Recent from talks
Nothing was collected or created yet.
Center for Internet Security
View on Wikipedia
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these messages)
|
The Center for Internet Security (CIS) is a US 501(c)(3) nonprofit organization,[2] formed in October 2000.[1] Its mission statement professes that the function of CIS is to " help people, businesses, and governments protect themselves against pervasive cyber threats."
Key Information
The organization is headquartered in East Greenbush, New York, US, with members including large corporations, government agencies, and academic institutions.[1]
History and Governance
[edit]CIS began as a volunteer-based initiative to create actionable, consensus based security configuration benchmarks aimed at helping organizations of all sizes decrease cyber risk. Over time, CIS evolved into a significant entity in cybersecurity coordination at the national level. In 2003, it collaborated with the SANS Institute to establish the CIS Controls, a ranked collection of best practices aimed at protecting against prevalent cyber threats. The organization also established a Center (MS-ISAC), a federally supported organization to assist U.S state, local, tribal, and territorial (SLTT) governments in identifying addressing, and averting cyber incidents. CIS became registered as a 501(c)(3) nonprofit organization located in East Greenbush, New York, with an additional office in Washington, D.C. The governance of CIS consists of a Board of Directors featuring cybersecurity experts various industries. The board offers strategic guidance, while daily operations are overseen by a Chief Executive Office and an executive team. As of 2025[update], John Gilligan is President and CEO of CIS, and he has emphasized the significance of strengthening collaboration with DHS, CISA, and other global cybersecurity entities.
Program areas
[edit]CIS has several program areas, including MS-ISAC, CIS Controls, CIS Benchmarks, CIS Communities, and CIS CyberMarket. Through these program areas, CIS works with a wide range of entities, including those in academia, the government, and both the private sector and the general public to increase their online security by providing them with products and services that improve security efficiency and effectiveness.[5][6]
Multi-State Information Sharing and Analysis Center (MS-ISAC)
[edit]The Multi-State Information Sharing and Analysis Center (MS-ISAC) is a "round-the-clock cyber threat monitoring and mitigation center for state and local governments" operated by CIS under a cooperative agreement with the U.S. Department of Homeland Security[7] (DHS), Cybersecurity and Infrastructure Security Agency[8] (CISA).[9] The MS-ISAC was established in late 2002, and officially launched in January 2003, by William F. Pelgrin, then Chief Security Officer of the state of New York.[10] Beginning from a small group of participating states in the Northeast, MS-ISAC came to include all 50 U.S. States and the District of Columbia, as well as U.S. State, Local, Tribal, and Territorial (SLTT) governments. In order to facilitate its expanding scope, in late 2010, MS-ISAC "transitioned into a not-for-profit status under the auspices of the Center for Internet Security."[10][11] In March 2025, CISA ended funding for MC-ISAC.[12]
MS-ISAC "helps government agencies combat cyberthreats and works closely with federal law enforcement",[13][14] and is designated by DHS as a key cyber security resource for the nation's SLTT governments.
The main objectives of MS-ISAC are described as follows:[15]
- provide two-way sharing of information and early warnings on cyber security threats
- provide a process for gathering and disseminating information on cyber security incidents
- promote awareness of the interdependencies between cyber and physical critical infrastructure as well as between and among the different sectors
- coordinate training and awareness
- ensure that all necessary parties are vested partners in this effort
The MS-ISAC offers a variety of federally funded, no-cost, cybersecurity products and services to its members through the DHS CISA cooperative agreement. It also offers fee-based products and services for SLTT members who want additional protection in addition to what is offered under the cooperative agreement. In 2021, the MS-ISAC announced[16] it was undergoing a digital transformation, making major infrastructure upgrades including the implementation of a new cloud-based threat intelligence platform, security information and event management (SIEM) capability, security orchestration, automation, and response (SOAR) tool, and data lake capabilities for threat hunting.
Some of the offerings for SLTTs include:
- A Domain Name Service (DNS) security capability is provided to all SLTTs at no cost known as Malicious Domain Blocking and Reporting[17] (MDBR). The MS-ISAC partnered with Akamai to protect organizations against a variety of cyberattacks such as phishing and ransomware
- Albert[18] - the MS-ISAC custom-built Intrusion Detection System (IDS)
- Cyber Threat Intelligence[19] (CTI), including bi-direction indicator feeds via STIX/TAXII. The MS-ISAC has feeds from over 200 sources, including real-time attacks against SLTTs.[20]
- A 24x7x365 Security Operations Center (SOC) that performs network and endpoint monitoring
- Vulnerability management and scanning
- Incident response and digital forensics
Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC)
[edit]The Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC), as established by the Election Infrastructure Subsector Government Coordinating Council (GCC), is a critical resource for cyber threat prevention, protection, response and recovery for the nation's state, local, territorial, and tribal (SLTT) election offices. The EI-ISAC is operated by the Center for Internet Security, Inc. under the same cooperative agreement with DHS CISA as the MS-ISAC. By nature of election offices being SLTT organizations, each EI-ISAC member is automatically an MS-ISAC member and can take full advantage of the products and services provided to both ISACs.
