on 2020-08-1309:16 AM - edited on 2022-01-2802:59 PM by ProductMod
The CIS Controls are a recommended set of actions for cyber defense that provide specific and actionable ways to thwart the most pervasive attacks. The CIS Controls are a relatively short list of high-priority, highly effective defensive actions that provide a "must-do, do-first" starting point for every enterprise seeking to improve their cyber defense.
The CIS Controls were developed in 2008 by an international, grass-roots consortium bringing together companies, government agencies, institutions, and individuals from every part of the ecosystem (cyber analysts, vulnerability-finders, solution providers, users, consultants, policy-makers, executives, academia, auditors, etc.) who banded together to create, adopt, and support the CIS Controls. The expert volunteers who develop the Controls apply their first-hand experience to develop the most effective actions for cyber defense.
The CIS Critical Security Controls Authoritative Source Content has been updated to version 8.0 which was made available May of 2021.
This content is available in English only.
Mappings for the Center for Internet Security (CIS) - Critical Security Controls Authoritative Source Content to the Archer Control Standard Library are available in the authoritative source content pack.
This content requires a license and/or membership in good standing as required by the terms set forth by The Center for Internet Security (CIS). For more information about licensing, please contact The Center for Internet Security (CIS).
The Center for Internet Security (CIS) - Critical Security Controls authoritative source content is available with the use of the Archer Policy Program Management use case, the Archer IT Policy Program Management use case, and/or the Archer Assessment & Authorization use case.
For Additional Support
To learn more about this content, please contact your Account Rep for additional details. For technical support questions, please open a support case.