CIS Critical Security Controls -Version 8

This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivatives 4.0 International Public License (the link can be found at https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode.

Saved in:
Bibliographic Details
Main Author: CIS
Format: Other
Language:English
Published: cisecurity.org 2024
Online Access:https://dlib.phenikaa-uni.edu.vn/handle/PNK/9954
Tags: Add Tag
No Tags, Be the first to tag this record!
id oai:localhost:PNK-9954
record_format dspace
spelling oai:localhost:PNK-99542024-02-19T04:27:16Z CIS Critical Security Controls -Version 8 CIS This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivatives 4.0 International Public License (the link can be found at https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode. The CIS Critical Security Controls® (CIS Controls®) started as a simple grassroots activity to identify the most common and important real-world cyber-attacks that affect enterprises every day, translate that knowledge and experience into positive, constructive action for defenders, and then share that information with a wider audience. The original goals were modest—to help people and enterprises focus their attention and get started on the most important steps to defend themselves from the attacks that really mattered. Led by the Center for Internet Security® (CIS®), the CIS Controls have matured into an international community of volunteer individuals and institutions that: • Share insights into attacks and attackers, identify root causes, and translate that into classes of defensive action • Create and share tools, working aids, and stories of adoption and problem-solving • Map the CIS Controls to regulatory and compliance frameworks in order to ensure alignment and bring collective priority and focus to them • Identify common problems and barriers (like initial assessment and implementation roadmaps), and solve them as a community The CIS Controls reflect the combined knowledge of experts from every part of the ecosystem (companies, governments, individuals), with every role (threat responders and analysts, technologists, information technology (IT) operators and defenders, vulnerability-finders, tool makers, solution providers, users, policy-makers, auditors, etc.), and across many sectors (government, power, defense, finance, transportation, academia, consulting, security, IT, etc.), who have banded together to create, adopt, and support the CIS Controls. 2024-02-19T04:27:16Z 2024-02-19T04:27:16Z 2021 Other https://dlib.phenikaa-uni.edu.vn/handle/PNK/9954 en application/pdf cisecurity.org
institution Digital Phenikaa
collection Digital Phenikaa
language English
description This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivatives 4.0 International Public License (the link can be found at https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode.
format Other
author CIS
spellingShingle CIS
CIS Critical Security Controls -Version 8
author_facet CIS
author_sort CIS
title CIS Critical Security Controls -Version 8
title_short CIS Critical Security Controls -Version 8
title_full CIS Critical Security Controls -Version 8
title_fullStr CIS Critical Security Controls -Version 8
title_full_unstemmed CIS Critical Security Controls -Version 8
title_sort cis critical security controls -version 8
publisher cisecurity.org
publishDate 2024
url https://dlib.phenikaa-uni.edu.vn/handle/PNK/9954
_version_ 1792081293432848384
score 8.891787