The mission of the EI-ISAC is to improve the overall cybersecurity posture of SLTT election offices, through collaboration and information sharing among members, the U.S. Department of Homeland Security (DHS) and other federal partners, and private sector partners are the keys to success. The EI-ISAC provides a central resource for gathering information on cyber threats to election infrastructure and two-way sharing of information between and among public and private sectors in order to identify, protect, detect, respond and recover from attacks on public and private election infrastructure. And the EI-ISAC comprises representatives from SLTT election offices and contractors supporting SLTT election infrastructure.[21]
CIS Controls and CIS Benchmarks
[edit]Formerly known as the SANS Critical Security Controls (SANS Top 20) and the CIS Critical Security Controls, the CIS Controls as they are called today is a set of 18 prioritized safeguards to mitigate the most prevalent cyber-attacks against today's modern systems and networks. The CIS Controls are grouped into Implementation Groups[22] (IGs), which allow organizations to use a risk assessment in order to determine the appropriate level of IG (one through three) that should be implemented for their organization. The CIS Controls can be downloaded from CIS, as can various mappings to other frameworks such as the National Institute of Standards and Technology (NIST) Cybersecurity Framework[23] (CSF), NIST Special Publication (SP) 800-53,[24] and many others. CIS also offers a free hosted software product called the CIS Controls Assessment Tool[25] (CIS-CAT) that allows organizations to track and prioritize the implementation of the CIS Controls.
The CIS Controls advocate "a defense-in-depth model to help prevent and detect malware".[26] A May 2017 study showed that "on average, organizations fail 55% of compliance checks established by the Center for Internet Security", with more than half of these violations being high severity issues.[27] In March 2015, CIS launched CIS Hardened Images for Amazon Web Services, in response to "a growing concern surrounding the data safety of information housed on virtual servers in the cloud".[28] The resources were made available as Amazon Machine Images, for six "CIS benchmarks-hardened systems", including Microsoft Windows, Linux and Ubuntu, with additional images and cloud providers added later.[28] CIS released Companion Guides to CIS Controls, recommendations for actions to counter cybersecurity attacks, with new guides having been released in October and December 2015.[29] In April 2018, CIS launched an information security risk assessment method to implement CIS Controls, called CIS RAM which is based upon the risk assessment standard by the DoCRA (Duty of Care Risk Analysis) Council.[30] Version of CIS RAM v2.0[31] was released October 2021.[32] CIS RAM v2.1 was released in 2022.
CIS Benchmarks are a collaboration of the Consensus Community and CIS SecureSuite members (a class of CIS members with access to additional sets of tools and resources).[33] The Consensus Community is made up of experts in the field of IT security who use their knowledge and experience to help the global Internet community. CIS SecureSuite members are made up of several different types of companies ranging in size, including government agencies, colleges and universities, nonprofits, IT auditors and consultants, security software vendors and other organizations. CIS Benchmarks and other tools that CIS provides at no cost allow IT workers to create reports that compare their system security to universal consensus standard. This fosters a new structure for internet security that everyone is accountable for and that is shared by top executives, technology professionals and other internet users throughout the globe. Further, CIS provides internet security tools with a scoring feature that rates the configuration security of the system at hand. For example, CIS provides SecureSuite members with access to CIS-CAT Pro, a "cross-platform Java app" which scans target systems and "produces a report comparing your settings to the published benchmarks".[5] This is intended to encourage and motivate users to improve the scores given by the software, which bolsters the security of their internet and systems. The universal consensus standard that CIS employs draws upon and uses the accumulated knowledge of skillful technology professionals. Since internet security professionals volunteer in contributing to this consensus, this reduces costs for CIS and makes it cost effective.[34]
CIS CyberMarket
