d-b865d764b772","componentName":"CIS-Home-Masthead","dataSource":"{9A964C19-3707-4534-82E1-DF457FCE05EE}","params":{"GridParameters":"col-12","CacheClearingBehavior":"Clear on publish"},"fields":{"subheading":{"value":"At CIS®, we’re harnessing the power of the global IT community to safeguard public and private organizations against cyber threats. Join us."},"heading":{"value":"Creating Confidence in the Connected World™"}},"placeholders":{"jss-home-masthead-left":[{"uid":"e779e8a0-60f9-4660-ac27-b27dedd17e59","componentName":"CIS-Featured-Article","dataSource":"{D8C5C11B-F1ED-4238-96E7-F570B6A49135}","params":{"GridParameters":"col-12","CacheClearingBehavior":"Clear on publish"},"fields":{"cta":{"value":{"text":"Download the guide","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{670A6F09-FB80-4F3D-816F-3F7BD37B0158}","href":"\u002Finsights\u002Fwhite-papers\u002Freasonable-cybersecurity-guide"}},"image":{"value":{"src":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fwww.cisecurity.org\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fuploads\u002F2024\u002F05\u002Freasonable-cybersecurity-guide--website-feature--900x570.png?h=570&iar=0&w=900&rev=9096fd63c1c7415ca4e91e56520d2829&hash=CEDE0411434264D35F96E93D1029A2BD","alt":"Reasonable-Cybersecurity-Guide--Website","width":"900","height":"570"}},"intro":{"value":"\u003Cp\u003EThere has been no real definition of what \"reasonable\" cybersecurity is...until now!\u003C\u002Fp\u003E"},"link":{"value":{"href":""}},"title":{"value":"[NEW] A Guide to Defining Reasonable Cybersecurity!"},"label":{"value":"FEATURED"},"featuredpadding":{"value":true}}}],"jss-home-masthead-right":[{"uid":"11a7bae8-7a5c-475f-aaa0-bfc375ee62fd","componentName":"CIS-Home-Industry","dataSource":"{22C67CEE-B507-42A6-8A71-AA3D81C30E0F}","params":{"GridParameters":"col-12","CacheClearingBehavior":"Clear on publish"},"fields":{"heading":{"value":"Cybersecurity threats and solutions by industry"},"label":{"value":"Our Industries"},"cta":{"value":{"text":"View Industry List","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{C8E4AB9D-99F0-463C-8F20-FF8ABA96FB2E}","href":"\u002Findustry"}}}},{"uid":"3861ce63-aa34-4d8e-826c-b5996cb6a8b4","componentName":"CIS-From-The-Blog","dataSource":"{3642F679-1E5D-4D9F-A9A2-BAF0077206FE}","params":{"GridParameters":"col-12","CacheClearingBehavior":"Clear on publish"},"fields":{"blogPage":{"id":"691a9915-4ad7-4d77-acb9-ccc59f0366d5","url":"\u002Finsights\u002Fblog\u002Fcis-benchmarks-volunteer-spotlight-hardeep-mehrotara","name":"CIS Benchmarks Volunteer Spotlight Hardeep Mehrotara","displayName":"CIS Benchmarks Volunteer Spotlight: Hardeep Mehrotara","fields":{"canonicalUrl":{"value":""},"cdnMaxAge":{"value":null},"excludeFromSearch":{"value":false},"pageDescription":{"value":"CIS volunteers help to develop, review, and maintain our security best practices. Here's how Hardeep Mehrotara plays his part."},"pageTitle":{"value":"CIS Benchmarks Volunteer Spotlight: Hardeep Mehrotara"},"robotsIndex":{"value":true},"robotsMaxVideoPreview":{"value":"max-video-preview:-1"},"featuredImage":{"value":{"src":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fwww.cisecurity.org\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Finsights_images\u002Fblog_post_img\u002F2024\u002F05\u002Fthumbnail--blog--benchmarks-community-volunteer--mehrotara--1200x628.png?h=628&iar=0&w=1200&rev=7ae2316d8d754d8fab8ca9fe1df83ecd&hash=0E4BE7A539D12B6BBF0C024CCB401B90","alt":"Benchmarks-Community-Volunteer--Mehrotara","width":"1200","height":"628"}},"robotsFollow":{"value":true},"robotsMaxSnippet":{"value":"max-snippet:-1"},"legacyUrl":{"value":""},"robotsMaxImagePreview":{"value":"max-image-preview:large"},"postID":{"value":null},"publishedAt":{"value":"2024-05-21T20:15:00Z"},"resourceExcerpt":{"value":"\u003Cp\u003ECIS volunteers help to develop, review, and maintain our security best practices. Here's how Hardeep Mehrotara plays his part.\u003C\u002Fp\u003E"},"resourceSubtitle":{"value":""},"cta":{"value":{"text":"join a cis community","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{C8DE7E1E-6D97-4675-2B7C-D7D191BE4FD1}","href":"\u002Fcommunities"}},"dateIssued":{"value":"0001-01-01T00:00:00Z"},"resourceContent":{"value":"\u003Cp\u003E\u003Cimg class=\"img-responsive\" src=\"https:\u002F\u002Fwww.cisecurity.org\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Finsights_images\u002Fblog_post_img\u002F2024\u002F05\u002Fhardeep-mehrotara-headshot.png?rev=b4c476267a7644f090b5eadd3035af5f&amp;hash=5A4D2AC1502908446FC369654A92D0F4\" alt=\"Hardeep Mehrotara headshot\" style=\"height: 200px; float: left; margin-right: 15px;\" \u002F\u003E\u003C\u002Fp\u003E\n\u003Cp\u003ECIS volunteers are the backbone of our security best practices. They work hard to make sure the CIS Benchmarks&trade; and the CIS Critical Security Controls\u003Csup\u003E&reg;\u003C\u002Fsup\u003E (CIS Controls\u003Csup\u003E&reg;\u003C\u002Fsup\u003E) reflect a global knowledge base of the latest known cyber threats. Our unique consensus process ensures the Center for Internet Security\u003Csup\u003E&reg;\u003C\u002Fsup\u003E (CIS\u003Csup\u003E&reg;\u003C\u002Fsup\u003E) continues to produce objective, referenced cybersecurity standards for hardening resources in industry, government, and academia. Together with CIS, volunteers from around the world develop, review, and maintain our best practices.\u003C\u002Fp\u003E\n\u003Cp\u003EOne such volunteer is&nbsp;\u003Ca href=\"https:\u002F\u002Fwww.linkedin.com\u002Fin\u002Fhardeep-m-65b954145\u002F\" rel=\"noopener noreferrer\" target=\"_blank\" title=\"Hardeep Mehrotara\" data-mce-href=\"https:\u002F\u002Fwww.linkedin.com\u002Fin\u002Fhardeep-m-65b954145\u002F\"\u003EHardeep Mehrotara\u003C\u002Fa\u003E, Vice President of Information Security &amp; Enterprise Architecture at Concert Properties. He&rsquo;s been a member of the CIS Benchmarks Community since 2012, where he first started off managing the CIS Windows Benchmark. Since then, he has continued to contribute to all CIS Windows Benchmarks, helped with the CIS Office 365 Benchmarks, participated in guide development, and even helped with the CIS Controls.\u003C\u002Fp\u003E\n\u003Cblockquote\u003E\n\u003Ch4\u003E\u003Cspan style=\"color: #0086bf;\"\u003E\"It is an amazing opportunity to give back to the broader cybersecurity community and have an impact on cybersecurity globally,&rdquo; said Mehrotara. &ldquo;The Windows CIS community has grown significantly over the years, as most of the recommendations are vendor-independent, cybersecurity-focused, and developed by professionals with practical experience in the field.\"\u003C\u002Fspan\u003E\n\u003C\u002Fh4\u003E\n\u003C\u002Fblockquote\u003E\n\u003Cp\u003EMehrotara has a significant background in building security programs from the ground up and leading high-performance teams. He has been featured on CTV and Global TV as a cyber expert and currently serves on the program advisory committees for various Canadian colleges and universities. He also serves in the Canadian Forces as an officer responsible for cyber force development, cyber missions, and training. In all of his endeavors, he &ldquo;recommends the use of CIS Benchmarks and Controls as a key mechanism for improving overall cybersecurity maturity and posture.&rdquo;\u003C\u002Fp\u003E\n\u003Cp\u003E\"Being part of a CIS Community is a unique opportunity to help improve and influence the cybersecurity posture of companies around the world,&rdquo; said Mehrotara. &ldquo;It is an amazing opportunity to give back knowledge and expertise so others can benefit from and help the overall community be safer and more secure.&rdquo;\u003C\u002Fp\u003E\n\u003Cp\u003EInterested in becoming a volunteer like Hardeep Mehrotara?\u003C\u002Fp\u003E\n\u003Cimg src=\"https:\u002F\u002Fpixel.welcomesoftware.com\u002Fpx.gif?key=YXJ0aWNsZT1iZGY0NTM1NjBjNzkxMWVmOTVmMWY2Y2Y3NDVhMjk1YQ==\" alt=\"\" height=\"1\" width=\"1\" class=\"nc_pixel\"\u002F\u003E"},"resourceTitle":{"value":"CIS Benchmarks Volunteer Spotlight: Hardeep Mehrotara"},"tags":[],"technologies":[],"controls":[],"owners":[{"id":"2e6fd602-06da-5187-a787-ae5be20dd812","url":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fwww.cisecurity.org\u002Fcontent\u002Ftaxonomies\u002Fowners\u002Fcis-benchmarks-owner","name":"cis-benchmarks-owner","displayName":"CIS Benchmarks","fields":{"description":{"value":""},"legacyID":{"value":123},"defaultImage":{"value":{"src":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fwww.cisecurity.org\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fthumbnail-cis-benchmarks.png?h=360&iar=0&w=540&rev=854498f1017e4ed797e234673b3ff391&hash=2A450970A3781C0C02F7BEA00BA402DE","alt":"CIS Benchmarks","width":"540","height":"360"}},"name":{"value":"CIS Benchmarks"},"slug":{"value":"benchmarks"}}}],"format":{"value":"standard"},"categories":[],"Page Design":null,"facebookDescription":{"value":"CIS volunteers help to develop, review, and maintain our security best practices. Here's how Hardeep Mehrotara plays his part."},"facebookImage":{"value":{"src":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fwww.cisecurity.org\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Finsights_images\u002Fblog_post_img\u002F2024\u002F05\u002Fthumbnail--blog--benchmarks-community-volunteer--mehrotara--1200x628.png?h=628&iar=0&w=1200&rev=7ae2316d8d754d8fab8ca9fe1df83ecd&hash=0E4BE7A539D12B6BBF0C024CCB401B90","alt":"Benchmarks-Community-Volunteer--Mehrotara","width":"1200","height":"628"}},"facebookLocale":{"value":"en_US"},"facebookSiteName":{"value":"CIS"},"facebookTitle":{"value":"CIS Benchmarks Volunteer Spotlight: Hardeep Mehrotara"},"facebookUrl":{"value":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fwww.cisecurity.org\u002Finsights\u002Fblog\u002Fcis-benchmarks-volunteer-spotlight-hardeep-mehrotara"},"articlePublisher":{"value":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fwww.facebook.com\u002FCenterforIntSec\u002F"},"facebookType":{"value":"article"},"articleModifiedTime":{"value":"0001-01-01T00:00:00Z"},"articlePublishedTime":{"value":"0001-01-01T00:00:00Z"},"twitterDescription":{"value":"CIS volunteers help to develop, review, and maintain our security best practices. Here's how Hardeep Mehrotara plays his part."