<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>CIS security benchmarks &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/cis-security-benchmarks/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 25 Aug 2025 19:50:24 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>CIS security benchmarks &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>From CISO to SME – Make Your Compliance Data Work for Your Organization</title>
		<link>https://www.steelcloud.com/from-ciso-to-sme-make-your-compliance-data-work-for-your-organization/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 19 Jul 2022 19:27:23 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Webinars]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[automated compliance]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[CIS security benchmarks]]></category>
		<category><![CDATA[compliance dashboards]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[Disa STIG]]></category>
		<category><![CDATA[DLT]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[drift]]></category>
		<category><![CDATA[enterprise infrastructure]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[splunk dashboards]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=87016</guid>

					<description><![CDATA[This webcast will share with you everything you want to know about making your compliance data for Work for your organization. Maintaining risk awareness, performing compliance trend analysis, and discovering and correcting endpoint compliance drift is characteristically a cumbersome, time-consuming manual process. An enterprise that remediates thousands of endpoints a day generates millions of data ...]]></description>
		
		
		<enclosure url="https://www.steelcloud.com/wp-content/uploads/SteelCloud-Webinar-Recording-with-DLT-Logo_reduced.mp4" length="0" type="video/mp4" />

			</item>
		<item>
		<title>Automating Security Configuration Management: The Time to Hesitate is Over</title>
		<link>https://www.steelcloud.com/automating-security-configuration-management-the-time-to-hesitate-is-over/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Fri, 10 Dec 2021 17:45:07 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[automating security configuration management]]></category>
		<category><![CDATA[CIS security benchmarks]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[endpoint security]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[secure baselines]]></category>
		<category><![CDATA[security podcast]]></category>
		<category><![CDATA[STIG CIS controls]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82800</guid>

					<description><![CDATA[Security configuration management and resistance to change simplified by automating security configuration management with automation. From the Ford Mustang and Dodge Challenger to the Cadillac Coupe De Ville, American cars were admired back in the 1970s. They were manufactured as they had always been—cars would come off the manufacturing line and be full of defects ...]]></description>
		
		
		
			</item>
		<item>
		<title>Seven ways automation seals your CMMC certification with a KISS</title>
		<link>https://www.steelcloud.com/seven-ways-automation-seals-your-cmmc-certification-with-a-kiss/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 22 Nov 2021 14:59:11 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CIS security benchmarks]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[CMMC certification with a KISS]]></category>
		<category><![CDATA[CMMC compliance in the DIB]]></category>
		<category><![CDATA[contractor information systems]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[Defense Industrial Base]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[DoD STIGS]]></category>
		<category><![CDATA[FERPA]]></category>
		<category><![CDATA[FIPS]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 800 - 128]]></category>
		<category><![CDATA[NIST 800-53 CMMC]]></category>
		<category><![CDATA[NIST SP 800-171]]></category>
		<category><![CDATA[NIST SP 800-53]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82669</guid>

					<description><![CDATA[CMMC certification with a KISS in seven steps KISS—Keep It Simple, Stupid—is a design principle noted by the U.S. Navy in 1960. The KISS principle states that most systems work best if they are kept simple rather than made complicated. In other words, simplicity should be a key goal in design and unnecessary complexity should ...]]></description>
		
		
		
			</item>
		<item>
		<title>CMMC 2.0 Opportunities and Challenges</title>
		<link>https://www.steelcloud.com/cmmc-2-0-opportunities-and-challenges/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 15 Nov 2021 20:53:34 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CIS security benchmarks]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[CMMC compliance in the DIB]]></category>
		<category><![CDATA[contractor information systems]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[Defense Industrial Base]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[DoD STIGS]]></category>
		<category><![CDATA[FERPA]]></category>
		<category><![CDATA[FIPS]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 800 - 128]]></category>
		<category><![CDATA[NIST 800-53 CMMC]]></category>
		<category><![CDATA[NIST SP 800-171]]></category>
		<category><![CDATA[NIST SP 800-53]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82630</guid>

					<description><![CDATA[CMMC 2.0 framework offers up a more transparent pathway.  Just when we were all finally wrapping our brains around the Cybersecurity Maturity Model Certification (CMMC) mandate for the defense industrial base (DIB), they went and changed it on us—for the better! In the early morning of November 4, 2021, “Cybersecurity Maturity Model Certification (CMMC) 2.0 Updates and Way ...]]></description>
		
		
		
			</item>
		<item>
		<title>Navigating the CMMC Certification Process</title>
		<link>https://www.steelcloud.com/navigating-the-cmmc-certification-process/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Sat, 06 Nov 2021 17:15:40 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CIS security benchmarks]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[CMMC compliance in the DIB]]></category>
		<category><![CDATA[contractor information systems]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[Defense Industrial Base]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[DoD STIGS]]></category>
		<category><![CDATA[FERPA]]></category>
		<category><![CDATA[FIPS]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 800 - 128]]></category>
		<category><![CDATA[NIST 800-53 CMMC]]></category>
		<category><![CDATA[NIST SP 800-171]]></category>
		<category><![CDATA[NIST SP 800-53]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82617</guid>

					<description><![CDATA[Navigating the CMMC Certification Process In 2020, the DoD rolled out its Cybersecurity Maturity Model Certification (CMMC) program. The CMMC certification process requires the defense industrial base (DIB) to attain third-party certification to ensure government contractors practice one of three cybersecurity levels, depending on the kind of data they touch. Although the deadline for CMMC ...]]></description>
		
