

I realize the different configuration providers supply different offerings per Operating System, but lets assume (for convenience) were talking about Linux. In some cases, you may need to deviate from the benchmarks 25 Im researching OS hardening and it seems there are a variety of recommended configuration guides. You can use additional CIS tools available to members, such as Windows GPOs, Develop system hardening practices based on the benchmarks and CIS-CAT Scoring Tool.This cross-platform Java appĮxamines your system and produces a report comparing your settings to the published Download the CIS-CAT Benchmark Assessment Tool (available on the member website) and run against a system you would like to secure.Benchmarks are available as PDF reference worksheets for system hardening.
#Cis benchmark standards mac os x#

To get started using tools and resources from CIS, follow these steps: Using CIS Tools and Resources for System Hardening As a member of this community, the university hasĪccess to Consensus Security Configuration Benchmarks, Scoring Tools, and Consensus The Center for Internet Security (CIS) is a community of organizations and individuals Information Security Advisory Committee.Alignment with State Information Security and Privacy Standards.CESR - Carolina Enclave for Secure Research.State of South Carolina Data Protection and Privacy Policy.
