CIS Configuration Benchmarks
CIS Benchmarks are objective, consensus-driven guidelines for secure system configurations developed by a community of cybersecurity experts.
CIS Benchmarks are objective, consensus-driven guidelines for secure system configurations developed by a community of cybersecurity experts.
CIS Controls v8 includes 18 key security practices that help organizations build resilience against the most prevalent cyber threats.
It's always nice when you discover a great new resource when you least expect it. I found these cheat sheets when I was adding the OWASP Top 10 to MCR.…
If you’re interested in cybersecurity, you may have heard of the OWASP Top 10. This is a list of the most critical web application security risks, which is updated every…
In the world of cybersecurity, knowledge is power. Whether you’re an aspiring security professional or simply interested in learning more about cybersecurity, there are many resources available to help you…
Version 2.0 – July 2022 In September 2022, the Department of Defense (DoD) released version 2.0 of its Zero Trust Reference Architecture (ZTRA). The document outlines a set of principles…
If you want a single slide deck that will provide you a great baseline to most elements of a modern security organization, view the slides in this CISO workshop. There…
The Azure Well-Architected Framework provides a set of best practices for building and running secure, scalable, and efficient cloud infrastructure on Azure. The framework is divided into five pillars, one…
The Security Pillar of the AWS Well-Architected Framework is a set of best practices for building and operating secure and compliant systems on the AWS cloud platform. It provides a…
AWS Security Reference Architecture is a collection of security best practices, architectural patterns, and recommended designs for securing cloud-based workloads. It is an extensive guide that provides organizations with a…