CIS Benchmarks

Step-by-step configuration guides that tell you exactly how to set up your systems securely — down to the specific settings to change.

What are CIS Benchmarks?

CIS Benchmarks are free, detailed configuration guides published by the Center for Internet Security (CIS), a nonprofit organization. Unlike broader frameworks that tell you what to do ("implement access controls"), CIS Benchmarks tell you exactly how to do it ("set this specific Windows registry key to this value").

There are benchmarks for almost every technology you use — Windows, macOS, Linux, routers, firewalls, cloud platforms, databases, web servers, and more. Each one is a checklist of hundreds of settings that should be configured a certain way to be secure.

Think of it this way

When you buy a new car, the owner's manual tells you the correct tire pressure, the right oil type, and how often to service it. You don't have to figure it out yourself — the manufacturer already knows the optimal settings. CIS Benchmarks are the owner's manual for your IT systems. They tell you exactly how every setting should be configured for maximum security.

Why Do Default Settings Need Changing?

When you install an operating system or set up a router, the default settings are designed for convenience, not security. Manufacturers want their products to work out of the box with minimal hassle. That means:

CIS Benchmarks go through each of these defaults and tell you which ones to change and what to change them to.

What Do Benchmarks Cover?

There are benchmarks for almost everything in your environment:

Operating Systems

Windows 10/11, Windows Server, macOS, Ubuntu, Red Hat, Debian — each has its own benchmark with hundreds of configuration checks specific to that OS.

Network Equipment

Cisco routers and switches, Palo Alto firewalls, Juniper, Fortinet — benchmarks cover management access, routing protocols, access control lists, and logging.

Cloud Platforms

AWS, Azure, Google Cloud — benchmarks cover IAM policies, storage permissions, network security groups, logging, and encryption settings.

Applications

Microsoft 365, Google Workspace, web browsers, databases (SQL Server, PostgreSQL, MySQL) — each has configuration settings that affect security.

Level 1 vs. Level 2

Most CIS Benchmarks have two levels:

Most businesses start with Level 1 and move to Level 2 as needed.

What We Do With CIS Benchmarks

How Hardened Are Your Systems?

Schedule a free consultation and we'll discuss which CIS Benchmarks apply to your environment.

Schedule Free Assessment →