<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>What are the CIS Controls &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/what-are-the-cis-controls/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 25 Aug 2025 19:40:48 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>What are the CIS Controls &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Why is Continuous Monitoring so Complex?</title>
		<link>https://www.steelcloud.com/why-is-continuously-monitoring-cis-benchmarks-so-complex/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Wed, 12 May 2021 14:09:17 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CIS security benchmarks]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[contractor information systems]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[Defense Industrial Base]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[DoD STIGS]]></category>
		<category><![CDATA[FIPS]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 800 - 128]]></category>
		<category><![CDATA[NIST 800-53 CMMC]]></category>
		<category><![CDATA[NIST SP 800-171]]></category>
		<category><![CDATA[NIST SP 800-53]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[What are the CIS Controls]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=81595</guid>

					<description><![CDATA[Continuously Monitoring CIS Benchmarks does not have to be so cumbersome Nearly every cybersecurity law, industry-standard, or framework incorporates continuous monitoring. Malicious actors continuously evolve their threat methodologies, which is why companies need to keep reviewing their controls’ effectiveness. Continuously monitoring CIS Benchmarks may be challenging but equally important as you look to mature your ...]]></description>
		
		
		
			</item>
		<item>
		<title>What are CIS Benchmarks?</title>
		<link>https://www.steelcloud.com/what-are-cis-benchmarks/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Fri, 07 May 2021 15:45:25 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CIS security benchmarks]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[contractor information systems]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[Defense Industrial Base]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[DoD STIGS]]></category>
		<category><![CDATA[FIPS]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 800 - 128]]></category>
		<category><![CDATA[NIST 800-53 CMMC]]></category>
		<category><![CDATA[NIST SP 800-171]]></category>
		<category><![CDATA[NIST SP 800-53]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[What are the CIS Controls]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=81514</guid>

					<description><![CDATA[What are CIS Benchmarks and Best Practice? Most organizations need to create baseline technical security configurations. However, configuring systems is one thing. Maintaining those security configurations over time is a whole different beast. The Center for Internet Security (CIS) Controls offers companies a way to set a path to maturing their cybersecurity programs as well ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