[edit]CIS CyberMarket is a "collaborative purchasing program that serves U.S. State, Local, Tribal, and Territorial (SLTT) government organizations, nonprofit entities, and public health and education institutions to improve cybersecurity through cost-effective group procurement".[35] The intent of the CIS CyberMarket is to combine the purchasing power of governmental and nonprofit sectors to help participants improve their cybersecurity condition at a lower cost than they would have been able to attain on their own. The program assists with the "time intensive, costly, complex, and daunting" task of maintaining cybersecurity by working with the public and private sectors to bring their partners cost-effective tools and services. The combined purchasing opportunities are reviewed by domain experts.[15]
There are three main objectives of the CIS CyberMarket:
- to contribute a trusted environment to improve the condition of the cybersecurity of the previously mentioned entities
- to lower the cost of cybersecurity needs
- to work with companies to bring services and security products to their partners[15]
CIS CyberMarket, like the MS-ISAC, serves government entities and non-profits in achieving greater cyber security. On its "resources" page, multiple newsletters and documents are available free of charge, including the "Cybersecurity Handbook for Cities and Counties".[36]
CIS Communities
[edit]CIS Communities are "a volunteer, global community of IT professionals" who "continuously refine and verify" CIS best practices and cybersecurity tools.[37] To develop and structure its benchmarks, CIS uses a strategy in which members of the organization first form into teams. These teams then each collect suggestions, advice, official work and recommendations from a few participating organizations. Then, the teams analyze their data and information to determine what the most vital configuration settings are that would improve internet system security the most in as many work settings as possible. Each member of a team constantly works with their teammates and critically analyzes and critiques a rough draft until a consensus forms among the team. Before the benchmark is released to the general public, they are available for download and testing among the community. After reviewing all of the feedback from testing and making any necessary adjustments or changes, the final benchmark and other relevant security tools are made available to the public for download through the CIS website. This process is so extensive and so carefully executed that thousands of security professionals across the globe participate in it. According to ISACA, "during the development of the CIS Benchmark for Sun Microsystems Solaris, more than 2,500 users downloaded the benchmark and monitoring tools."[38]
Participating organizations
[edit]The organizations that participated in the founding of CIS in October 2000 include ISACA, the American Institute of Certified Public Accountants (AICPA), the Institute of Internal Auditors (IIA), the International Information Systems Security Certification Consortium (ISC2) and the SANS Institute (System Administration, Networking and Security). CIS has since grown to have hundreds of members with varying degrees of membership and cooperates and works with a variety of organizations and members at both the national and international levels. Some of these organizations include those in both the public and private sectors, government, ISACs and law enforcement.[1]
References
[edit]- ^ a b c d e Kreitner, Clint; Miuccio, Bert. "The Center for Internet Security: Global Security Benchmarks for Computers Connected to the Internet". Information Systems Audit and Control Association (ISACA). Archived from the original on 12 March 2014. Retrieved 25 July 2017.
- ^ a b Rulison, Larry (9 November 2016). "E. Greenbush group monitored election for hackers". Albany Times Union.
- ^ Ackerman, Robert K.; Pendleton, Breann (28 June 2017). "More Than Just Your Regular Cyberthreats". Afcea International. Signal.
- ^ "John M. Gilligan". Center for Internet Security. Retrieved 25 July 2017.
- ^ a b "Information Security and Policy: About The Center for Internet Security". University of California, Berkeley. Retrieved 25 July 2017.
- ^ "CIS Security Benchmarks Tools". George Mason University. Retrieved 25 July 2017.
- ^ "Home". dhs.gov.
- ^ "Home". cisa.gov.
- ^ "Partnership Engagement Branch | CISA". www.cisa.gov. Retrieved 13 July 2021.
- ^ a b Lohrmann, Dan (30 May 2015). "Interview with Retiring MS-ISAC Founder Will Pelgrin and Incoming CIS CEO Jane Lute". Government Technology.
- ^ "Multi-State Information Sharing and Analysis Center". Center for Internet Security. Retrieved 21 March 2014.
- ^ Cassidy, Christina (10 March 2025). "Trump administration halts funding for two cybersecurity efforts, including one for elections". Retrieved 12 March 2025.
- ^ Nakashima, Ellen (29 August 2016). "Russian hackers targeted Arizona election system". The Washington Post.
- ^ Robert M. Clark and; Simon Hakim (11 August 2016). Cyber-Physical Security | Protecting Critical Infrastructure at the State, Provincial, and Local Level: Issues in Cyber-Physical Security. Springer. p. 11. ISBN 9783319328249.
- ^ a b c "Center for Internet Security". Center for Internet Security. Retrieved 25 July 2017.
