Skip to end of metadata
Go to start of metadata

You are viewing an old version of this content. View the current version.

Compare with Current View Version History

Version 1 Current »

Follow our prioritized set of actions to protect your organization and data from cyber-attack vectors.

Want to learn more about CIS Controls as a whole? Review our main Controls documentation to learn about what the Controls and Safeguards are, what Implementation Groups (IGs) are, how to move from one version to the next, and what our Asset Classes mean.

CIS Controls Resources

CIS Controls FAQ

  • No labels