		
		
			</item>
		<item>
		<title>Tackling the challenges of CMMC compliance in the DIB</title>
		<link>https://www.steelcloud.com/tackling-the-challenges-of-cmmc-compliance-in-the-dib/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 01 Nov 2021 17:28:52 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CIS security benchmarks]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[CMMC compliance in the DIB]]></category>
		<category><![CDATA[contractor information systems]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[Defense Industrial Base]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[DoD STIGS]]></category>
		<category><![CDATA[FERPA]]></category>
		<category><![CDATA[FIPS]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 800 - 128]]></category>
		<category><![CDATA[NIST 800-53 CMMC]]></category>
		<category><![CDATA[NIST SP 800-171]]></category>
		<category><![CDATA[NIST SP 800-53]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82607</guid>

					<description><![CDATA[Tackling the challenges of CMMC compliance in the DIB Trying to wrap your arms around CMMC compliance in the DIB? When it comes to cybersecurity and CMMC compliance in the DIB (defense industrial base), the government means business. And the more sensitive the data is that you handle, the more secure you need to be.  ...]]></description>
		
		
		
			</item>
		<item>
		<title>Use Case: Systems Integrators</title>
		<link>https://www.steelcloud.com/use-case-systems-integrators/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Thu, 29 Jul 2021 07:15:16 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Collaterals]]></category>
		<category><![CDATA[Use Cases]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Authority To Operate]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[center internet security]]></category>
		<category><![CDATA[CIS security benchmarks]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[disa stigs]]></category>
		<category><![CDATA[nist 800-171]]></category>
		<category><![CDATA[SIs]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[system integrators]]></category>
		<guid isPermaLink="false">http://staging.steelcloud.com/?p=80128</guid>

					<description><![CDATA[Why Systems Integrators EXCEED Program Expectations with STIG &#38; CIS Policy Compliance Automation Systems Integrators partner with SteelCloud to get ahead of the RMF accreditation curve and are able to: 1. Deliver faster ATOs for Government customers; up to 90% reduction of system hardening time 2. Reduce RMF accreditation pain for your programs 3. Gain ...]]></description>
		
		
		
			</item>
		<item>
		<title>Are You Grappling with Privacy Mandates to Comply with PII &#8211; Personally Identifiable Information?</title>
		<link>https://www.steelcloud.com/are-you-grappling-with-privacy-mandates-to-comply-with-pii-personally-identifiable-information-2/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 19 Jul 2021 13:43:49 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CIS security benchmarks]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[contractor information systems]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[Defense Industrial Base]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[DoD STIGS]]></category>
		<category><![CDATA[FERPA]]></category>
		<category><![CDATA[FIPS]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 800 - 128]]></category>
		<category><![CDATA[NIST 800-53 CMMC]]></category>
		<category><![CDATA[NIST SP 800-171]]></category>
		<category><![CDATA[NIST SP 800-53]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[PII (Personally Identifiable Information)]]></category>
		<category><![CDATA[Privacy mandates]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82020</guid>

					<description><![CDATA[Are You Grappling with Privacy Mandates to Comply with PII – Personally Identifiable Information? Hardening systems is first step in protecting you PII Personally Identifiable Information Modern businesses collect data a lot of data. Regardless of your industry, your company relies on PII Personally Identifiable Information) to provide the best consumer experience possible. This reliance ...]]></description>
		
		
		
			</item>
		<item>
		<title>Why is Continuous Monitoring so Complex?</title>
		<link>https://www.steelcloud.com/why-is-continuously-monitoring-cis-benchmarks-so-complex/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Wed, 12 May 2021 14:09:17 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CIS security benchmarks]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[contractor information systems]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[Defense Industrial Base]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[DoD STIGS]]></category>
		<category><![CDATA[FIPS]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 800 - 128]]></category>
		<category><![CDATA[NIST 800-53 CMMC]]></category>
		<category><![CDATA[NIST SP 800-171]]></category>
		<category><![CDATA[NIST SP 800-53]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[What are the CIS Controls]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=81595</guid>

					<description><![CDATA[Continuously Monitoring CIS Benchmarks does not have to be so cumbersome Nearly every cybersecurity law, industry-standard, or framework incorporates continuous monitoring. Malicious actors continuously evolve their threat methodologies, which is why companies need to keep reviewing their controls’ effectiveness. Continuously monitoring CIS Benchmarks may be challenging but equally important as you look to mature your ...]]></description>
		
		
		
			</item>
		<item>
		<title>What are CIS Benchmarks?</title>
		<link>https://www.steelcloud.com/what-are-cis-benchmarks/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Fri, 07 May 2021 15:45:25 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CIS security benchmarks]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[contractor information systems]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[Defense Industrial Base]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[DoD STIGS]]></category>
		<category><![CDATA[FIPS]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 800 - 128]]></category>
		<category><![CDATA[NIST 800-53 CMMC]]></category>
		<category><![CDATA[NIST SP 800-171]]></category>
		<category><![CDATA[NIST SP 800-53]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[What are the CIS Controls]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=81514</guid>

					<description><![CDATA[What are CIS Benchmarks and Best Practice? Most organizations need to create baseline technical security configurations. However, configuring systems is one thing. Maintaining those security configurations over time is a whole different beast. The Center for Internet Security (CIS) Controls offers companies a way to set a path to maturing their cybersecurity programs as well ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