- ^ "Cybersecurity Quarterly (Summer 2021)". Issuu. 29 June 2021. Retrieved 13 July 2021.
- ^ "Blog | Malicious Domain Blocking and Reporting (MDBR) Newest Service for U.S. SLTTS". 2 September 2020.
- ^ "Albert Network Monitoring".
- ^ "Blog | A New Vision for Cyber Threat Intelligence at the MS-ISAC". 25 June 2021.
- ^ "Blog | A New Vision for Cyber Threat Intelligence at the MS-ISAC". CIS. 25 June 2021. Retrieved 13 July 2021.
- ^ "EI-ISAC Charter". CIS. Retrieved 2 April 2023.
- ^ Implementation Groups Handout
- ^ "CIS Controls v8 Mapping to NIST CSF".
- ^ "CIS Controls v8 Mapping to NIST SP 800-53 R5".
- ^ "CIS Controls Self Assessment Tool (CIS CSAT)".
- ^ Shelton, Debbie (December 2016). "A winning pair: governance and automated controls must work in tandem to achieve maximum results". Internal Auditor.
- ^ Seals, Tara (26 May 2017). "Cloud Environments Suffer Widespread Lack of Security Best Practices". Infosecurity Magazine.
- ^ a b Seals, Tara (25 March 2015). "Center for Internet Security Aims at AWS". Infosecurity Magazine.
- ^ Seals, Tara (23 December 2015). "Center for Internet Security Releases Companion Guides". Infosecurity Magazine.
- ^ "CIS RAM FAQ". CIS® (Center for Internet Security, Inc.) website.
- ^ "Blog | CIS Risk Assessment Method (RAM) v2.0 for CIS Controls v8". 28 October 2021.
- ^ "CIS Risk Assessment Method (RAM) v2.0 for CIS Controls v8". October 2021. Archived from the original on 29 October 2021.
- ^ "CIS SecureSuite Membership". Retrieved 25 July 2016.
- ^ "Center for Internet Security Takes Leading Role in Industry Efforts to Enhance Security Automation". Business Wire. 12 September 2013.
- ^ "CIS CyberMarket". Retrieved 25 July 2017.
- ^ "Welcome to the MS-ISAC". Center for Internet Security. Retrieved 25 July 2017.
- ^ "CIS Communities". Retrieved 29 July 2017.
- ^ "ISACA: Serving IT Governance Professionals". Archived from the original on 2 March 2013. Retrieved 7 March 2014.
External links
[edit]Center for Internet Security
View on GrokipediaThe Center for Internet Security (CIS) is a nonprofit organization founded in 2000 by cybersecurity experts from government agencies, private sector firms, and security institutions to address escalating cyber threats amid rapid internet expansion.[1] It focuses on developing and promoting consensus-based best practices for securing IT systems and data, including the globally recognized CIS Controls—a prioritized set of actions for cyber defense—and CIS Benchmarks, configuration guidelines for hardening systems against attacks.[2] These resources, derived from real-world incident data and expert collaboration, are utilized by thousands of organizations to prioritize defenses yielding the highest risk reduction.[3] CIS operates the Multi-State Information Sharing and Analysis Center (MS-ISAC), a division providing real-time threat intelligence, incident response, and cybersecurity services tailored to U.S. state, local, tribal, and territorial governments, often in partnership with federal entities like CISA.[4] The organization sustains itself through direct sales of products like CIS SecureSuite and Hardened Images for cloud environments, alongside government grants and a cost-sharing model, enabling accessible protections for resource-constrained entities.[2] Over 25 years, CIS has evolved from initial threat mitigation efforts to a leading provider of scalable tools and standards, including initiatives like the Secure Cyber City pilot for community-wide resilience, emphasizing practical, empirical defenses over theoretical measures.[1] While praised for its actionable, data-informed frameworks that outperform broader standards in efficiency for many users, CIS offerings have drawn critique for potentially disrupting systems if implemented rigidly without customization and for limited free automation tools.[5] Recent federal funding reductions to MS-ISAC under the 2025 Trump administration have prompted concerns over sustained support for state-level defenses, though CIS maintains operational independence.[6]
History
Founding and Early Development (2000–2010)
The Center for Internet Security (CIS) was formally established in October 2000 as a 501(c)(3) nonprofit organization, emerging from collaborative efforts among cybersecurity experts from government agencies, private industry, and security institutions to counter escalating internet-based threats. A pivotal planning meeting took place on August 22, 2000, at the Cosmos Club in Washington, D.C., where participants identified the need for standardized, consensus-based security practices accessible to organizations lacking extensive resources. The founding group's objective centered on producing practical benchmarks and guidelines to mitigate vulnerabilities in common IT systems, drawing on shared expertise rather than proprietary solutions.[7][1] To lead the nascent organization, founders recruited Clint Kreitner from retirement as its first CEO, leveraging his prior experience in federal IT security roles. Under Kreitner's direction, CIS rapidly prioritized the development of configuration benchmarks, releasing the inaugural Consensus Security Benchmark for Windows 2000 in 2002 through partnerships with the National Security Agency (NSA), Defense Information Systems Agency (DISA), Federal Bureau of Investigation (FBI), and SANS Institute. These early benchmarks provided prioritized, testable recommendations for securing operating systems and applications, emphasizing inventory, access controls, and patching to address prevalent attack vectors observed in real-world incidents. By mid-decade, CIS had cultivated a volunteer-driven model, expanding benchmarks to Unix-like systems, routers, and databases, with over 100 contributors refining guidelines via iterative community review.