},"twitterReadTime":{"value":"1 minute"},"twitterTitle":{"value":"CIS Benchmarks Volunteer Spotlight: Hardeep Mehrotara"},"twitterCard":{"value":"summary_large_image"},"twitterImage":{"value":{"src":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fwww.cisecurity.org\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Finsights_images\u002Fblog_post_img\u002F2024\u002F05\u002Fthumbnail--blog--benchmarks-community-volunteer--mehrotara--1200x628.png?h=628&iar=0&w=1200&rev=7ae2316d8d754d8fab8ca9fe1df83ecd&hash=0E4BE7A539D12B6BBF0C024CCB401B90","alt":"Benchmarks-Community-Volunteer--Mehrotara","width":"1200","height":"628"}},"twitterWrittenBy":{"value":""}}}}}],"jss-home-masthead-update":[],"jss-home-masthead-bottom":[{"uid":"ccf3663e-88a9-4652-826d-534d0f231b01","componentName":"CIS-Home-Cards","dataSource":"{86B27591-3F11-4F96-A736-89D912FEA64D}","params":{"GridParameters":"col-12","CacheClearingBehavior":"Clear on publish"},"fields":{"heading":{"value":"World-Renowned Best Practices and Expert Communities"}},"placeholders":{"jss-home-cards":[{"uid":"9bf813bb-7eaa-4a74-b06e-d5aac117e108","componentName":"CIS-Home-Card-Item","dataSource":"{A0BD6133-A77F-4D65-AA0B-BD53B6E2F454}","params":{"GridParameters":"col-12","CacheClearingBehavior":"Clear on publish"},"fields":{"content":{"value":"Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings."},"cta":{"value":{"text":"Download & Explore","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{19BC09D8-ABED-CA6C-9B3B-169405015827}","href":"\u002Fcontrols"}},"image":{"value":{"src":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fwww.cisecurity.org\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Flogos-and-icons\u002F2022\u002Fcis-controls-card.png?h=72&iar=0&w=402&rev=763ae927d7524afd939143b042219cf3&hash=7F2D59BEC512E86A7256E91B3FF78072","alt":"CIS Controls","width":"402","height":"72"}},"modalContent":{"value":"\u003Cdiv\u003E\n\u003Cul\u003E\n \u003Cli\u003EPrioritized and prescriptive path defining how to achieve cybersecurity\u003C\u002Fli\u003E\n \u003Cli\u003EDeveloped by a community of cybersecurity experts\u003C\u002Fli\u003E\n \u003Cli\u003EMapped to multiple legal, regulatory, and policy frameworks, simplifying cybersecurity compliance\u003C\u002Fli\u003E\n\u003C\u002Ful\u003E\n\u003C\u002Fdiv\u003E"},"modalCta":{"value":{"text":"Download & Explore","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{19BC09D8-ABED-CA6C-9B3B-169405015827}","href":"\u002Fcontrols"}},"modalTitle":{"value":"Protect Your Organization"},"name":{"value":"CIS Controls"}}},{"uid":"43d113b7-85fa-40dc-a219-13d0a0665c01","componentName":"CIS-Home-Card-Item","dataSource":"{4982E115-5800-4AC1-8B61-16D54A5C416F}","params":{"GridParameters":"col-12","CacheClearingBehavior":"Clear on publish"},"fields":{"content":{"value":"Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families."},"cta":{"value":{"text":"Download Latest","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{EEAD5F3F-F889-42AE-555F-AB0B21F4FF01}","href":"\u002Fcis-benchmarks"}},"image":{"value":{"src":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fwww.cisecurity.org\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fuploads\u002F2022\u002F11\u002Fcis-benchmarks-card.png?h=68&iar=0&w=482&rev=16d3360d8b964603853cfe81b17e05b5&hash=EAE0DAFD457E55BC68924452C35FB0DE","alt":"CIS Benchmarks","width":"482","height":"68"}},"modalContent":{"value":"\u003Cdiv\u003E\n\u003Cul\u003E\n \u003Cli\u003EThe only consensus-based, best-practice security configuration guides\u003C\u002Fli\u003E\n \u003Cli\u003EDeveloped through a collaborative process, leveraging the expertise of IT security professionals from around the world\u003C\u002Fli\u003E\n \u003Cli\u003ETrusted and recognized by businesses, industry leaders, government entities, and academia\u003C\u002Fli\u003E\n\u003C\u002Ful\u003E\n\u003C\u002Fdiv\u003E"},"modalCta":{"value":{"text":"Download Latest","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{EEAD5F3F-F889-42AE-555F-AB0B21F4FF01}","href":"\u002Fcis-benchmarks"}},"modalTitle":{"value":"Secure Your Configuration"},"name":{"value":"CIS Benchmarks"}}},{"uid":"58ab4c54-f6eb-4643-a0f0-53602785e6c0","componentName":"CIS-Home-Card-Item","dataSource":"{9F119E31-DCD9-48E0-929E-7A293B463B1C}","params":{"GridParameters":"col-12","CacheClearingBehavior":"Clear on publish"},"fields":{"content":{"value":"Secure your organization with resources and tools designed to harness the power of CIS Benchmarks and CIS Controls."},"cta":{"value":{"text":"Learn More","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{A4AF0446-1D42-B77C-07A3-E39FBFA059A8}","href":"\u002Fcis-securesuite"}},"image":{"value":{"src":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fwww.cisecurity.org\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Flogos-and-icons\u002F2022\u002Fcis-securesuite-card.png?h=72&iar=0&w=482&rev=0a6e8cbf135c4d319640226604d1947a&hash=F0B2C44589BB26A13A46094FCBE647FB","alt":"CIS SecureSuite","width":"482","height":"72"}},"modalContent":{"value":"\u003Cdiv\u003E\n\u003Cul\u003E\n \u003Cli\u003EAccess multiple cybersecurity resources including CIS-CAT&reg; Pro, CIS CSAT Pro, and more\u003C\u002Fli\u003E\n \u003Cli\u003ECustomize CIS Benchmarks and tailor security recommendations to your organization&rsquo;s needs\u003C\u002Fli\u003E\n \u003Cli\u003EReceive enhanced cybersecurity support from CIS experts\u003C\u002Fli\u003E\n\u003C\u002Ful\u003E\n\u003C\u002Fdiv\u003E"},"modalCta":{"value":{"text":"Learn More","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{A4AF0446-1D42-B77C-07A3-E39FBFA059A8}","href":"\u002Fcis-securesuite"}},"modalTitle":{"value":"Assess and Remediate at Scale"},"name":{"value":"CIS SecureSuite"}}},{"uid":"81c814fe-7f78-442d-9555-57421e7adbab","componentName":"CIS-Home-Card-Item","dataSource":"{E6FABAF2-7B88-47DC-8A8E-49083DEBD009}","params":{"GridParameters":"col-12","CacheClearingBehavior":"Clear on publish"},"fields":{"content":{"value":"Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities."},"cta":{"value":{"text":"Learn More","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{5AB4691B-C79A-D293-3D46-199080A68B6A}","href":"\u002Fisac"}},"image":{"value":{"src":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fwww.cisecurity.org\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Flogos-and-icons\u002F2022\u002Fmsisac-eiisac-card.png?h=52&iar=0&w=480&rev=b7d47be946504deb93c4af2f5079ee39&hash=47AA8FCA9BBCAD0ACCC2F53C097B2A32","alt":"MS-ISAC EI-ISAC","width":"480","height":"52"}},"modalContent":{"value":"\u003Cdiv\u003E\n\u003Cul\u003E\n \u003Cli\u003EMS-ISAC is the key resource for cyber threat prevention, protection, response, and recovery for all SLTT government entities. It is a voluntary and collaborative effort based on a strong partnership between CIS, SLTT government organizations, and the U.S. Department of Homeland Security (DHS).\u003C\u002Fli\u003E\n \u003Cli\u003EEI-ISAC supports the cybersecurity needs of the election community with resources, guidance, training, and tools tailored for the unique nature of election security.\u003C\u002Fli\u003E\n\u003C\u002Ful\u003E\n\u003C\u002Fdiv\u003E"},"modalCta":{"value":{"text":"Learn More","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{5AB4691B-C79A-D293-3D46-199080A68B6A}","href":"\u002Fisac"}},"modalTitle":{"value":"Support for U.S. Government Organizations"},"name":{"value":"MS-ISAC"}}}]}}]}},{"uid":"59e37805-4cba-434b-a4cd-626ebe950e7e","componentName":"CIS-Home-Blockquote","dataSource":"{8FF0DDCA-7F12-4167-B36E-506280656326}","fields":{"heading":{"value":"What The Experts Are Saying"}},"placeholders":{"jss-home-blockquotes":[{"uid":"07e30321-58a5-4b9f-b5ab-41ca323335e2","componentName":"CIS-Home-Blockquote-Item","dataSource":"{B66B4C83-5FBB-4521-AFD3-C6A8D222C5AE}","fields":{"name":{"value":"Harley Parkes"},"quote":{"value":"The CIS Controls take the background and knowledge of cybersecurity experts literally around the world and help focus efforts on things that are of most value. Directly impacting the adversaries and challenges we face today on our networks."},"title":{"value":"Director"},"organization":{"value":"ACD (Integrated Adaptive Cyber Defense)"}}},{"uid":"602a912d-40ba-410b-a146-d46c23003242","componentName":"CIS-Home-Blockquote-Item","dataSource":"{E7CBCC40-A20D-4AA0-8497-B01C4AFE5108}","fields":{"name":{"value":"Adam"},"quote":{"value":"Without this resource, the hardening of our devices would have taken a lot longer and required many meetings between IT and Security to debate which configuration settings to change and the impact they could have. The CIS Benchmarks provided the necessary information to alleviate many of the fears IT may have had with changing specific settings."},"title":{"value":"Banking Information Security Engineer"},"organization":{"value":""}}},{"uid":"a9d4085f-1ff9-4bea-94c8-25aa17cff7fc","componentName":"CIS-Home-Blockquote-Item","dataSource":"{C153406B-EBD9-403D-9B16-5028B4C3EFAA}","fields":{"name":{"value":"Sasawat Malaivongs"},"quote":{"value":"We work with sensitive information on a daily basis. The CIS Controls along with CIS-CAT Pro, a proven and indispensable tool, helps us to evaluate and maintain a security baseline for our IT infrastructure."