End of Life (EOL) for CIS-CAT Pro Assessor v4 Vulnerability Assessment capability


Product Name

CIS-CAT Pro Assessor v4

Product Version

4.24+

Date

Nov 1, 2022



Version 4.24 will be the final release of CIS-CAT Pro Assessor v4 vulnerability assessment capability. Primary functions will continue to focus on CIS Benchmark configuration assessments.

Rationale

CIS-CAT's goal is to focus on what our members find most valuable. Members have told us that CIS-CAT's automated configuration assessment capabilities with CIS Benchmark content is the most important aspect of SecureSuite. CIS-CAT aims to streamline and continue to support the fundamental configuration best practice needs for the single enterprise.

CIS-CAT will increase focus on building better configuration assessment experiences. We've made the decision to remove vulnerability scanning from CIS-CAT products. Vulnerability definitions utilized by CIS-CAT are not under our purview, and we know that there are many other "best in class" applications that place more focus on this type of scanning.

Please see our blog; https://www.cisecurity.org/insights/blog/cis-cat-pro-is-now-even-better-heres-how-weve-improved-it

 

The Center for Internet Security's Product Technical Support Team will assist Members with questions on the downloading and use of 3rd party Vulnerability Assessment content through the release of CIS-CAT Pro Assessor v4.24.0 - slated for the end of November 2022.

Upon release of CIS-CAT Pro Assessor v4.24.0, CIS Product Technical Support will reserve the possibility of assisting members depending on their circumstances and our bandwidth.

Vulnerability Assessment content, provided by a 3rd party repository, will no longer have the option to be integrated into Assessor.

Existing Members and new onboarding Members are encouraged to skip downloading the 3rd party Vulnerability Definition Downloads, setting up Vulnerability scans, and/or setting up CIS-CAT Pro Assessor to CIS-CAT Pro Dashboard Vulnerability scans.

Keywords;

Content by Label


Copyright © 2022

Center for Internet Security®