[8][7][9] In 2008, amid growing concerns over data breaches in the U.S. defense industrial base, CIS participated in formulating the initial Critical Security Controls—originally the SANS Top 20—a prioritized list of 20 defensive measures derived from attacker tactics and empirical breach analyses. This framework complemented the benchmarks by shifting focus from isolated configurations to integrated defenses like continuous monitoring and incident response. Kreitner retired as CEO that September, transitioning to a strategic advisory role while the board installed a new executive team, including a chief technology officer and chief security officer, to scale benchmark dissemination and automation tools. By 2010, CIS had solidified its reputation for vendor-neutral standards, with benchmarks adopted by thousands of organizations; that year, it absorbed the Multi-State Information Sharing and Analysis Center (MS-ISAC), a pre-existing regional threat-sharing cooperative originally formed in 2003, thereby extending its scope to real-time intelligence for state and local governments.[10][11][12]Growth and Program Expansion (2011–2023)
In 2015, the Center for Internet Security assumed stewardship of the CIS Critical Security Controls from the Council of Cybersecurity, releasing Version 6 and achieving over 100,000 downloads that year, which marked a significant expansion in the organization's influence on global cybersecurity practices.[7] This transition integrated the controls into CIS's core offerings, emphasizing prioritized, actionable safeguards derived from real-world threat data. Subsequent updates included Version 7 in 2018, refining implementation guidance, and Version 8 in 2021, which restructured the controls into 18 prioritized groups to address evolving threats like supply chain risks and mobile device security.[10] [13] These iterations drove broader adoption, with thousands of organizations worldwide implementing the controls to reduce vulnerability exposure.[1] Parallel to controls development, the Multi-State Information Sharing and Analysis Center (MS-ISAC), operated by CIS since its inception, experienced rapid membership growth among state, local, tribal, and territorial governments, expanding from approximately 1,000 members in 2013 to 10,000 by November 2020 and surpassing 16,000 by 2023.[14] [15] This surge reflected increased demand for MS-ISAC's services, including 24/7 security operations center monitoring, threat intelligence sharing, and incident response support, funded primarily through federal partnerships with the Department of Homeland Security.[16] In 2017, amid heightened concerns over election interference following 2016 events, CIS launched the Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC) to provide specialized cybersecurity resources for election officials, marking its inaugural full operational year in 2018 with focused threat briefings and coordination among subsector stakeholders.[17] EI-ISAC membership grew to encompass all 50 states and numerous local entities by the early 2020s, enhancing resilience against targeted disruptions.[18] CIS further expanded its benchmarks program during this period, publishing hundreds of configuration guidelines for systems like cloud platforms and operating systems, which saw widespread use in government and enterprise hardening efforts.[1] Organizational growth included staff increases to support scaled operations, with the nonprofit adding over 100 employees in 2023 alone amid rising demand for training and assessment tools.[15] These developments solidified CIS's role in bridging public-sector needs with private-sector expertise, though reliance on federal cooperative agreements underscored dependencies on sustained government funding for ISAC scalability.[19]Recent Transitions and Challenges (2024–Present)
In September 2025, the Cybersecurity and Infrastructure Security Agency (CISA) terminated its long-standing agreement with the Center for Internet Security (CIS) to operate the Multi-State Information Sharing and Analysis Center (MS-ISAC), citing a shift toward providing direct cybersecurity support, tools, and grant funding to state, local, tribal, and territorial (SLTT) entities.[20][21] This decision, aligned with the Trump administration's emphasis on a "new model" for local government cyber strategy, prompted CIS to implement a fee-based membership structure for MS-ISAC effective June 23, 2025, potentially resulting in the loss of two-thirds of its state and territorial members due to budget constraints at the SLTT level.[22][23] Despite these changes, MS-ISAC reported detecting over 40,000 potential cyberattacks targeting SLTT organizations in 2024, underscoring ongoing threats that the transition aims to address through decentralized support.