},"title":{"value":"Business Director"},"organization":{"value":"ACinfotec"}}}]}},{"uid":"965c632c-9c4d-42b5-8b1e-445306235020","componentName":"CIS-Home-Featured-CTA","dataSource":"{7FC0DD34-A6C6-4C0B-A622-D4D9DB906A3F}","fields":{"content":{"value":"Our CIS Controls and CIS Benchmarks communities connect IT security practitioners from around the globe to help secure our ever-changing world. Our Ambassadors champion the CIS best practices, making it easier for enterprises everywhere to strengthen their cyber defenses and streamline their compliance efforts. We hope you’ll add your voice."},"cta":{"value":{"text":"Learn More","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{C8DE7E1E-6D97-4675-2B7C-D7D191BE4FD1}","href":"\u002Fcommunities"}},"image":{"value":{"src":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fwww.cisecurity.org\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fhomepage-featured-space\u002F2022\u002Fhomepage-controls-community.png?h=118&iar=0&w=400&rev=fac50a0f5b6544cb8ff157ffdc089678&hash=4404504FB5DFE568E0EBC4BB12A4684A","alt":" ","width":"400","height":"118"}},"imageBottom":{"value":{"src":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fwww.cisecurity.org\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fhomepage-featured-space\u002F2022\u002Fhomepage-benchmarks-community.png?h=114&iar=0&w=400&rev=498de6d6d6724375b4671230afa70722&hash=905A57FFA64678C0A570A059D0849ABB","alt":" ","width":"400","height":"114"}},"imageBottomUrl":{"value":{"text":"","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{E2E60C34-788C-3C5E-B4AB-D9B8D9AEF16D}","href":"\u002Fcommunities\u002Fbenchmarks"}},"imageUrl":{"value":{"text":"","anchor":"","linktype":"internal","class":"","title":"CIS Controls Community","querystring":"","id":"{F14FD165-50F4-70A7-D717-B58EFF6B22F5}","href":"\u002Fcommunities\u002Fcontrols"}},"title":{"value":"Together, We Can Make a Difference"}}},{"uid":"75e8b61f-5b9f-4af9-b15a-99ff20464fea","componentName":"CIS-RichText","dataSource":"{5F7D9464-A2B0-4279-A2F5-53EBFB89C4E2}","fields":{"content":{"value":"\u003Cdiv class=\"rich-text-home\"\u003E\n\u003Ch2\u003EWhy We Do What We Do\u003C\u002Fh2\u003E\n\u003Cp class=\"c-intro-text\"\u003EAt CIS, we believe in secure online experiences for all. We&rsquo;re driven by our mission to develop, validate, and promote timely best practice solutions that help people, businesses, and governments protect themselves against pervasive cyber threats.\u003C\u002Fp\u003E\n\u003Ca class=\"c-cta--secondary\" href=\"\u002Fabout-us\"\u003EAbout Us\u003C\u002Fa\u003E&nbsp;\u003C\u002Fdiv\u003E"}}}],"jss-infohub":[{"uid":"e3259403-8222-42c4-ac82-e1076a38bd37","componentName":"CIS-InfoHub","dataSource":""}],"jss-footer":[{"uid":"e4371da7-d84d-418f-9fb0-efb7a89e85e7","componentName":"PartialDesignDynamicPlaceholder","dataSource":"","params":{"sid":"{D1A57C00-3585-4E9E-9182-C24DC35D6BAF}","ph":"jss-footer","sig":"sxa-footer"},"placeholders":{"sxa-footer":[{"uid":"a8978e0a-759d-4313-b928-327f298cd41c","componentName":"CIS-Footer","dataSource":"{39EFF40B-A685-43BF-AAB7-7D46B180FC1A}","fields":{},"placeholders":{"jss-footer-navlist-column":[{"uid":"e5145744-b8a6-4506-b0b4-302838e012b3","componentName":"CIS-Footer-NavList","dataSource":"{12E5086E-D59C-4EFF-888C-6E0238C09822}","fields":{"link":{"value":{"text":"About","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{CE0E4674-2099-1EFD-0872-24554C9B1BDF}","href":"\u002Fabout-us"}},"heading":{"value":"About"},"ref":{"value":"about"}},"placeholders":{"jss-footer-navlist-column-links":[{"uid":"d264738e-7812-4d00-b72c-06cb8d4bfdf2","componentName":"CIS-Footer-NavList-Link","dataSource":"{0C2C8351-6981-477C-B685-7BBA633B8577}","fields":{"link":{"value":{"text":"Leadership","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{38C7F30C-A0A6-1FCC-B555-0F0B31319356}","href":"\u002Fabout-us\u002Fleadership"}}}},{"uid":"77595b46-2389-46e2-88bf-34abe57e9f99","componentName":"CIS-Footer-NavList-Link","dataSource":"{B6D4574D-41C3-4042-946F-A3292C8A7043}","fields":{"link":{"value":{"text":"Board","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{92F9E383-BE0B-797D-7877-5538CBB153EB}","href":"\u002Fabout-us\u002Fboard"}}}},{"uid":"2b54c015-0e62-446b-8a69-f34e2417d602","componentName":"CIS-Footer-NavList-Link","dataSource":"{A27DEE21-4F7C-4A17-95A0-3095FD8CFC98}","fields":{"link":{"value":{"text":"Communities","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{C8DE7E1E-6D97-4675-2B7C-D7D191BE4FD1}","href":"\u002Fcommunities"}}}},{"uid":"e4430129-0780-47e2-89df-8ddeea1efdc2","componentName":"CIS-Footer-NavList-Link","dataSource":"{20FC9B61-6044-4EB6-9041-A84A98278542}","fields":{"link":{"value":{"href":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fcareers-cisecurity.icims.com\u002F","text":"Careers","linktype":"external","url":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fcareers-cisecurity.icims.com\u002F","anchor":"","target":""}}}},{"uid":"2c965f67-b655-4314-9c6d-0e66c6596c33","componentName":"CIS-Footer-NavList-Link","dataSource":"{610121FE-8393-4FE8-AAA7-E0577CCCF0DD}","fields":{"link":{"value":{"id":"{C44F2D0C-7882-EF48-AAF0-ABD11D4FD831}","querystring":"","text":"Media","anchor":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Fabout-us\u002Fmedia","title":"","class":"","linktype":"internal","href":"\u002Fabout-us\u002Fmedia"}}}},{"uid":"0bda124a-003f-4d4e-9c13-dbfaef1b0afb","componentName":"CIS-Footer-NavList-Link","dataSource":"{A5634E04-8E09-40EB-B40B-4DD4FB085808}","fields":{"link":{"value":{"text":"Testimonials","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{96FDBB45-69F1-2EB3-2D0B-27983F625023}","href":"\u002Ftestimonials"}}}},{"uid":"9982a926-d32c-43d8-a5d7-b93db0b93545","componentName":"CIS-Footer-NavList-Link","dataSource":"{FEAAEC42-5B3D-48CC-B291-6A0024A7116B}","fields":{"link":{"value":{"text":"Events","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{AF78681B-ADBD-0D67-43E1-A8933FB358B8}","href":"\u002Fevent-calendar"}}}},{"uid":"81e62ea7-9117-47fe-8832-dbad1df3293b","componentName":"CIS-Footer-NavList-Link","dataSource":"{EB40E188-7B0E-4E68-905E-873C6112F1D5}","fields":{"link":{"value":{"href":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttp:\u002F\u002Fwww.uscyberchallenge.org\u002F","text":"US Cyber Challenge","linktype":"external","url":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttp:\u002F\u002Fwww.uscyberchallenge.org\u002F","anchor":"","target":""}}}},{"uid":"2185db58-b7c1-4223-9279-3da66370c973","componentName":"CIS-Footer-NavList-Link","dataSource":"{CD268DD4-C58C-4D4A-9DE1-26129762EC97}","fields":{"link":{"value":{"text":"Support","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{34DDDDA5-FD41-E76F-9829-385B9EF35B03}","href":"\u002Fsupport"}}}},{"uid":"fb72e8b4-ec6b-4a96-bf50-ec748aa35d94","componentName":"CIS-Footer-NavList-Link","dataSource":"{145B4E68-B168-41B2-A3F0-F9E5B17E83EF}","fields":{"link":{"value":{"href":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Flearn.cisecurity.org\u002Fcontact-us","text":"Contact","linktype":"external","url":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Flearn.cisecurity.org\u002Fcontact-us","anchor":"","target":""}}}}]}},{"uid":"e914d3fb-6a33-40b2-bb8b-69450086ac40","componentName":"CIS-Footer-NavList","dataSource":"{083423F3-5313-4B8C-A83A-27F7A250E546}","fields":{"link":{"value":{"text":"Products And Tools","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{EEAB23B1-CC27-66BC-CB2F-6613F71BEA94}","href":"\u002Fcybersecurity-tools"}},"heading":{"value":"Products and Tools"},"ref":{"value":"products"}},"placeholders":{"jss-footer-navlist-column-links":[{"uid":"6ac739f7-9f97-4a7d-8a21-57e03a61150d","componentName":"CIS-Footer-NavList-Link","dataSource":"{05552B05-9D5F-467F-90D7-86F6C77649AE}","fields":{"link":{"value":{"text":"CIS Critical Security Controls®","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{19BC09D8-ABED-CA6C-9B3B-169405015827}","href":"\u002Fcontrols"}}}},{"uid":"0a93c4b4-af89-4383-acfa-abe7ef32c5e4","componentName":"CIS-Footer-NavList-Link","dataSource":"{B0D663C7-8F1C-4CAB-B849-F82C6FA2C785}","fields":{"link":{"value":{"text":"CIS Benchmarks™","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{EEAD5F3F-F889-42AE-555F-AB0B21F4FF01}","href":"\u002Fcis-benchmarks"}}}},{"uid":"a2617d74-ba1f-492a-960a-a42f4e643576","componentName":"CIS-Footer-NavList-Link","dataSource":"{34CC9ED9-4634-460F-AD6C-F6F72EAB048F}","fields":{"link":{"value":{"text":"CIS Hardened Images®","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{E7B5656B-D504-03B9-3E90-66CACEFDC5AC}","href":"\u002Fcis-hardened-images"}}}},{"uid":"3722006b-9906-4445-97a4-9c0d77662013","componentName":"CIS-Footer-NavList-Link","dataSource":"{0810869C-8C37-43DC-A10F-80F181298E28}","fields":{"link":{"value":{"text":"CIS SecureSuite®","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{A4AF0446-1D42-B77C-07A3-E39FBFA059A8}","href":"\u002Fcis-securesuite"}}}},{"uid":"76f3c134-d1af-439b-9531-5ee29aa04c0d","componentName":"CIS-Footer-NavList-Spacer","dataSource":"{B6498EE1-A41A-4FAE-87BE-F546E929E33D}","fields":{}},{"uid":"cc1fff93-630d-436f-a286-d55f7050a692","componentName":"CIS-Footer-NavList-Link","dataSource":"{0CD6D24B-BEC5-43CF-8732-6237BC2290F5}","fields":{"link":{"value":{"href":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Flearn.cisecurity.org\u002Fcis-cat-lite","text":"CIS-CAT®Lite","linktype":"external","url":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Flearn.cisecurity.org\u002Fcis-cat-lite","anchor":"","target":""}}}},{"uid":"843e353e-5a25-48e0-b1dd-ad8b89c228f2","componentName":"CIS-Footer-NavList-Link","dataSource":"{F97428A4-ADD4-4C83-B397-6C3C367D1B32}","fields":{"link":{"value":{"text":"CIS-CAT®Pro","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{1804D342-98D7-427D-0CB2-01136C37C047}","href":"\u002Fcybersecurity-tools\u002Fcis-cat-pro"}}}},{"uid":"e092dad5-bcd5-454c-a0f1-0a92cdfb8a5c","componentName":"CIS-Footer-NavList-Link","dataSource":"{2232687A-D22C-4102-8574-8D2CD75D37CF}","fields":{"link":{"value":{"href":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Flearn.cisecurity.org\u002Fcis-ram","text":"CIS