gptkbp:instanceOf
|
crypt
|
gptkbp:appliesTo
|
operating systems
databases
network devices
applications
cloud providers
|
gptkbp:availableOn
|
cisecurity.org
|
gptkbp:category
|
cybersecurity
risk management
compliance
IT security
|
gptkbp:compatibleWith
|
gptkb:HIPAA
gptkb:PCI_DSS
gptkb:FISMA
gptkb:GDPR
|
gptkbp:developedBy
|
gptkb:Center_for_Internet_Security
|
gptkbp:example
|
gptkb:CIS_Amazon_Web_Services_Foundations_Benchmark
gptkb:CIS_Cisco_IOS_Benchmark
gptkb:CIS_Docker_Benchmark
gptkb:CIS_Microsoft_Windows_10_Benchmark
gptkb:CIS_Oracle_Database_Benchmark
|
gptkbp:firstPublished
|
2008
|
gptkbp:format
|
gptkb:dictionary
gptkb:Excel
PDF
|
https://www.w3.org/2000/01/rdf-schema#label
|
CIS Benchmarks
|
gptkbp:license
|
free for non-commercial use
|
gptkbp:numberOfBenchmarks
|
over 100
|
gptkbp:purpose
|
improve cybersecurity posture
provide configuration guidelines
|
gptkbp:relatedTo
|
gptkb:NIST_standards
gptkb:ISO_27001
gptkb:CIS_Controls
|
gptkbp:reviewedBy
|
industry professionals
subject matter experts
|
gptkbp:supports
|
regulatory requirements
compliance frameworks
|
gptkbp:type
|
best practices
configuration guidelines
|
gptkbp:updated
|
gptkb:CIS_community
|
gptkbp:usedBy
|
IT professionals
system administrators
compliance teams
security auditors
|
gptkbp:usedFor
|
gptkb:security
policy development
configuration management
audit preparation
system hardening
|
gptkbp:bfsParent
|
gptkb:Amazon_Inspector
|
gptkbp:bfsLayer
|
5
|