[24] The Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC), also operated by CIS, faced similar federal funding cuts announced in February 2025, leading its executive committee to explore sustainability options amid heightened election-related cyber risks.[25] These reductions have raised concerns among state officials about potential gaps in coordinated threat intelligence and incident response, particularly as cyberattacks on election infrastructure evolved in complexity during the 2024 cycle.[26] In response, CIS released an updated Elections Technology Cybersecurity Supply Chain Guide in 2024 to help vendors mitigate risks, while continuing to adapt core offerings like the CIS Critical Security Controls to version 8.1, which incorporated governance elements for broader resilience.[27][28] To bolster endpoint protection for SLTT members, CIS partnered with Sophos as its premier vendor in August 2025, integrating advanced threat detection tools into MS-ISAC services.[29] These adaptations reflect CIS's efforts to navigate funding transitions by emphasizing commercial viability and enhanced resources, though the long-term efficacy of CISA's direct-support model remains under scrutiny by cybersecurity stakeholders evaluating coverage for resource-limited localities.[30]Mission and Organizational Structure
Core Mission and Objectives
The Center for Internet Security (CIS) operates as a nonprofit organization dedicated to enhancing cybersecurity worldwide. Its stated mission is to "make the connected world a safer place by developing, validating, and promoting timely best practice solutions that help people, businesses, and governments protect themselves against pervasive cyber threats."[2] Founded in 2000 amid surging internet adoption and corresponding threat proliferation, CIS emphasizes empirical, consensus-driven approaches to cybersecurity, drawing on expertise from government and private sector professionals to prioritize actionable defenses over theoretical models.[1] Core objectives center on identifying vulnerabilities, standardizing protective measures, and fostering widespread adoption of these practices to mitigate real-world risks such as data breaches and ransomware. CIS pursues these through core competencies in collaboration and innovation, leading a global community of IT professionals to refine and update security standards based on observed attack vectors and defensive efficacy.[2] Key focuses include the development of the CIS Controls—a prioritized set of 18 safeguards derived from analyses of successful breaches—and CIS Benchmarks, configuration guidelines for over 25 technology families tested for effectiveness in reducing exploit surfaces.[31] These objectives aim not merely at compliance but at causal risk reduction, emphasizing hygiene practices like asset inventory, continuous vulnerability management, and access controls that address root causes of compromises.[2] To achieve its goals, CIS provides free and premium resources, including implementation tools, hardened images for secure system deployment, and services such as endpoint security assessments, while operating sector-specific information sharing centers like the Multi-State Information Sharing and Analysis Center (MS-ISAC) for threat intelligence dissemination among U.S. state, local, tribal, and territorial governments.[2] This model relies on evidence from incident data and peer validation rather than unverified assertions, promoting scalability across organizational sizes without dependency on proprietary vendor solutions.[2] By sustaining these efforts, CIS seeks to lower the baseline attack success rate, as evidenced by adoption metrics showing reduced incident rates in implementing entities per independent audits.[32]Governance, Leadership, and Operational Model
The Center for Internet Security (CIS) functions as a 501(c)(3) nonprofit organization, tax-exempt since August 2012 and headquartered in East Greenbush, New York.[33] Its governance is overseen by a Board of Directors comprising cybersecurity experts and business leaders who provide strategic guidance and ensure alignment with the organization's mission to enhance cybersecurity resilience.[34] The board's composition emphasizes industry acumen, with notable members including co-founder and founding chair Franklin Reeder, formerly of the U.S. Office of Management and Budget, and Elizabeth Mora, affiliated with Inogen Inc. and serving in a chair capacity.[35] This structure supports nonpartisan, vendor-agnostic decision-making, guided by internal codes including a Code of Ethics and Leadership Principles that prioritize collaboration and ethical practices.[2] Executive leadership reports to the board and manages day-to-day operations. John M. Gilligan has served as President and Chief Executive Officer since October 2018, bringing prior experience in federal cybersecurity roles and consulting.[36] Key executives include Marcus H. Sachs as Senior Vice President and Chief Engineer, advising on engineering standards, and John D. Cohen as Executive Director for the Program for Countering Hybrid Threats.[37][38] Specialized programs like the Multi-State Information Sharing and Analysis Center (MS-ISAC) feature elected executive committees for operational input, reflecting a layered leadership model that integrates stakeholder perspectives.[39] CIS's operational model is community-driven and consensus-based, leveraging crowdsourced expertise to develop resources such as the CIS Controls and Benchmarks.[40] It operates through core competencies in threat intelligence sharing, standards development, and program management, including the MS-ISAC for state and local governments and the Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC).[2] Sustainability relies on diversified funding, including sales of subscription-based tools like CIS SecureSuite, federal and nonprofit grants, and cost-sharing arrangements for ISAC services, enabling scalability without vendor bias.[2] This approach fosters empirical, actionable cybersecurity guidance while maintaining independence from commercial interests.[2]Key Programs and Initiatives
