CIS BenchmarksInformation Assurance, Governance, Risk and Compliance

Begin Learning Cyber Security for FREE Now!

Already a Member Login Here

This topic contains 2 replies, has 2 voices, and was last updated by  Mubarak Basha Shaik 3 years, 5 months ago.

Viewing 3 posts - 1 through 3 (of 3 total)
  • Author
  • #82577

    Mubarak Basha Shaik

    Dear One and all,

    Kindly help me to understanding CIS Benchmarks with sample examples.



    “CIS Benchmarks are recommended technical settings for operating systems, middleware and software applications, and network devices.”

    Pretty straight forward. If you’re going to install an OS or application, what are the settings you should have to help ensure it’s secure.

    Most companies, if their IT people are smart, will have set down how they install and configure the operating systems and applications they are using. As part of this, they will want to be sure that the settings they use are secure, because they are NOT if you go with the default settings out of the box.

    Where I worked we had documented how we install and setup all the OSs we used (Windows, Windows Server, various versions of Unix, etc). We, in fact, based these documented installation procedures on CIS’s work, modifying them further for our own uses and our own default installed software on systems.

    If you’re going to have a secure environment, you need to have documented and followed secure installs for your OSs, major applications, and network devices.


    Mubarak Basha Shaik

    Emb021 .. Thanks for reply ..

Viewing 3 posts - 1 through 3 (of 3 total)

You must be logged in to reply to this topic.

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?