CIS Benchmark Compliance Verification

CIS Benchmarks are security control sets to ensure a “best practices” configuration approach which maximizes an organization’s security posture.

The CIS Benchmarks are created collaboratively by Subject Matter Experts (SME’s), Security Community Members and Vendors of the technologies to which each control set applies.

There are multiple configuration profiles for each Benchmark. They are categorized into Level 1 and Level 2.

A Level 1 CIS security profile is the most rapidly implemented and may be considered the “Low Hanging Fruit” approach. Implementing a Level 1 CIS security profile results in an immediate improvement in security posture by minimizing attack surface with minimal impact to business operation and technology usability.

A Level 2 CIS security profile is a much more granular approach and while more complex to implement, results in a heightened security posture. The complexity of implementation lies in the possibility of adverse impact to the usability of the technology if improperly implemented.

TSCS’ CIS Benchmark Compliance Verification Service Offering will ensure your organization achieves the optimal security posture based on the criteria established by your business requirements.

Please review the complete, up-to-date list of CIS Benchmarks below:

Alibaba Cloud

Aliyun Linux

Amazon Linux

Amazon Web Services

Apache Cassandra

Apache HTTP Server

Apache Tomcat

Apple IOS

Apple MacOS

BIND

CentOS Linux

Check Point Firewall

Cisco

Debian Family Linux

Debian Linux

Distribution Independent Linux

Docker

Fedora Family Linux

Google Android

Google Chrome

Google Cloud Computing Platform

Google Workspace

IBM AIX

IBM Cloud Foundations

IBM Db2

IBM I

Juniper

Kubernetes

LXD

MIT Kerberos

Microsoft Azure

Microsoft Exchange Server

Microsoft IIS

Microsoft Intune For Windows 10

Microsoft Office

Microsoft SQL Server

Microsoft SharePoint

Microsoft Web Browser

Microsoft Windows Desktop

Microsoft Windows Server

MongoDB

Mozilla Firefox

NGINX

Oracle Cloud Infrastructure

Oracle Database

Oracle Linux

Oracle MySQL

Oracle Solaris

Palo Alto Networks

PostgreSQL

Print Devices

Red Hat Enterprise Linux

Robot Operating System (ROS)

SUSE Linux Enterprise Server

Safari Browser

Ubuntu Linux

VMware

Zoom

Contact TSCS





Copyright © 2024 Technology Security & Compliance Solutions Inc.