RAM","linktype":"external","url":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Flearn.cisecurity.org\u002Fcis-ram","anchor":"","target":""}}}},{"uid":"52b86e48-7eec-4cf7-bc5b-afe738172fe5","componentName":"CIS-Footer-NavList-Link","dataSource":"{9266E5B3-601F-460D-8160-6A5C7B3E1879}","fields":{"link":{"value":{"text":"CIS CSAT","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{E28A0486-04C9-EE4A-D85D-A29A9045942C}","href":"\u002Fcontrols\u002Fcis-controls-self-assessment-tool-cis-csat"}}}},{"uid":"9344189d-ffc6-4ff5-a317-e856d91e50c7","componentName":"CIS-Footer-NavList-Link","dataSource":"{44F65ED1-5F79-4A55-9D77-D10E1076DD8D}","fields":{"link":{"value":{"href":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fworkbench.cisecurity.org\u002F","text":"CIS WorkBench","linktype":"external","url":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fworkbench.cisecurity.org\u002F","anchor":"","target":""}}}}]}},{"uid":"82a124a4-fb65-4ef6-9d0d-d134104d9bfc","componentName":"CIS-Footer-NavList","dataSource":"{BFE797D1-CE1F-4D73-92AA-ECEF12995772}","fields":{"link":{"value":{"text":"For SLTT Governments","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{5AB4691B-C79A-D293-3D46-199080A68B6A}","href":"\u002Fisac"}},"heading":{"value":"For SLTT Governments"},"ref":{"value":"government"}},"placeholders":{"jss-footer-navlist-column-links":[{"uid":"96acc86b-723e-4da2-a5ba-f2a2eb67a96c","componentName":"CIS-Footer-NavList-Link","dataSource":"{5984A729-DCF3-435D-AC99-241AF350C9E0}","fields":{"link":{"value":{"text":"MS-ISAC®","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{D08DEDA9-3029-4145-7DDB-B71F23291CE5}","href":"\u002Fms-isac"}}}},{"uid":"683cd9c7-4719-4700-9f04-39796e0e0f90","componentName":"CIS-Footer-NavList-Link","dataSource":"{7B95416F-9480-462A-83DA-1ADD53017C2F}","fields":{"link":{"value":{"text":"EI-ISAC®","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{52322A4C-A322-B46A-1626-350246729667}","href":"\u002Fei-isac"}}}},{"uid":"5a198c67-8816-4126-9846-45dd59b0afbe","componentName":"CIS-Footer-NavList-Link","dataSource":"{0355C105-03EA-466D-AADD-F3F4F9C351CD}","fields":{"link":{"value":{"text":"Election Resources","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{BAFE31A6-43F2-4780-8A84-BF0146DF5BD5}","href":"\u002Felections"}}}},{"uid":"c61ed8f8-190a-4592-b4bd-4d6d19b9d8eb","componentName":"CIS-Footer-NavList-Spacer","dataSource":"{B6498EE1-A41A-4FAE-87BE-F546E929E33D}","fields":{}},{"uid":"4eaac569-9a00-4ec7-9c36-58c7dda38227","componentName":"CIS-Footer-NavList-Link","dataSource":"{2BFE53C1-53D7-4A30-A819-8379DA462DBC}","fields":{"link":{"value":{"text":"CIS Services®","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{2BF3F743-4F7D-2A44-9BA1-426B3A3CFCDD}","href":"\u002Fservices"}}}},{"uid":"dbd75e0f-47c9-4976-a255-97ab90652a91","componentName":"CIS-Footer-NavList-Link","dataSource":"{E0F4A2E2-1F5C-47E6-ADC9-0068425EA8FD}","fields":{"link":{"value":{"text":"Albert Network Monitoring","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{B8C5738E-5FD1-C161-683D-3F5C78315E0E}","href":"\u002Fservices\u002Falbert-network-monitoring"}}}},{"uid":"7f934023-1c24-4c8c-950f-43b0749f3933","componentName":"CIS-Footer-NavList-Link","dataSource":"{35630969-32FC-4DD0-8A5A-9AE60025659B}","fields":{"link":{"value":{"text":"Managed Security Services","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{E8E5D5A9-41BD-E30B-787D-134B9687DFBB}","href":"\u002Fservices\u002Fmanaged-security-services-mss"}}}},{"uid":"640df112-cbf4-4ebb-a773-2959515dcbc6","componentName":"CIS-Footer-NavList-Link","dataSource":"{4C87F991-03D4-4FAE-ACCF-E65C128FEA30}","fields":{"link":{"value":{"text":"Endpoint Security Services","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{FEC18F53-D2B1-59FF-1ADB-F7AE386AB4F2}","href":"\u002Fservices\u002Fendpoint-security-services"}}}},{"uid":"dbacf4d6-66aa-45dd-845a-4808b3bbe245","componentName":"CIS-Footer-NavList-Link","dataSource":"{0F6874E7-97E3-4010-81BA-FD5B049A3B9E}","fields":{"link":{"value":{"text":"Malicious Domain Blocking and Reporting Plus","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{C908677A-58DC-4788-97E1-DDE96D8766C3}","href":"\u002Fservices\u002Fmdbrplus"}}}},{"uid":"153cdb32-da95-4c38-8922-c13d39d0c70f","componentName":"CIS-Footer-NavList-Spacer","dataSource":"{B6498EE1-A41A-4FAE-87BE-F546E929E33D}","fields":{}},{"uid":"1f401c95-ee1f-4132-aaa5-97ccb79be8b2","componentName":"CIS-Footer-NavList-Link","dataSource":"{4B3617F6-AC3B-4B46-93C3-10947668BCAE}","fields":{"link":{"value":{"text":"CIS CyberMarket®","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{377369ED-DD43-D165-4A7E-156EBE490770}","href":"\u002Fservices\u002Fcis-cybermarket"}}}}]}},{"uid":"8782ff4a-16ae-4016-bc16-9fce5f1e5590","componentName":"CIS-Footer-NavList","dataSource":"{41A4AE22-BA78-4488-89B0-304C6E1981FB}","fields":{"link":{"value":{"id":"{FB4E12C1-82FC-59D2-90B1-F58388DAACC3}","querystring":"","text":"Explore","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights","linktype":"internal","href":"\u002Finsights"}},"heading":{"value":"Explore"},"ref":{"value":"explore"}},"placeholders":{"jss-footer-navlist-column-links":[{"uid":"62c7cf0f-9878-4c3f-8274-2063f06ad888","componentName":"CIS-Footer-NavList-Link","dataSource":"{444FEC6A-E844-4EF3-93A5-3D3341C9E9A2}","fields":{"link":{"value":{"id":"{A699BE35-8674-5BE8-B3F4-C9769391F6FE}","querystring":"","text":"Blog","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights\u002Fblog","linktype":"internal","href":"\u002Finsights\u002Fblog"}}}},{"uid":"3bd043b3-d463-478e-b681-01c398493250","componentName":"CIS-Footer-NavList-Link","dataSource":"{A33D9C0E-15F2-4721-91D2-514F6785875C}","fields":{"link":{"value":{"id":"{c74111a6-95b5-5a9e-a5df-2e2a7d2884f9}","querystring":"","text":"Whitepapers","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights\u002Fwhite-papers","linktype":"internal","href":"\u002Finsights\u002Fwhite-papers"}}}},{"uid":"347754e1-1502-44b9-a342-79c3c0eeb4bd","componentName":"CIS-Footer-NavList-Link","dataSource":"{ADF890CC-64A8-4BC4-9147-E62D6715F54A}","fields":{"link":{"value":{"id":"{11C8CCFC-833F-576D-AF85-2C37560B1A67}","querystring":"","text":"Newsletters","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights\u002Fnewsletter","linktype":"internal","href":"\u002Finsights\u002Fnewsletter"}}}},{"uid":"7168b19c-9893-4a5c-aedb-0858df521ecc","componentName":"CIS-Footer-NavList-Link","dataSource":"{2F037D55-1F06-4B2D-848B-1C07039FFF9C}","fields":{"link":{"value":{"id":"{F07F8DAA-8808-5FB4-BB19-1D0F5E5D8D9D}","querystring":"","text":"Webinars","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights\u002Fwebinar","linktype":"internal","href":"\u002Finsights\u002Fwebinar"}}}},{"uid":"1f8dd1b3-3236-4b2e-a871-e1763a43ddc6","componentName":"CIS-Footer-NavList-Link","dataSource":"{98605ECF-5F35-4119-99E2-5BBB86782929}","fields":{"link":{"value":{"id":"{2992CF52-4336-5643-BB61-EB5BF0A5DB2A}","querystring":"","text":"Case Studies","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights\u002Fcase-study","linktype":"internal","href":"\u002Finsights\u002Fcase-study"}}}},{"uid":"9f24d096-5ae4-4320-9b4c-e77b5cd31232","componentName":"CIS-Footer-NavList-Link","dataSource":"{DB31F159-66FC-4271-914A-4C9589A4ACC2}","fields":{"link":{"value":{"text":"Spotlights","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{19FA18AC-9BBF-569D-AB84-45572D276F62}","href":"\u002Finsights\u002Fspotlight"}}}},{"uid":"78700ef9-593f-4b51-bc07-73c8a0505950","componentName":"CIS-Footer-NavList-Link","dataSource":"{CFD0B212-070C-4798-8747-F0115D9866B9}","fields":{"link":{"value":{"href":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fwww.youtube.com\u002Fuser\u002FTheCISecurity","text":"Videos","linktype":"external","url":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fwww.youtube.com\u002Fuser\u002FTheCISecurity","anchor":"","target":"_blank"}}}}]}}],"jss-footer-navlist-column-links":[],"jss-footer-utility-links":[{"uid":"64c39b1e-99b7-4e52-96e7-468d2233c0d2","componentName":"CIS-Footer-Copyright","dataSource":"{F40328ED-66D1-4513-B625-5A9F94DB9020}","fields":{}},{"uid":"6be99de6-acda-44dd-885f-537dec8218a4","componentName":"CIS-Footer-UtilityLink","dataSource":"{B9D5776A-CCA1-4CE8-81E1-8AF8341278D2}","fields":{"link":{"value":{"text":"Privacy Notice","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{03F9C8E2-8578-2383-F241-107EF459D053}","href":"\u002Fprivacy-notice"}}}}],"jss-footer-social-links":[{"uid":"f8128af4-282e-433e-af8d-c996bde765c2","componentName":"CIS-Footer-SocialLink","dataSource":"{63F874B5-8028-4107-9CD1-683CB6E502F1}","fields":{"link":{"value":{"href":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Ftwitter.com\u002FCISecurity\u002F","text":"Twitter","linktype":"external","url":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Ftwitter.com\u002FCISecurity\u002F","anchor":"","class":"twitter","target":"_blank"}}}},{"uid":"82e90894-0a00-406c-97eb-db3d4366e95a","componentName":"CIS-Footer-SocialLink","dataSource":"{33D75F03-7FD9-4225-9E75-5412D314707A}","fields":{"link":{"value":{"href":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fwww.facebook.com\u002FCenterforIntSec\u002F","text":"Facebook","linktype":"external","url":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fwww.facebook.com\u002FCenterforIntSec\u002F","anchor":"","class":"facebook","target":"_blank"}}}},{"uid":"e7f3d3b2-dcc3-46cb-b833-e626f131cd72","componentName":"CIS-Footer-SocialLink","dataSource":"{FE4E37CB-5B3A-4042-ACA4-42BEAAF9F1E7}","fields":{"link":{"value":{"href":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fwww.youtube.com\u002Fuser\u002FTheCISecurity\u002F","text":"YouTube","linktype":"external","url":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fwww.youtube.com\u002Fuser\u002FTheCISecurity\u002F","anchor":"","class":"youtube","target":"_blank"}}}},{"uid":"7acef943-cbe1-411c-bb11-905cab2ba0d6","componentName":"CIS-Footer-SocialLink","dataSource":"{5E480327-B353-4EE8-B9C8-4E868D0AA204}","fields":{"link":{"value":{"href":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fwww.linkedin.com\u002Fcompany\u002Fthe-center-for-internet-security\u002F","text":"LinkedIn","linktype":"external","url":"http:\u002F\u002Fweb.archive.org\u002Fweb\u002F20240524191405\u002Fhttps:\u002F\u002Fwww.linkedin.com\u002Fcompany\u002Fthe-center-for-internet-security\u002F","anchor":"","class":"linkedin","target":"_blank"}}}}]}}]}}]}}},"APOLLO_STATE":{"C__AppRoute:6E72CC69C1294C6AB439296957F13A11":{"__typename":"C__AppRoute","id":"6E72CC69C1294C6AB439296957F13A11","name":"home","displayName":"home","url":"\u002F","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fcisecurity\u002Fhome","template":{"__typename":"ItemTemplate","name":"App