Center for Internet Security, Inc. (CIS) Solutions for the Public Sector

For more information on these products, please view the resources in the tab above.

  • CIS Hardened Images®

    Trusted worldwide by security-conscious organizations, CIS Hardened Images® provide pre-configured virtual machine (VM) images built to the globally recognized CIS Benchmarks™. 

    Available in major cloud marketplaces, CIS Hardened Images simplify the challenge of configuring secure operating systems and applications. These images deliver a secure foundation for cloud workloads—helping government, education, and enterprise organizations reduce risk while accelerating time to deployment.

    Why Organizations Choose CIS Hardened Images: 

    • Secure by Default – Built to align with CIS Benchmarks™, trusted globally and mapped to key compliance frameworks including NIST, HIPAA, PCI DSS, and FedRAMP.
    • Accelerated Deployments – Launch secure virtual machines in minutes with pre-hardened images, eliminating the need for manual configuration and saving valuable time.
    • Continuously Maintained – Updated regularly by CIS to address emerging vulnerabilities and evolving threat landscapes.
    • Cloud-Agnostic Availability – Available across major cloud platforms including AWS, Azure, Google Cloud, and Oracle Cloud.
    • Compliance-Ready – Supports faster alignment with regulatory requirements and internal security policies through standardized, benchmark-based configurations. Why It Matters: Even the most skilled teams face challenges with consistency, time, and evolving threats. Building secure images in-house requires ongoing patching, testing, and validation — tasks that can consume resources and introduce human error. CIS Hardened Images remove that uncertainty and provide a trusted, expert-built baseline of configurations with every deployment.    With CIS Hardened Images, organizations strengthen defenses, meet compliance requirements faster, and simplify secure cloud deployments.
  • Albert Network Monitoring and Management
    • Cost-effective intrusion detection system (IDS) providing automated alerting on both traditional and advanced network threats
    • In-depth review of alerts conducted by expert analysts through CIS’s 24x7x365 Security Operations Center (SOC)
    • Consolidated, actionable insights and monthly reporting from expert analysts with industry-leading response times.
    • Unique SLTT-focused and targeted signature set
    • Turnkey solution incorporating 24x7x365 monitoring and management
    • Available for both on-premises and cloud environments (AWS and Azure)
  • CIS Managed Detection and Response™ (CIS MDR)
    • Fully managed, premium endpoint security solution as a service that includes: 
      • Next Generation Antivirus (NGAV)
      • Endpoint Detection and Response (EDR)
      • USB device monitoring
      • Host-based firewall management
      • Advanced Capabilities in GovCloud includes:
        • Asset and application inventory
        • User account monitoring
      • Advanced Capabilities in commercial cloud includes:
        • Application allowlisting and blocklisting
        • Advanced ransomware protection
        • Data loss prevention
    • Device-level protection and response is available in both GovCloud (powered by CrowdStrike) and commercial cloud (powered by Sophos) with value-added support and service from CIS.
    • Deployed on endpoint devices to identify, detect, respond to, and remediate security incidents and alerts
    • 24x7x365 monitoring and management by CIS Security Operations Center (SOC), providing expert human analysis of malicious activity and escalating actionable threats
    • Incident response and remote digital forensics support provided by CIS Cyber Incident Response Team (CIRT)
  • Managed Security Services
    • Cost-effective log and security event monitoring of devices for malicious or anomalous activity including, but not limited to, IDS/IPS, firewalls, switches and routers, servers, endpoints, and web proxies
    • Event analysis performed by expert human analysts in the 24x7x365 CIS SOC using the largest cyber threat database specifically for SLTTs
    • Analysts eliminate false positives, escalate actionable items to organizations, provide support regarding alerts or notifications received, and deliver comprehensive monthly activity reports
    • Users gain visibility into security events, log data, and on-demand reporting through an online portal powered by Accenture
  • Penetration Testing
    • Network and web application penetration testing utilizing both automated tools and manual techniques
