CIS Critical Security Controls -Version 8
This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivatives 4.0 International Public License (the link can be found at https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode.
Saved in:
Main Author: | |
---|---|
Format: | Other |
Language: | English |
Published: |
cisecurity.org
2024
|
Online Access: | https://dlib.phenikaa-uni.edu.vn/handle/PNK/9954 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
oai:localhost:PNK-9954 |
---|---|
record_format |
dspace |
spelling |
oai:localhost:PNK-99542024-02-19T04:27:16Z CIS Critical Security Controls -Version 8 CIS This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivatives 4.0 International Public License (the link can be found at https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode. The CIS Critical Security Controls® (CIS Controls®) started as a simple grassroots activity to identify the most common and important real-world cyber-attacks that affect enterprises every day, translate that knowledge and experience into positive, constructive action for defenders, and then share that information with a wider audience. The original goals were modest—to help people and enterprises focus their attention and get started on the most important steps to defend themselves from the attacks that really mattered. Led by the Center for Internet Security® (CIS®), the CIS Controls have matured into an international community of volunteer individuals and institutions that: • Share insights into attacks and attackers, identify root causes, and translate that into classes of defensive action • Create and share tools, working aids, and stories of adoption and problem-solving • Map the CIS Controls to regulatory and compliance frameworks in order to ensure alignment and bring collective priority and focus to them • Identify common problems and barriers (like initial assessment and implementation roadmaps), and solve them as a community The CIS Controls reflect the combined knowledge of experts from every part of the ecosystem (companies, governments, individuals), with every role (threat responders and analysts, technologists, information technology (IT) operators and defenders, vulnerability-finders, tool makers, solution providers, users, policy-makers, auditors, etc.), and across many sectors (government, power, defense, finance, transportation, academia, consulting, security, IT, etc.), who have banded together to create, adopt, and support the CIS Controls. 2024-02-19T04:27:16Z 2024-02-19T04:27:16Z 2021 Other https://dlib.phenikaa-uni.edu.vn/handle/PNK/9954 en application/pdf cisecurity.org |
institution |
Digital Phenikaa |
collection |
Digital Phenikaa |
language |
English |
description |
This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivatives 4.0 International
Public License (the link can be found at https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode. |
format |
Other |
author |
CIS |
spellingShingle |
CIS CIS Critical Security Controls -Version 8 |
author_facet |
CIS |
author_sort |
CIS |
title |
CIS Critical Security Controls -Version 8 |
title_short |
CIS Critical Security Controls -Version 8 |
title_full |
CIS Critical Security Controls -Version 8 |
title_fullStr |
CIS Critical Security Controls -Version 8 |
title_full_unstemmed |
CIS Critical Security Controls -Version 8 |
title_sort |
cis critical security controls -version 8 |
publisher |
cisecurity.org |
publishDate |
2024 |
url |
https://dlib.phenikaa-uni.edu.vn/handle/PNK/9954 |
_version_ |
1792081293432848384 |
score |
8.891787 |