Multi-State Information Sharing and Analysis Center (MS-ISAC)
The Multi-State Information Sharing and Analysis Center (MS-ISAC), operated by the Center for Internet Security (CIS), serves as the primary cybersecurity information-sharing hub for U.S. state, local, tribal, and territorial (SLTT) governments. Established in 2003 amid rising cyber threats to public sector networks, it initially functioned as a regional cooperative before expanding nationally and integrating with CIS in 2010.[41][12] MS-ISAC facilitates real-time threat intelligence exchange, vulnerability assessments, and coordinated response efforts among over 18,000 SLTT member entities as of 2025, enabling collective defense against cyberattacks targeting critical infrastructure.[24] Designated by the Department of Homeland Security (DHS) as the central resource for SLTT cyber threat prevention, protection, response, and recovery, it operates a 24/7 Security Operations Center (SOC) that monitors networks, issues early warnings, and provides advisories on emerging vulnerabilities.[42][43] MS-ISAC's core operations emphasize membership-based collaboration, offering no-cost or low-cost services such as proactive threat hunting, incident response support, and access to shared cyber indicators of compromise (IoCs). By 2024, these efforts contributed to detecting over 43,000 potential cyberattacks on SLTT networks, with escalations to affected members for mitigation. The organization leverages frameworks like the NIST Cybersecurity Framework to standardize maturity assessments and enhance SLTT cyber resilience, fostering interoperability with federal partners including the Cybersecurity and Infrastructure Security Agency (CISA).[44] Membership is open to all SLTT government agencies, law enforcement, educational institutions, and related entities, promoting a non-competitive environment for intelligence sharing that has achieved universal state participation over its two decades of operation.[19][45] In recent years, MS-ISAC has faced funding transitions, with CISA terminating federal support effective September 2025, shifting to a fee-based model to sustain services amid budget constraints. This change risks reducing participation, as projections indicate potential loss of two-thirds of state and local members unable to cover costs, though core operations like SOC monitoring and threat alerts are expected to persist for paying entities.[20][22] Despite these challenges, MS-ISAC's historical impact includes bolstering SLTT defenses during high-profile incidents, such as ransomware campaigns and election-related threats, through timely intelligence dissemination and recovery guidance.[46]Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC)
The Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC) was established in February 2018 by the Elections Infrastructure Subsector Government Coordinating Council (EIS-GCC), a body comprising federal, state, and local election stakeholders, to centralize cybersecurity information sharing for U.S. election systems.[47] Hosted by the Center for Internet Security (CIS), which also operates the related Multi-State Information Sharing and Analysis Center (MS-ISAC), the EI-ISAC focuses on identifying and disseminating intelligence about cyber threats, vulnerabilities, and incidents targeting voter registration databases, voting machines, and election management systems.[48] Its formation addressed growing concerns over foreign and domestic cyber risks to electoral integrity, building on frameworks like Presidential Policy Directive 21, which designates elections as critical infrastructure.[49] The EI-ISAC's core objectives include enabling rapid threat detection, mitigation, and recovery to bolster election resilience, with membership open to state, local, tribal, and territorial election officials, vendors, and supporting organizations across the United States.[18] Members gain access to real-time alerts, analytical reports, peer-to-peer collaboration forums, cybersecurity training, and best-practice resources tailored to election cycles.[18] Operations leverage CIS's MS-ISAC infrastructure, including a 24/7 security operations center for monitoring and incident response, ensuring actionable intelligence reaches election administrators during high-risk periods like primaries and general elections.[48] In its inaugural 2018 cycle, the center coordinated threat sharing that supported secure operations amid documented attempts at election interference.