The guidelines consist of 18 (originally 20) key actions, called critical security controls (CSC), that organizations should implement to block or mitigate known attacks. The controls are designed so that primarily automated means can be used to implement, enforce and monitor them.3 The security controls give no-nonsense, actionable recommendations for cyber security, written in language that’s easily understood by IT personnel.4 Goals of the Consensus Audit Guidelines include
CIS Benchmarks cover a wide range of technologies, including:
"Gilligan Group Inc., CAG Background and Participants" http://www.gilligangroupinc.com/headlines/2009/feb-23-related/background-and-participants.html ↩
“CIS Critical Security Controls Version 8, CIS webpage, January 17, 2024 https://www.cisecurity.org/controls/v8?msclkid=363086a359ea1ff39cc0e30b509f6b8e ↩
“Understanding Technology Stakeholders: Their Progress and Challenges” by John M. Gilligan, Software Assurance Forum, November 4, 2009 https://buildsecurityin.us-cert.gov/swa/presentations_1109/W3%20Final%20-%20Kass%20-%20Understanding%20Technology%20Stakeholders.pdf ↩
“Consensus Audit Guidelines: Overview” by Lieberman Software Corporation https://web.archive.org/web/20120330220029/http://www.liebsoft.com/CAG_overview/ ↩
“Consensus Audit Guidelines: Time to ‘Stop The Bleeding’” by John M. Gilligan, 10th Semi-Annual Software Assurance Forum, March 12, 2009 https://buildsecurityin.us-cert.gov/swa/presentations_09/Day%203%20-%20GILLIGAN%20-%20DoD-MITRE%20Software%20Assurance%20Conference%203-12-09.pdf ↩
Vanney, Ivan (July 2, 2024). "What are CIS Benchmarks?". Linux.Lat. Retrieved July 3, 2024. https://linux.lat/cis-benchmarks-a-comprehensive-guide/ ↩