CIS Security Controls V8
Starter Policies

The CIS (Center for Internet Security) Security Controls are a comprehensive set of prioritized best practices and guidelines developed by a global community of cybersecurity experts to help organizations improve their security posture and protect against cyber threats. By focusing on the most critical and practical security actions, the controls enable organizations to reduce risk, allocate resources efficiently, and comply with various regulations and standards. The flexibility and industry-wide acceptance of CIS Controls make them an attractive choice for organizations of different types and sizes looking to strengthen their cybersecurity defenses cost-effectively.
$200.00
CIS set includes all 3 levels (IG1, IG2, IG3)
CIS CSC v8 (IG1) (42 pages combined)
CIS CSC V8 Implementation Guide.docx
CIS CSC v8 Access Control Management Policy (IG1).docx
CIS CSC v8 Account Management Policy (IG1).docx
CIS CSC v8 Audit Log Management Policy (IG1).docx
CIS CSC v8 Data Protection Policy (IG1).docx
CIS CSC v8 Data Recovery Policy (IG1).docx
CIS CSC v8 Email, Web Browser and Protection Policy (IG1).docx
CIS CSC v8 Incident Response Management Policy (IG1).docx
CIS CSC v8 Inventory and Control of Enterprise Assets Policy (IG1).docx
CIS CSC v8 Inventory and Control of Software Assets Policy (IG1).docx
CIS CSC v8 Malware Defense Policy (IG1).docx
CIS CSC v8 Network Infrastructure Management Policy (IG1).docx
CIS CSC v8 Secure Configuration of Enterprise Assets and Software Policy (IG1).docx
CIS CSC v8 Security Awareness and Skills Training Policy (IG1).docx
CIS CSC v8 Service Provider Management Policy (IG1).docx

CIS CSC v8 (IG2) (63 pages combined)
CIS CSC V8 Implementation Guide.docx
CIS CSC v8 Access Control Management Policy (IG2).docx
CIS CSC v8 Account Management Policy (IG2).docx
CIS CSC v8 Application Software Security Policy (IG2).docx
CIS CSC v8 Audit Log Management Policy (IG2).docx
CIS CSC v8 Continuous Vulnerability Management Policy (IG2).docx
CIS CSC v8 Data Protection Policy (IG2).docx
CIS CSC v8 Data Recovery Policy (IG2).docx
CIS CSC v8 Email, Web Browser and Protection Policy (IG2).docx
CIS CSC v8 Incident Response Management Policy (IG2).docx
CIS CSC v8 Inventory and Control of Enterprise Assets Policy (IG2).docx
CIS CSC v8 Inventory and Control of Software Assets Policy (IG2).docx
CIS CSC v8 Malware Defense Policy (IG2).docx
CIS CSC v8 Network Infrastructure Management Policy (IG2).docx
CIS CSC v8 Network Monitoring and Defense Policy (IG2).docx
CIS CSC v8 Penetration Testing Policy (IG2).docx
CIS CSC v8 Secure Configuration of Enterprise Assets and Software Policy (IG2).docx
CIS CSC v8 Security Awareness and Skills Training Policy (IG2).docx
CIS CSC v8 Service Provider Management Policy (IG2).docx

CIS CSC v8 (IG3) (67 pages combined)
CIS CSC V8 Implementation Guide.docx
CIS CSC v8 Access Control Management Policy (IG3).docx
CIS CSC v8 Account Management Policy (IG3).docx
CIS CSC v8 Application Software Security Policy (IG3).docx
CIS CSC v8 Audit Log Management Policy (IG3).docx
CIS CSC v8 Continuous Vulnerability Management Policy (IG3).docx
CIS CSC v8 Data Protection Policy (IG3).docx
CIS CSC v8 Data Recovery Policy (IG3).docx
CIS CSC v8 Email, Web Browser and Protection Policy (IG3).docx
CIS CSC v8 Incident Response Management Policy (IG3).docx
CIS CSC v8 Inventory and Control of Enterprise Assets Policy (IG3).docx
CIS CSC v8 Inventory and Control of Software Assets Policy (IG3).docx
CIS CSC v8 Malware Defense Policy (IG3).docx
CIS CSC v8 Network Infrastructure Management Policy (IG3).docx
CIS CSC v8 Network Monitoring and Defense Policy (IG3).docx
CIS CSC v8 Penetration Testing Policy (IG3).docx
CIS CSC v8 Secure Configuration of Enterprise Assets and Software Policy (IG3).docx
CIS CSC v8 Security Awareness and Skills Training Policy (IG3).docx
CIS CSC v8 Service Provider Management Policy (IG3).docx
Product License Agreement.docx
Terms of Service for Information Security Policy Starters.docx

Need more info? Check out our FAQ or contact us.