    • Identification and exploitation of vulnerabilities through a simulated real-world cyber-attack for risk assignment
    • In-depth reporting on vulnerabilities, risk, impact, location, recommendations, and references to mitigate in your environment
  • Vulnerability Assessments
    • Both network and web application vulnerability assessments available.
    • Cost-effective solution to proactively identify and remediate potential attack vectors
    • Assessments include network or application discovery and mapping, asset prioritization, manual vulnerability verification, vulnerability assessment reporting, remediation tracking according to business risk, and remediation support
    • Available as either single or regularly recurring (quarterly or monthly) assessments
  • Phishing Engagements
    • Leverage technical and socio-psychological techniques to diagnose end user awareness
    • Craft unique and customized phishing email content, links and attachments, landing pages, forms to capture user credentials, and personalized content for each target user
    • Extensive report detailing assessment’s goals, theory, attack method, concluded results, statistics, campaign effectiveness and conclusions, and recommendations
  • CIS SecureSuite® Membership
    • Trusted by over 2,500 organizations worldwide, CIS SecureSuite® Membership delivers integrated, battle-tested cybersecurity resources that empower businesses, nonprofits, government agencies, and IT professionals to start secure and stay secure.
    • Members gain exclusive access to advanced tools and expert-driven content designed to accelerate the adoption of security best practices — from policy development to hands-on implementation.  Why Organizations Choose CIS SecureSuite® Membership
    • Comprehensive Security Resources: 
    • CIS Benchmarks™: Access 100+ consensus-developed secure configuration guidelines in multiple formats, covering 25+ major vendor product families. These proven benchmarks harden operating systems, servers, cloud platforms, and more.
    • CIS-CAT® Pro: Automatically assess system configurations against CIS Benchmarks and track compliance over time, ensuring continuous alignment with best practices.
    • CIS Build Kits™: Deploy ready-to-use automated scripts and templates to remediate vulnerabilities at scale and enforce benchmark recommendations consistently across your environment.
    • CIS CSAT® Pro: Measure and manage your organization’s implementation of the CIS Critical Security Controls®, with tools for tracking progress and identifying gaps.
    • CIS WorkBench: Collaborate with a global community of security practitioners, customize benchmark recommendations to fit your policies, and gain streamlined access to all member resources.  Recognized Industry Standards 
    • CIS Benchmarks™ are recognized worldwide as the gold standard for secure configuration, supporting compliance with PCI DSS, DoD STIGs, FISMA, FedRAMP, and more.
    • CIS Critical Security Controls® (CIS Controls) provide a clear, prioritized roadmap for reducing risk and aligning with frameworks such as NIST, CMMC, HIPAA, and PCI DSS.  The Secure Advantage with CIS SecureSuite® Membership: 
    • Strengthen defenses against evolving cyber threats.
    • Accelerate compliance with key regulatory and industry requirements.
    • Reduce complexity by unifying trusted tools, proven frameworks, and a global community of experts.
    • Scale security efficiently across diverse IT environments.
  • Malicious Domain Blocking and Reporting Plus (MDBR+)
    • MDBR+ is a quick-to-configure and easy-to-deploy cloud-based protective domain name system (PDNS) service that's available to U.S. State, Local, Tribal and Territorial (SLTT) government organizations and private hospitals. 
    • Cloud-based Management Portal: Offers security teams full access to a cloud-based management portal, enabling management and custom configuration from any location at any time. 
    • Enhanced Reporting and Visibility: Gives you instant access to real-time reports on blocked activity for every user on your network, allowing for more informed security decisions. 
    • Custom Configurations: Puts your organization in the driver's seat of your own web security with the ability to create AUPs, allow/deny lists, and error pages tailored to your unique security needs. 
    • Off-network Protection: Even your off-network devices can be protected with the secure PDNS service through an easy-to-deploy lightweight client that can be installed on your organization's devices to protect laptops or mobile devices wherever they connect to the internet.