top of page
Writer's pictureTravis Howerton

Atlasity Announces Support for CIS Version 8 Controls


The Computer Internet Security (CIS) Version 8 Controls are a prioritized set of Safeguards to mitigate the most prevalent cyber-attacks against systems and networks. They are mapped to and referenced by multiple legal, regulatory, and policy frameworks. CIS Controls v8 has been enhanced to keep up with modern systems and software. Movement to cloud-based computing, virtualization, mobility, outsourcing, Work-from-Home, and changing attacker tactics prompted the update and supports an enterprise's security as they move to both fully cloud and hybrid environments.


CIS Version 8 leverages Implementation Groups (IGs) to provide a simple and accessible way to help organizations of different classes focus their scarce security resources, and still leverage the value of the CIS Controls program, community, and complementary tools and working aids.


At C2 Labs, we give you easy and free tools to get started with building a CIS Version 8 cyber security program with support for tracking information security policies, related assessments, evidence collection, issues management/performance improvement, and other related compliance workflows. As of July 28, 2021, C2 Labs has announced that we officially support CIS Version 8 as a catalog within Atlasity, including all three implementation groups, with automated tools/wizards for building compliant security programs.


Schedule a free demo today to learn how C2 Labs can help you continuously meet your cyber security requirements with CIS. If you are ready to start automating your compliance processes for creating and managing security controls, this demo will also show you how you can leverage Atlasity to deliver continuous compliance. In addition to offering free tools, we have experienced cyber professionals who can assist you in creating robust CIS compliance artifacts that will help you pass security audits with ease. With C2 Labs, our customers get software with a service to provide a concierge like experience for achieving cloud security compliance.

Comments


bottom of page