Route"},"field({\"name\":\"pageTitle\"})":{"__typename":"TextField","value":"CIS Center for Internet Security"},"field({\"name\":\"owners\"})":null},"CISResourceAdvisoryRouteType:65C0A3724C3A84B313BE4D5F8790132D":{"__typename":"CISResourceAdvisoryRouteType","id":"65C0A3724C3A84B313BE4D5F8790132D","name":"a-vulnerability-in-google-chrome-could-allow-for-arbitrary-code-execution_2024-061","displayName":"2024-061: A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution","url":"\u002Fadvisory\u002Fa-vulnerability-in-google-chrome-could-allow-for-arbitrary-code-execution_2024-061","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Fadvisory\u002Fa-vulnerability-in-google-chrome-could-allow-for-arbitrary-code-execution_2024-061","template":{"__typename":"ItemTemplate","name":"CIS-Resource-Advisory-RouteType"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","value":"20240524T085923","dateValue":1716541163000}},"CISResourceAdvisoryRouteType:426D4AF1817C65BB61A7CB9CD38ABE29":{"__typename":"CISResourceAdvisoryRouteType","id":"426D4AF1817C65BB61A7CB9CD38ABE29","name":"a-vulnerability-in-github-enterprise-server-ghes-could-allow-for-authentication-bypass_2024-060","displayName":"2024-060: A Vulnerability in GitHub Enterprise Server (GHES) Could Allow for Authentication Bypass","url":"\u002Fadvisory\u002Fa-vulnerability-in-github-enterprise-server-ghes-could-allow-for-authentication-bypass_2024-060","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Fadvisory\u002Fa-vulnerability-in-github-enterprise-server-ghes-could-allow-for-authentication-bypass_2024-060","template":{"__typename":"ItemTemplate","name":"CIS-Resource-Advisory-RouteType"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","value":"20240523T164555","dateValue":1716482755000}},"CISResourceBlogRouteType:691A99154AD74D77ACB9CCC59F0366D5":{"__typename":"CISResourceBlogRouteType","id":"691A99154AD74D77ACB9CCC59F0366D5","name":"CIS Benchmarks Volunteer Spotlight Hardeep Mehrotara","displayName":"CIS Benchmarks Volunteer Spotlight: Hardeep Mehrotara","url":"\u002Finsights\u002Fblog\u002Fcis-benchmarks-volunteer-spotlight-hardeep-mehrotara","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights\u002Fblog\u002FCIS Benchmarks Volunteer Spotlight Hardeep Mehrotara","template":{"__typename":"ItemTemplate","name":"CIS-Resource-Blog-RouteType"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","value":"20240521T201500Z","dateValue":1716322500000}},"CISResourcePressReleaseRouteType:0EE0F52D47884DE4ABDEBCC6795F3135":{"__typename":"CISResourcePressReleaseRouteType","id":"0EE0F52D47884DE4ABDEBCC6795F3135","name":"CIS Controls Featured as Recommended Defenses in Verizons 2024 Data Breach Investigations Report","displayName":"CIS Controls Featured as Recommended Defenses in Verizon's 2024 Data Breach Investigations Report","url":"\u002Fabout-us\u002Fmedia\u002Fpress-release\u002Fcis-controls-featured-as-recommended-defenses-in-verizons-2024-data-breach-investigations-report","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Fabout-us\u002Fmedia\u002Fpress-release\u002FCIS Controls Featured as Recommended Defenses in Verizons 2024 Data Breach Investigations Report","template":{"__typename":"ItemTemplate","name":"CIS-Resource-Press-Release-RouteType"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","value":"20240521T160300Z","dateValue":1716307380000}},"CISResourceTaxonomyItem:2E6FD60206DA5187A787AE5BE20DD812":{"__typename":"CISResourceTaxonomyItem","id":"2E6FD60206DA5187A787AE5BE20DD812","name":"cis-benchmarks-owner","displayName":"CIS Benchmarks"},"CISResourceTaxonomyItem:74CCE205EB59520FA66B4FD1FC70F279":{"__typename":"CISResourceTaxonomyItem","id":"74CCE205EB59520FA66B4FD1FC70F279","name":"cis-controls-owner","displayName":"CIS Controls"},"CISResourceTaxonomyItem:EF5341028C875E0DB4C6FDCF23E563C7":{"__typename":"CISResourceTaxonomyItem","id":"EF5341028C875E0DB4C6FDCF23E563C7","name":"cis-cybermarket-owner","displayName":"CIS CyberMarket"},"CISResourceTaxonomyItem:44BCB76B7F76576C947A02B957604BC4":{"__typename":"CISResourceTaxonomyItem","id":"44BCB76B7F76576C947A02B957604BC4","name":"cis-hardened-images-owner","displayName":"CIS Hardened Images"},"CISResourceTaxonomyItem:58BCBBDF6877560E96F15F2358637BD1":{"__typename":"CISResourceTaxonomyItem","id":"58BCBBDF6877560E96F15F2358637BD1","name":"cis-securesuite-owner","displayName":"CIS SecureSuite"},"CISResourceTaxonomyItem:46D73C5EC9115BBDBD34DD2DB2562E2B":{"__typename":"CISResourceTaxonomyItem","id":"46D73C5EC9115BBDBD34DD2DB2562E2B","name":"cis-services-owner","displayName":"CIS Services"},"CISResourceTaxonomyItem:DBCE1B447F3B5F29AC2A408492C4DC47":{"__typename":"CISResourceTaxonomyItem","id":"DBCE1B447F3B5F29AC2A408492C4DC47","name":"eiisac-owner","displayName":"EI-ISAC"},"CISResourceTaxonomyItem:D41DF5F519975662BBBB4AE63430599E":{"__typename":"CISResourceTaxonomyItem","id":"D41DF5F519975662BBBB4AE63430599E","name":"msisac-owner","displayName":"MS-ISAC"},"ROOT_QUERY":{"__typename":"Query","item({\"path\":\"6e72cc69-c129-4c6a-b439-296957f13a11\"})":{"__ref":"C__AppRoute:6E72CC69C1294C6AB439296957F13A11"},"cisInfoHub({\"pageIndex\":0,\"path\":\"6e72cc69-c129-4c6a-b439-296957f13a11\"})":{"__ref":"CISResourceAdvisoryRouteType:65C0A3724C3A84B313BE4D5F8790132D"},"cisInfoHub({\"pageIndex\":1,\"path\":\"6e72cc69-c129-4c6a-b439-296957f13a11\"})":{"__ref":"CISResourceAdvisoryRouteType:426D4AF1817C65BB61A7CB9CD38ABE29"},"cisInfoHub({\"pageIndex\":2,\"path\":\"6e72cc69-c129-4c6a-b439-296957f13a11\"})":{"__ref":"CISResourceBlogRouteType:691A99154AD74D77ACB9CCC59F0366D5"},"cisInfoHub({\"pageIndex\":3,\"path\":\"6e72cc69-c129-4c6a-b439-296957f13a11\"})":{"__ref":"CISResourcePressReleaseRouteType:0EE0F52D47884DE4ABDEBCC6795F3135"},"item({\"path\":\"\u002Fsitecore\u002Ftemplates\u002FProject\u002Fcisecurity\"})":{"__typename":"UnknownItem","children":[{"__typename":"UnknownItem","name":"App Route","displayName":"App Route"},{"__typename":"UnknownItem","name":"CIS-Accordion Rendering Parameters","displayName":"Accordion Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Accordion-Item","displayName":"Accordion Item"},{"__typename":"UnknownItem","name":"CIS-Accordion-Item Rendering Parameters","displayName":"Accordion Item Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Alert","displayName":"Alert Primary"},{"__typename":"UnknownItem","name":"CIS-Alert Rendering Parameters","displayName":"Alert Primary Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Alert-Secondary","displayName":"Alert Secondary"},{"__typename":"UnknownItem","name":"CIS-Alert-Secondary Rendering Parameters","displayName":"Alert Secondary Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Banner","displayName":"Banner"},{"__typename":"UnknownItem","name":"CIS-Banner Rendering Parameters","displayName":"Banner Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Benchmark-CIS-CAT-Pro Rendering Parameters","displayName":"Benchmark CIS-CAT Pro Table Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Blockquote","displayName":"Blockquote"},{"__typename":"UnknownItem","name":"CIS-Blockquote Rendering Parameters","displayName":"Blockquote Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Blockquote-Blue-Box","displayName":"Blockquote Blue Box"},{"__typename":"UnknownItem","name":"CIS-Blockquote-Blue-Box Rendering Parameters","displayName":"Blockquote Blue Box Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Blockquote-Carousel","displayName":"Blockquote Carousel"},{"__typename":"UnknownItem","name":"CIS-Blockquote-Carousel Rendering Parameters","displayName":"Blockquote Carousel Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Blockquote-Carousel-Item","displayName":"Blockquote Carousel Item"},{"__typename":"UnknownItem","name":"CIS-Blockquote-Carousel-Item Rendering Parameters","displayName":"Blockquote Carousel Item Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Breadcrumb Rendering Parameters","displayName":"Breadcrumb Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Checkmark-Table","displayName":"Checkmark Table"},{"__typename":"UnknownItem","name":"CIS-Checkmark-Table Rendering Parameters","displayName":"Checkmark Table Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Cloud-Provider","displayName":"CIS-Cloud-Provider"},{"__typename":"UnknownItem","name":"CIS-ContentBlock","displayName":"Content Block"},{"__typename":"UnknownItem","name":"CIS-ContentBlock Rendering Parameters","displayName":"Content Block Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Content-Block-With-CTA","displayName":"Content Block With CTA"},{"__typename":"UnknownItem","name":"CIS-Content-Block-With-CTA Rendering Parameters","displayName":"Content