[17] Governed by an Executive Committee of election sector representatives, the EI-ISAC integrated into the National Council of Information Sharing and Analysis Centers in June 2019, expanding its network for cross-sector threat visibility.[50] Key activities encompass vulnerability scanning, phishing awareness campaigns, and post-incident debriefs, with annual reports highlighting mitigated risks such as ransomware targeting local election offices.[17] By October 2023, it had marked five years of operations, contributing to nationwide efforts that verified no widespread cyber disruptions to vote tabulation in multiple cycles.[51] As of March 2025, the EI-ISAC faces sustainability challenges following a $10 million funding cut from the Cybersecurity and Infrastructure Security Agency (CISA), which had previously supported its expansion through grants tied to the Help America Vote Act and related programs.[46] The Executive Committee is evaluating membership expansions, private partnerships, and operational efficiencies to maintain services, amid concerns from state secretaries that reduced federal backing could strain local resources for defending against persistent threats like supply-chain attacks on election vendors.[48][52] This transition underscores the program's historical reliance on taxpayer-funded mechanisms, potentially shifting costs to state budgets or voluntary contributions while preserving core threat-sharing functions.[53]Security Standards and Resources
CIS Critical Security Controls
The CIS Critical Security Controls are a prioritized framework of cybersecurity best practices designed to help organizations defend against the most common and severe cyber threats by focusing on actionable safeguards derived from real-world attack data.[54] Developed through consensus among cybersecurity experts, the controls emphasize offense-informed defense, prioritizing measures that address attacker tactics over theoretical risks, and are structured to be measurable, scalable, and aligned with standards such as NIST and MITRE ATT&CK.[55] Originating in 2008 from collaborative efforts involving U.S. defense contractors and the SANS Institute—initially as the "SANS Top 20"—they evolved to counter data breaches in the defense industrial base and have been iteratively refined based on evolving threats.[13] The current version, CIS Controls v8.1, released in 2024, incorporates updates for hybrid cloud environments, supply chain risks, virtualization, mobility, and operational technology (OT), reducing the number of safeguards from 171 in v7.1 to 153 while enhancing focus on modern attack vectors like ransomware and phishing.[56] The framework organizes its 18 controls into three Implementation Groups (IGs) to accommodate varying organizational sizes and maturity: IG1 for foundational hygiene suitable for smaller entities, IG2 for progressive risk mitigation, and IG3 for advanced, proactive defenses.[54] Each control consists of specific safeguards—discrete actions with defined metrics—that organizations can implement to achieve compliance with regulations like PCI DSS, HIPAA, and GDPR, while shifting from checklist-driven approaches to risk-based cybersecurity.[54] CIS quantifies the controls' effectiveness against prevalent threats, claiming high returns on investment through reduced breach likelihood, though broader empirical validation relies on case-specific metrics rather than large-scale longitudinal studies.[57] The 18 controls are as follows:- 1. Inventory and Control of Enterprise Assets: Identify and manage all hardware devices to establish a baseline for security monitoring.[54]
- 2. Inventory and Control of Software Assets: Catalog and control software installations to prevent unauthorized or vulnerable applications.[54]
- 3. Data Protection: Protect sensitive data through encryption and access restrictions.[54]
- 4. Secure Configuration of Enterprise Assets and Software: Harden systems by applying secure baselines to reduce attack surfaces.[54]
- 5. Account Management: Minimize administrative privileges and enforce least-privilege access to limit lateral movement by attackers.[54]
- 6. Access Control Management: Implement granular controls based on need-to-know principles for data and systems.[54]
- 7. Continuous Vulnerability Management: Establish processes to assess, prioritize, and remediate vulnerabilities in assets and software.[54]
- 8. Audit Log Management: Maintain, monitor, and analyze logs for security events.[54]
- 9. Email and Web Browser Protections: Secure email and browsing against phishing and drive-by downloads.[54]
- 10. Malware Defenses: Deploy anti-malware tools and behavioral monitoring.[54]
- 11. Data Recovery Capabilities: Ensure backup and recovery processes for resilience.[54]
- 12. Network Infrastructure Management: Securely configure network devices like firewalls and routers.[54]
- 13. Network Monitoring and Defense: Monitor traffic for malicious activity.[54]
- 14. Security Awareness and Skills Training: Educate users on security practices.[54]
- 15. Service Provider Management: Manage risks from third-party providers.[54]
- 16. Application Software Security: Secure custom and third-party applications.[54]
- 17. Incident Response Management: Develop and test response capabilities.[54]
- 18. Penetration Testing: Perform regular testing to identify weaknesses.[54]
