Center for Internet Security, Inc. (CIS) Solutions for the Public Sector
For more information on these products, please view the resources in the tab above.
-
CIS Hardened Images®
- Securely pre-configured virtual machine images hardened according to the globally recognized secure configuration guidelines of the CIS Benchmarks. They provide a secure, on-demand and scalable computing environment.
- More secure than a standard image, CIS Hardened Images reduce system vulnerabilities and offer security to help protect against malware, remote intrusion, insufficient authorization, and other cyber threats.
- Each CIS Hardened Image includes a report showing conformance to the applicable CIS Benchmarks, which are recognized as secure configuration standards by PCI DSS, HIPAA, FedRAMP, NIST, and DoD STIGs.
- Offered for nine different virtual machine versions of Linux: Amazon, CentOS, Debian, Oracle, Red Hat, SUSE, Ubuntu, NGINX, and PostgreSQL - as well as Microsoft Windows Server.
- Available to spin up immediately from Amazon Web Services (AWS Marketplace, AWS GovCloud (US) region, and AWS for the Intelligence Community [IC]), Microsoft Azure (Azure Marketplace and Azure Government Marketplace), Google Cloud Platform, and Oracle Cloud.
-
Albert Network Monitoring and Management
- Cost-effective Intrusion Detection System (IDS) providing automated alerting on both traditional and advanced network threats
- In-depth review of alerts conducted by expert analysts through CIS’s 24x7x365 Security Operations Center (SOC)
- Consolidated, actionable insights and monthly reporting from expert analysts with industry-leading response times - averaging 6 minutes from threat detection to notification
- Unique SLTT-focused and targeted signature set
- Turnkey solution incorporating 24x7x365 monitoring and management
- Available for both on-premises and cloud environments (AWS and Azure)
-
CIS Endpoint Security Services (ESS)
- Fully managed, premium endpoint security solution as a service that includes:
- Next Generation Antivirus (NGAV)
- Endpoint Detection and Response (EDR)
- Asset and application inventory
- USB device monitoring
- User account monitoring
- Host-based firewall management
- Device-level protection and response powered by CrowdStrike with value-added support and service from CIS
- Deployed on endpoint devices to identify, detect, respond to, and remediate security incidents and alerts
- 24x7x365 monitoring and management by CIS Security Operations Center (SOC), providing expert human analysis of malicious activity and escalating actionable threats
- Incident response and remote digital forensics support provided by CIS Cyber Incident Response Team (CIRT)
-
Managed Security Services
- Cost-effective log and security event monitoring of devices for malicious or anomalous activity including, but not limited to, IDS/IPS, firewalls, switches and routers, servers, endpoints, and web proxies
- Event analysis performed by expert human analysts in the 24x7x365 CIS SOC using the largest cyber threat database specifically for SLTTs
- Analysts eliminate false positives, escalate actionable items to organizations, provide support regarding alerts or notifications received, and deliver comprehensive monthly activity reports
- Users gain visibility into security events, log data, and on-demand reporting through an online portal powered by Accenture
-
Penetration Testing
- Network and web application penetration testing utilizing both automated tools and manual techniques
- Identification and exploitation of vulnerabilities through a simulated real-world cyber-attack for risk assignment
- In-depth reporting on vulnerabilities, risk, impact, location, recommendations, and references to mitigate in your environment
-
Vulnerability Assessments
- Both network and web application vulnerability assessments available.
- Cost-effective solution to proactively identify and remediate potential attack vectors
- Assessments include network or application discovery and mapping, asset prioritization, manual vulnerability verification, vulnerability assessment reporting, remediation tracking according to business risk, and remediation support
- Available as either single or regularly recurring (quarterly or monthly) assessments
-
Phishing Engagements
- Leverage technical and socio-psychological techniques to diagnose end user awareness
- Craft unique and customized phishing email content, links and attachments, landing pages, forms to capture user credentials, and personalized content for each target user
- Extensive report detailing assessment’s goals, theory, attack method, concluded results, statistics, campaign effectiveness and conclusions, and recommendations
-
CIS SecureSuite
- Trusted by more than 2,500 organizations worldwide, CIS SecureSuite® Membership provides integrated cybersecurity resources to help businesses, nonprofits, government entities, and IT experts start secure and stay secure.
- CIS SecureSuite® Members benefit from advanced tools and resources that help speed the adoption of security best practices from policy to implementation, including:
- Full-format CIS Benchmarks: access multiple file formats of our more than 100 consensus-developed secure configuration guidelines for hardening operating systems, servers, cloud environments, and more across 25+ vendor product families
- CIS-CAT Pro: automatically assess your system configuration against the CIS Benchmark recommendations and measure compliance over time
- CIS Build Kits: quickly and easily remediate at scale and implement security recommendations across your environment with our automated scripts and templates
- CIS CSAT Pro: conduct, track, and assess your implementation of the CIS Controls, our community-developed cybersecurity best practices
- CIS WorkBench: collaborate with our global community of IT professionals, tailor benchmark recommendations to fit your organizational policies, and easily access membership resources and content
- CIS Benchmarks™
- Consensus-developed secure configuration guidelines for hardening operating systems, servers, cloud environments, and more. The CIS Benchmarks include more than 100 configuration guidelines across 25+ vendor product families.
- Recognized as secure configuration best practices that can help organizations meet compliance for PCI DSS, DoD STIGs, FISMA, FedRAMP, and others.
- CIS Critical Security Controls® (CIS Controls)
- Prescriptive, prioritized, and simplified set of critical security controls and cybersecurity best practices developed by a community of cybersecurity experts that can help support compliance in a multi-framework era.
- Provide specific guidance and a clear pathway for organizations to achieve the goals and objectives described by multiple legal, regulatory, and policy frameworks, including NIST, PCI DSS, CMMC, and HIPAA.
-
Malicious Domain Blocking and Reporting Plus (MDBR+)
- MDBR+ is a quick-to-configure and easy-to-deploy cloud-based protective domain name system (PDNS) service that's available to U.S. State, Local, Tribal and Territorial (SLTT) government organizations and private hospitals.
- Cloud-based Management Portal: Offers security teams full access to a cloud-based management portal, enabling management and custom configuration from any location at any time.
- Enhanced Reporting and Visibility: Gives you instant access to real-time reports on blocked activity for every user on your network, allowing for more informed security decisions.
- Custom Configurations: Puts your organization in the driver's seat of your own web security with the ability to create AUPs, allow/deny lists, and error pages tailored to your unique security needs.
- Off-network Protection: Even your off-network devices can be protected with the secure PDNS service through an easy-to-deploy lightweight client that can be installed on your organization's devices to protect laptops or mobile devices wherever they connect to the internet.