Block With CTA Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Content-Block-With-Label","displayName":"Content Block With Label"},{"__typename":"UnknownItem","name":"CIS-Content-Block-With-Label Rendering Parameters","displayName":"Content Block With Label Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Content-Blue-Box","displayName":"Content Blue Box"},{"__typename":"UnknownItem","name":"CIS-Content-Blue-Box Rendering Parameters","displayName":"Content Blue Box Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Content-Card","displayName":"Content Card"},{"__typename":"UnknownItem","name":"CIS-Content-Card Rendering Parameters","displayName":"Content Card Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Content-Cards","displayName":"Content Cards"},{"__typename":"UnknownItem","name":"CIS-Content-Cards Rendering Parameters","displayName":"Content Cards Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Content-Gray-Box","displayName":"Content Gray Box"},{"__typename":"UnknownItem","name":"CIS-Content-Gray-Box Rendering Parameters","displayName":"Content Gray Box Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Content-Three-Column","displayName":"Content Three Column"},{"__typename":"UnknownItem","name":"CIS-Content-Three-Column Rendering Parameters","displayName":"Content Three Column Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Content-Two-Column","displayName":"Content Two Column"},{"__typename":"UnknownItem","name":"CIS-Content-Two-Column Rendering Parameters","displayName":"Content Two Column Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Control","displayName":"CIS-Control"},{"__typename":"UnknownItem","name":"CIS-Control-Mapping","displayName":"CIS-Control-Mapping"},{"__typename":"UnknownItem","name":"CIS-Control-MappingElement","displayName":"CIS-Control-MappingElement"},{"__typename":"UnknownItem","name":"CIS-Control-Safeguard","displayName":"CIS-Control-Safeguard"},{"__typename":"UnknownItem","name":"CIS-Controls-Navigator","displayName":"Controls Navigator"},{"__typename":"UnknownItem","name":"CIS-Controls-Navigator Rendering Parameters","displayName":"Controls Navigator Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Controls-Navigator-Selector","displayName":"Controls Navigator Selector"},{"__typename":"UnknownItem","name":"CIS-Controls-Navigator-Selector Rendering Parameters","displayName":"Controls Navigator Selector Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Controls-Navigator-Selector-Item","displayName":"Controls Navigator Selector Item"},{"__typename":"UnknownItem","name":"CIS-CTA-Carousel","displayName":"CTA Carousel"},{"__typename":"UnknownItem","name":"CIS-CTA-Carousel Rendering Parameters","displayName":"CTA Carousel Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-CTA-Carousel-Item","displayName":"CTA Carousel Item"},{"__typename":"UnknownItem","name":"CIS-CTA-Carousel-Item Rendering Parameters","displayName":"CTA Carousel Item Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-CTA-Carousel-Item-CTA","displayName":"CTA Carousel Item - CTA"},{"__typename":"UnknownItem","name":"CIS-CTA-Carousel-Item-CTA Rendering Parameters","displayName":"CTA Carousel Item - CTA Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-CTA-Primary","displayName":"CTA - Primary"},{"__typename":"UnknownItem","name":"CIS-CTA-Primary Rendering Parameters","displayName":"CTA - Primary Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-CTA-Secondary","displayName":"CTA - Secondary"},{"__typename":"UnknownItem","name":"CIS-CTA-Secondary Rendering Parameters","displayName":"CTA - Secondary Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-CTA-Tertiary","displayName":"CTA - Tertiary"},{"__typename":"UnknownItem","name":"CIS-CTA-Tertiary Rendering Parameters","displayName":"CTA - Tertiary Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Cybersecurity-Tools","displayName":"Cybersecurity Tools"},{"__typename":"UnknownItem","name":"CIS-Cybersecurity-Tools Rendering Parameters","displayName":"Cybersecurity Tools Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Cybersecurity-Tools-Cost-Item","displayName":"Cybersecurity Tools Cost Item"},{"__typename":"UnknownItem","name":"CIS-Cybersecurity-Tools-Item","displayName":"Cybersecurity Tools Item"},{"__typename":"UnknownItem","name":"CIS-DropDown-ContentWithLinks","displayName":"Drop Down Content With Links"},{"__typename":"UnknownItem","name":"CIS-DropDown-ContentWithLinks Rendering Parameters","displayName":"Drop Down Content With Links Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-DropDown-FullWidthLinks","displayName":"Drop Down Full Width With Links"},{"__typename":"UnknownItem","name":"CIS-DropDown-FullWidthLinks Rendering Parameters","displayName":"Drop Down Full Width With Links Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-DropDown-FullWidthLinkSection","displayName":"Drop Down Full Width With Link Section"},{"__typename":"UnknownItem","name":"CIS-DropDown-FullWidthLinkSection Rendering Parameters","displayName":"Drop Down Full Width With Link Section Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-DropDown-LinkSection","displayName":"Dropdown Link Section"},{"__typename":"UnknownItem","name":"CIS-DropDown-LinkSection Rendering Parameters","displayName":"Dropdown Link Section Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-DropDown-LinkSection-Bordered","displayName":"Dropdown Link Section with Border"},{"__typename":"UnknownItem","name":"CIS-DropDown-LinkSection-Bordered Rendering Parameters","displayName":"Dropdown Link Section with Border Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-DropDown-LinkSectionWithBg","displayName":"Dropdown Link Section with Background"},{"__typename":"UnknownItem","name":"CIS-DropDown-LinkSectionWithBg Rendering Parameters","displayName":"Dropdown Link Section with Background Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-DropDown-TwoColumn","displayName":"Dropdown Two Column"},{"__typename":"UnknownItem","name":"CIS-DropDown-TwoColumn Rendering Parameters","displayName":"Dropdown Two Column Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Facebook-Metadata","displayName":"CIS-Facebook-Metadata"},{"__typename":"UnknownItem","name":"CIS-FAQ Rendering Parameters","displayName":"Accordion Cluster Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-FAQ-Item","displayName":"Accordion Cluster Item"},{"__typename":"UnknownItem","name":"CIS-FAQ-Item Rendering Parameters","displayName":"Accordion Cluster Item Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-FAQ-Item-Headline","displayName":"Accordion Headline"},{"__typename":"UnknownItem","name":"CIS-FAQ-Item-Headline Rendering Parameters","displayName":"Accordion Headline Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Featured-Article","displayName":"Featured Article"},{"__typename":"UnknownItem","name":"CIS-Featured-Article Rendering Parameters","displayName":"Featured Article Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Footer","displayName":"Footer"},{"__typename":"UnknownItem","name":"CIS-Footer Rendering Parameters","displayName":"Footer Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Footer-Copyright","displayName":"Footer Copyright"},{"__typename":"UnknownItem","name":"CIS-Footer-Copyright Rendering Parameters","displayName":"Footer Copyright Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Footer-NavList","displayName":"Footer Nav List"},{"__typename":"UnknownItem","name":"CIS-Footer-NavList Rendering Parameters","displayName":"Footer Nav List Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Footer-NavList-Link","displayName":"Footer Nav List Link"},{"__typename":"UnknownItem","name":"CIS-Footer-NavList-Link Rendering Parameters","displayName":"Footer Nav List Link Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Footer-NavList-Spacer","displayName":"Footer Nav List Spacer"},{"__typename":"UnknownItem","name":"CIS-Footer-NavList-Spacer Rendering Parameters","displayName":"Footer Nav List Spacer Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Footer-SocialLink","displayName":"Footer Social Link"},{"__typename":"UnknownItem","name":"CIS-Footer-SocialLink Rendering Parameters","displayName":"Footer Social Link Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Footer-UtilityLink","displayName":"Footer Utility Link"},{"__typename":"UnknownItem","name":"CIS-Footer-UtilityLink Rendering Parameters","displayName":"Footer Utility Link Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-From-The-Blog","displayName":"From The Blog"},{"__typename":"UnknownItem","name":"CIS-From-The-Blog Rendering Parameters","displayName":"From The Blog Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Grid","displayName":"Grid Layout"},{"__typename":"UnknownItem","name":"CIS-Grid Rendering Parameters","displayName":"Grid Layout Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Grid-Item","displayName":"Grid Item"},{"__typename":"UnknownItem","name":"CIS-Grid-Item Rendering Parameters","displayName":"Grid Item Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Hardened-Images-Cloud-Provider-List","displayName":"Hardened Image Cloud Provider List"},{"__typename":"UnknownItem","name":"CIS-Hardened-Images-Cloud-Provider-List Rendering Parameters","displayName":"Hardened Image Cloud Provider List Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Hardened-Images-List","displayName":"Hardened Image List"},{"__typename":"UnknownItem","name":"CIS-Hardened-Images-List Rendering Parameters","displayName":"Hardened Image List Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Hardened-Images-List-Column-Header","displayName":"Hardened Image List Column Header"},{"__typename":"UnknownItem","name":"CIS-Hardened-Images-List-Column-Header Rendering Parameters","displayName":"Hardened Image List Column Header Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Header","displayName":"Header"},{"__typename":"UnknownItem","name":"CIS-Header Rendering Parameters","displayName":"Header Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-HeaderUtility-Link","displayName":"Header Utility Link"},{"__typename":"UnknownItem","name":"CIS-HeaderUtility-Link Rendering Parameters","displayName":"Header Utility Link Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Home-Blockquote","displayName":"Home Blockquote"},{"__typename":"UnknownItem","name":"CIS-Home-Blockquote Rendering Parameters","displayName":"Home Blockquote Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Home-Blockquote-Item","displayName":"Home Blockquote Item"},{"__typename":"UnknownItem","name":"CIS-Home-Blockquote-Item Rendering Parameters","displayName":"Home Blockquote Item Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Home-Card-Item","displayName":"Home Card Item"},{"__typename":"UnknownItem","name":"CIS-Home-Card-Item Rendering Parameters","displayName":"Home Card Item Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Home-Cards","displayName":"Home Cards"},{"__typename":"UnknownItem","name":"CIS-Home-Cards Rendering Parameters","displayName":"Home Cards Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Home-Featured-CTA","displayName":"Home Featured CTA"},{"__typename":"UnknownItem","name":"CIS-Home-Featured-CTA Rendering Parameters","displayName":"Home Featured CTA Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Home-HeroLayout","displayName":"Home Hero"},{"__typename":"UnknownItem","name":"CIS-Home-HeroLayout Rendering Parameters","displayName":"Home Hero Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Home-Industry","displayName":"Home Industry"},{"__typename":"UnknownItem","name":"CIS-Home-Industry Rendering Parameters","displayName":"Home Industry Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Home-Masthead","displayName":"Home Masthead"},{"__typename":"UnknownItem","name":"CIS-Home-Masthead Rendering Parameters","displayName":"Home Masthead Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Home-Update","displayName":"Home Update"},{"__typename":"UnknownItem","name":"CIS-Home-Update Rendering Parameters","displayName":"Home Update Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Icon-Group","displayName":"Icon Group"},{"__typename":"UnknownItem","name":"CIS-Icon-Group Rendering Parameters","displayName":"Icon Group Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Icon-Group-Item","displayName":"Icon Group Item"},{"__typename":"UnknownItem","name":"CIS-Icon-Group-Item Rendering Parameters","displayName":"Icon Group Item Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Image-Carousel","displayName":"Image Carousel"},{"__typename":"UnknownItem","name":"CIS-Image-Carousel Rendering Parameters","displayName":"Image Carousel Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Image-Carousel-Item","displayName":"Carousel Image"},{"__typename":"UnknownItem","name":"CIS-Image-Carousel-Item Rendering Parameters","displayName":"Carousel Image Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-InfoHub Rendering Parameters","displayName":"Info Hub Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-InfoHub-Pages","displayName":"CIS-InfoHub-Pages"},{"__typename":"UnknownItem","name":"CIS-Latest-Advisory","displayName":"Latest Advisory"},{"__typename":"UnknownItem","name":"CIS-Latest-Advisory Rendering Parameters","displayName":"Latest Advisory Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Latest-Alert","displayName":"Latest Alert"},{"__typename":"UnknownItem","name":"CIS-Latest-Alert Rendering Parameters","displayName":"Latest Alert Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Latest-Insights Rendering Parameters","displayName":"Latest Insights Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Latest-Insights-Item-Static","displayName":"Latest Insight Item - Static"},{"__typename":"UnknownItem","name":"CIS-Latest-Insights-Item-Static Rendering Parameters","displayName":"Latest Insight Item - Static Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Latest-Spotlight","displayName":"Latest Spotlight"},{"__typename":"UnknownItem","name":"CIS-Latest-Spotlight Rendering Parameters","displayName":"Latest Spotlight Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-List-Landing","displayName":"Insight Latest Container"},{"__typename":"UnknownItem","name":"CIS-List-Landing Rendering Parameters","displayName":"Insight Latest Container Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-List-Landing-Featured","displayName":"Insight Featured Item"},{"__typename":"UnknownItem","name":"CIS-List-Landing-Featured Rendering Parameters","displayName":"Insight Featured Item Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-List-Landing-Item","displayName":"Insight Latest Item"},{"__typename":"UnknownItem","name":"CIS-List-Landing-Item Rendering Parameters","displayName":"Insight Latest Item Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-List-Landing-Link","displayName":"Insight Link"},{"__typename":"UnknownItem","name":"CIS-List-Landing-Link Rendering Parameters","displayName":"Insight Link Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-List-Link","displayName":"List Link with Description"},{"__typename":"UnknownItem","name":"CIS-List-Link Rendering Parameters","displayName":"List Link with Description Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-List-Link-Extra-Links","displayName":"List Link with Description and Extra Link"},{"__typename":"UnknownItem","name":"CIS-List-Link-Extra-Links Rendering Parameters","displayName":"List Link with Description and Extra Link Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-List-Link-Title","displayName":"List Link Title"},{"__typename":"UnknownItem","name":"CIS-List-Link-Title Rendering Parameters","displayName":"List Link Title Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-List-Page-Hero","displayName":"Masthead - List Page"},{"__typename":"UnknownItem","name":"CIS-List-Page-Hero Rendering Parameters","displayName":"Masthead - List Page Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-List-Page-Link","displayName":"List Page Link"},{"__typename":"UnknownItem","name":"CIS-List-Page-Link Rendering Parameters","displayName":"List Page Link Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-List-Page-Right-Rail","displayName":"List Page Right Rail"},{"__typename":"UnknownItem","name":"CIS-List-Page-Right-Rail Rendering Parameters","displayName":"List Page Right Rail Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Masthead","displayName":"Masthead"},{"__typename":"UnknownItem","name":"CIS-Masthead Rendering Parameters","displayName":"Masthead Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Masthead-Two-Column","displayName":"Masthead - Two Column"},{"__typename":"UnknownItem","name":"CIS-Masthead-Two-Column Rendering Parameters","displayName":"Masthead - Two Column Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Masthead-Two-Column-Link","displayName":"Masthead - Two Column - Link"},{"__typename":"UnknownItem","name":"CIS-Masthead-Two-Column-Link Rendering Parameters","displayName":"Masthead - Two Column - Link Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Media-Masthead","displayName":"Masthead - Media"},{"__typename":"UnknownItem","name":"CIS-Media-Masthead Rendering Parameters","displayName":"Masthead - Media Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Members","displayName":"Members"},{"__typename":"UnknownItem","name":"CIS-Members Rendering Parameters","displayName":"Members Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Members-List","displayName":"CIS-Members-List"},{"__typename":"UnknownItem","name":"CIS-Navigation-Link","displayName":"Navigation Link"},{"__typename":"UnknownItem","name":"CIS-Navigation-Link Rendering Parameters","displayName":"Navigation Link Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-PageTitle","displayName":"Page Title"},{"__typename":"UnknownItem","name":"CIS-PageTitle Rendering Parameters","displayName":"Page Title Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Price-Selector","displayName":"Price Selector"},{"__typename":"UnknownItem","name":"CIS-Price-Selector Rendering Parameters","displayName":"Price Selector Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Profile","displayName":"Profile"},{"__typename":"UnknownItem","name":"CIS-Profile Rendering Parameters","displayName":"Profile Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Profile-List","displayName":"Profile List"},{"__typename":"UnknownItem","name":"CIS-Profile-List Rendering Parameters","displayName":"Profile List Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Profile-List-Item","displayName":"Profile Item"},{"__typename":"UnknownItem","name":"CIS-Profile-List-Item Rendering Parameters","displayName":"Profile Item Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Related-Resources","displayName":"Related Resources"},{"__typename":"UnknownItem","name":"CIS-Related-Resources Rendering Parameters","displayName":"Related Resources Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-Advisory Rendering Parameters","displayName":"Resource Advisory Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-Advisory-AffectedSystem","displayName":"Advisory Affected System"},{"__typename":"UnknownItem","name":"CIS-Resource-Advisory-Data","displayName":"CIS-Resource-Advisory-Data"},{"__typename":"UnknownItem","name":"CIS-Resource-Advisory-Reference","displayName":"Advisory Reference"},{"__typename":"UnknownItem","name":"CIS-Resource-Advisory-RelatedBenchmark","displayName":"Advisory Related Benchmark"},{"__typename":"UnknownItem","name":"CIS-Resource-Advisory-RelatedControl","displayName":"Advisory Related Control"},{"__typename":"UnknownItem","name":"CIS-Resource-Advisory-RiskCategory","displayName":"Advisory Risk Category"},{"__typename":"UnknownItem","name":"CIS-Resource-Advisory-RouteType","displayName":"Advisory"},{"__typename":"UnknownItem","name":"CIS-Resource-Alert-Level","displayName":"CIS-Resource-Alert-Level"},{"__typename":"UnknownItem","name":"CIS-Resource-BaseData","displayName":"CIS-Resource-BaseData"},{"__typename":"UnknownItem","name":"CIS-Resource-Benchmark Rendering Parameters","displayName":"Resource Benchmark Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-Benchmark-APIKey","displayName":"Benchmark API Key"},{"__typename":"UnknownItem","name":"CIS-Resource-Benchmark-Category","displayName":"CIS-Resource-Benchmark-Category"},{"__typename":"UnknownItem","name":"CIS-Resource-Benchmark-Data","displayName":"CIS-Resource-Benchmark-Data"},{"__typename":"UnknownItem","name":"CIS-Resource-Benchmark-Document","displayName":"CIS-Resource-Benchmark-Document"},{"__typename":"UnknownItem","name":"CIS-Resource-Benchmark-GlobalData","displayName":"CIS-Resource-Benchmark-GlobalData"},{"__typename":"UnknownItem","name":"CIS-Resource-Benchmark-Image","displayName":"CIS-Resource-Benchmark-Image"},{"__typename":"UnknownItem","name":"CIS-Resource-Benchmark-List","displayName":"Benchmark List"},{"__typename":"UnknownItem","name":"CIS-Resource-Benchmark-List Rendering Parameters","displayName":"Benchmark List Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-Benchmark-RemediationKit","displayName":"CIS-Resource-Benchmark-RemediationKit"},{"__typename":"UnknownItem","name":"CIS-Resource-Benchmark-RouteType","displayName":"Benchmark"},{"__typename":"UnknownItem","name":"CIS-Resource-Benchmark-SubCategory","displayName":"CIS-Resource-Benchmark-SubCategory"},{"__typename":"UnknownItem","name":"CIS-Resource-Benchmark-Version","displayName":"CIS-Resource-Benchmark-Version"},{"__typename":"UnknownItem","name":"CIS-Resource-Blog Rendering Parameters","displayName":"Resource Blog Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-BlogData","displayName":"CIS-Resource-BlogData"},{"__typename":"UnknownItem","name":"CIS-Resource-Blog-RouteType","displayName":"Blog Post"},{"__typename":"UnknownItem","name":"CIS-Resource-BroadcastData","displayName":"CIS-Resource-BroadcastData"},{"__typename":"UnknownItem","name":"CIS-Resource-CaseStudy Rendering Parameters","displayName":"Resource Case Study Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-CaseStudy-RouteType","displayName":"Case Study"},{"__typename":"UnknownItem","name":"CIS-Resource-DownloadData","displayName":"CIS-Resource-DownloadData"},{"__typename":"UnknownItem","name":"CIS-Resource-GenericPage Rendering Parameters","displayName":"Resource Generic Page Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-GenericPage-RouteType","displayName":"Page"},{"__typename":"UnknownItem","name":"CIS-Resource-Media-Mention Rendering Parameters","displayName":"Resource Media-Mention Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-Media-Mention-RouteType","displayName":"Media Mention"},{"__typename":"UnknownItem","name":"CIS-Resource-Newsletter Rendering Parameters","displayName":"Resource Newsletter Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-Newsletter-RouteType","displayName":"Newsletter"},{"__typename":"UnknownItem","name":"CIS-Resource-PagedListing","displayName":"Resource Paged Listing"},{"__typename":"UnknownItem","name":"CIS-Resource-PagedListing Rendering Parameters","displayName":"Resource Paged Listing Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-Partner Rendering Parameters","displayName":"Resource Partner Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-PartnerData","displayName":"CIS-Resource-PartnerData"},{"__typename":"UnknownItem","name":"CIS-Resource-PartnerListing","displayName":"Resource Partner Listing"},{"__typename":"UnknownItem","name":"CIS-Resource-PartnerListing Rendering Parameters","displayName":"Resource Partner Listing Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-Partner-RouteType","displayName":"Partner"},{"__typename":"UnknownItem","name":"CIS-Resource-Podcast Rendering Parameters","displayName":"Resource Podcast Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-PodcastData","displayName":"CIS-Resource-PodcastData"},{"__typename":"UnknownItem","name":"CIS-Resource-Podcast-RouteType","displayName":"Podcast"},{"__typename":"UnknownItem","name":"CIS-Resource-Press-Release Rendering Parameters","displayName":"Resource Press Release Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-Press-Release-RouteType","displayName":"Press Release"},{"__typename":"UnknownItem","name":"CIS-Resource-RightColumn","displayName":"CIS-Resource-RightColumn"},{"__typename":"UnknownItem","name":"CIS-Resource-Spotlight Rendering Parameters","displayName":"Resource Spotlight Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-Spotlight-RouteType","displayName":"Spotlight"},{"__typename":"UnknownItem","name":"CIS-Resource-Taxonomy-Item","displayName":"CIS-Resource-Taxonomy-Item"},{"__typename":"UnknownItem","name":"CIS-Resource-Webinar Rendering Parameters","displayName":"Resource Webinar Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-Webinar-RouteType","displayName":"Webinar"},{"__typename":"UnknownItem","name":"CIS-Resource-White-Paper Rendering Parameters","displayName":"Resource White-Paper Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-White-PaperData","displayName":"CIS-Resource-White-PaperData"},{"__typename":"UnknownItem","name":"CIS-Resource-White-Paper-RouteType","displayName":"White Paper"},{"__typename":"UnknownItem","name":"CIS-RichText","displayName":"Rich Text Editor"},{"__typename":"UnknownItem","name":"CIS-RichText Rendering Parameters","displayName":"Rich Text Editor Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Search","displayName":"Search"},{"__typename":"UnknownItem","name":"CIS-Search Rendering Parameters","displayName":"Search Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Steps-Carousel","displayName":"Steps Carousel"},{"__typename":"UnknownItem","name":"CIS-Steps-Carousel Rendering Parameters","displayName":"Steps Carousel Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Steps-Carousel-Item","displayName":"Steps Carousel Item"},{"__typename":"UnknownItem","name":"CIS-Steps-Carousel-Item Rendering Parameters","displayName":"Steps Carousel Item Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Tabs","displayName":"Tabs"},{"__typename":"UnknownItem","name":"CIS-Tabs Rendering Parameters","displayName":"Primary Tabs Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Tabs-Secondary Rendering Parameters","displayName":"Secondary Tabs Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Tabs-Secondary-Tab","displayName":"Secondary Tab"},{"__typename":"UnknownItem","name":"CIS-Tabs-Secondary-Tab Rendering Parameters","displayName":"Secondary Tab Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Tabs-Tab","displayName":"Primary Tab"},{"__typename":"UnknownItem","name":"CIS-Tabs-Tab Rendering Parameters","displayName":"Primary Tab Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Twitter-Metadata","displayName":"CIS-Twitter-Metadata"},{"__typename":"UnknownItem","name":"CIS-UX-Example Rendering Parameters","displayName":"CIS-UX-Example Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Wistia-Audio","displayName":"Wistia Audio"},{"__typename":"UnknownItem","name":"CIS-Wistia-Audio Rendering Parameters","displayName":"Wistia Audio Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Wistia-Video","displayName":"Wistia Video"},{"__typename":"UnknownItem","name":"CIS-Wistia-Video Rendering Parameters","displayName":"Wistia Video Rendering Parameters"},{"__typename":"UnknownItem","name":"JSS Site","displayName":"JSS Site"},{"__typename":"UnknownItem","name":"JSS Tenant","displayName":"JSS Tenant"},{"__typename":"UnknownItem","name":"Page Design Folder","displayName":"Page Design Folder"},{"__typename":"UnknownItem","name":"Page Designs","displayName":"Page Designs"},{"__typename":"UnknownItem","name":"Partial Design Folder","displayName":"Partial Design Folder"},{"__typename":"UnknownItem","name":"Partial Designs","displayName":"Partial Designs"},{"__typename":"UnknownItem","name":"PartialDesignDynamicPlaceholder","displayName":"PartialDesignDynamicPlaceholder"},{"__typename":"UnknownItem","name":"PartialDesignDynamicPlaceholder Rendering Parameters","displayName":"PartialDesignDynamicPlaceholder Rendering Parameters"},{"__typename":"UnknownItem","name":"Test-Tracker Rendering Parameters","displayName":"Test-Tracker Rendering Parameters"}]},"item({\"path\":\"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fcisecurity\u002FContent\u002FTaxonomies\u002FOwners\"})":{"__typename":"UnknownItem","children":[{"__ref":"CISResourceTaxonomyItem:2E6FD60206DA5187A787AE5BE20DD812"},{"__ref":"CISResourceTaxonomyItem:74CCE205EB59520FA66B4FD1FC70F279"},{"__ref":"CISResourceTaxonomyItem:EF5341028C875E0DB4C6FDCF23E563C7"},{"__ref":"CISResourceTaxonomyItem:44BCB76B7F76576C947A02B957604BC4"},{"__ref":"CISResourceTaxonomyItem:58BCBBDF6877560E96F15F2358637BD1"},{"__ref":"CISResourceTaxonomyItem:46D73C5EC9115BBDBD34DD2DB2562E2B"},{"__ref":"CISResourceTaxonomyItem:DBCE1B447F3B5F29AC2A408492C4DC47"},{"__ref":"CISResourceTaxonomyItem:D41DF5F519975662BBBB4AE63430599E"}]}}}}</script></body></html><!-- FILE ARCHIVED ON 19:14:05 May 24, 2024 AND RETRIEVED FROM THE INTERNET ARCHIVE ON 09:53:29 Feb 27, 2025. JAVASCRIPT APPENDED BY WAYBACK MACHINE, COPYRIGHT INTERNET ARCHIVE. ALL OTHER CONTENT MAY ALSO BE PROTECTED BY COPYRIGHT (17 U.S.C. SECTION 108(a)(3)). --> <!-- playback timings (ms): captures_list: 0.76 exclusion.robots: 0.034 exclusion.robots.policy: 0.02 esindex: 0.011 cdx.remote: 11.519 LoadShardBlock: 219.298 (6) PetaboxLoader3.datanode: 206.757 (7) PetaboxLoader3.resolve: 169.878 (2) load_resource: 204.487 -->

Pages: 1 2 3 4 5 6 7 8 9 10