CIS Benchmarks
prescriptive hardening evidence for OS, cloud, containers, and network baselines
CIS Benchmarks are 100+ prescriptive configuration hardening guides published by the Center for Internet Security. Each benchmark names the exact settings, registry keys, configuration values, and audit commands an operator can run to evidence a defensible baseline against a specific operating system, cloud account, container platform, network device, mobile platform, or database. This page covers what the CIS Benchmarks are, how they differ from the CIS Critical Security Controls, how Level 1 and Level 2 profiles work, how the benchmark catalogue maps to the standard scanner stack, the evidence layout auditors expect, and how a workspace-driven approach turns benchmark assessment into a continuous record rather than a once-a-year snapshot.
No credit card required. Free plan available forever.
CIS Benchmarks: prescriptive configuration baselines for the technologies you actually run
CIS Benchmarks are 100+ prescriptive configuration hardening guides published by the Center for Internet Security. Each benchmark names the exact settings, registry keys, configuration values, and audit commands an operator can run to evidence a defensible baseline against a specific operating system, cloud account, container platform, network device, mobile platform, or database. The benchmarks are written as executable specifications rather than as guidance documents: each recommendation carries the prescribed setting, the rationale, the impact, the audit procedure, the remediation procedure, and the references back to the wider control catalogues. A programme that operates the benchmarks produces evidence as a side effect of running them rather than as a separate documentation exercise.
CIS Benchmarks and the CIS Critical Security Controls are companion catalogues with different scopes. The Controls are the 18 prioritised cyber programme priorities and 153 safeguards that describe what a security team should do at the programme level. The Benchmarks are the prescriptive configuration baselines that describe how specific technologies should be configured. The Controls reference the Benchmarks for the configuration evidence in Control 4 Secure Configuration of Enterprise Assets and Software. Programmes commonly operate both: the Controls catalogue at the programme layer, the Benchmarks catalogue at the asset layer, with the per-asset benchmark evidence rolling up into the per-safeguard Controls assessment.
External frameworks read the benchmark output as evidence rather than as the framework itself. ISO 27001 Annex A 8.9 expects configuration management; benchmark output is the underlying evidence. SOC 2 CC6.6 expects logical access security measures including secure configuration; benchmark output is what the assessor reads. PCI DSS Requirement 2 expects secure configuration standards applied to all in-scope system components; benchmark output is the standard and the evidence at the same time. NIST SP 800-53 CM-6 expects configuration settings established and implemented; benchmark output is the implementation evidence the assessor reads. Programmes that operate the benchmarks once and reuse the evidence across these reads spend less time at audit than programmes that produce framework-specific evidence per certification cycle.
The benchmark catalogue at a glance
The catalogue is organised into broad asset categories. Each category contains multiple benchmark families, and each benchmark family contains versioned benchmarks against the named platform versions actually shipping in production. The total catalogue exceeds 100 active benchmarks across the categories below.
Operating systems
Red Hat Enterprise Linux, CentOS, Ubuntu Server and LTS, Debian, Rocky Linux, Alma Linux, SUSE Linux Enterprise, Oracle Linux, Amazon Linux, Microsoft Windows Server, Windows desktop, macOS, Solaris, AIX, IBM i
Operating system benchmarks are the densest tier of the catalogue. A typical benchmark contains 200 to 400 prescriptive recommendations against the file system, the account model, the service configuration, the kernel parameters, the audit subsystem, the local firewall configuration, and the software update model. Each recommendation names the audit command to verify the setting and the remediation command to bring it into line.
Cloud foundations
CIS AWS Foundations Benchmark, CIS Microsoft Azure Foundations Benchmark, CIS Google Cloud Platform Foundations Benchmark, CIS Oracle Cloud Infrastructure Foundations Benchmark, CIS IBM Cloud Foundations Benchmark, CIS Alibaba Cloud Foundations Benchmark
Cloud foundations benchmarks read against the account control plane (identity, logging, networking, key management, storage default settings) rather than against the workloads running inside the account. The result is the account-level configuration baseline that the workload-side scanner output assumes. Cloud security and platform engineering teams operate the foundations benchmark on a per-account basis; the workload teams operate the application-side scanner output against the workloads inside.
Containers and Kubernetes
CIS Docker Benchmark, CIS Kubernetes Benchmark, CIS Amazon EKS Benchmark, CIS Azure Kubernetes Service Benchmark, CIS Google Kubernetes Engine Benchmark, CIS Red Hat OpenShift Benchmark
Container and Kubernetes benchmarks cover the runtime configuration, image and registry hygiene, the pod security context, the network policy model, the control plane configuration, the worker node configuration, the managed service controls, and the audit logging baseline. Source-side coverage through IaC scanning catches the manifests that define the cluster; the live cluster configuration sits on the running platform and is captured against the live configuration during the authenticated assessment window.
Network devices and infrastructure
Cisco IOS Router, Cisco IOS Switch, Cisco ASA Firewall, Cisco NX-OS, Cisco Wireless LAN Controller, Juniper, Palo Alto PAN-OS, Check Point Firewall, Fortinet FortiGate, F5 BIG-IP load balancer, the major storage platforms
Network benchmarks cover the management plane, the authentication and accounting model, the control plane, the data plane, the configuration management discipline, and the logging baseline. Network benchmark evidence pairs with the architecture review and the change record so the configuration baseline reads against the documented design rather than against an unowned snapshot.
Mobile and desktop software
Apple iOS, Apple iPadOS, Google ChromeOS, Google Android, Microsoft 365 Apps for Enterprise, Microsoft Office, Mozilla Firefox, Google Chrome, Microsoft Edge, Apache HTTP Server, NGINX, Microsoft IIS, BIND DNS, OpenLDAP, Apache Tomcat
Mobile and desktop benchmarks cover the device-side configuration that the endpoint management programme operates against. Server software benchmarks cover the application-server tier (web server, application server, directory service, name server) that sits between the operating system and the application code. Each benchmark names the prescriptive configuration against the named version of the named platform.
Database platforms
Microsoft SQL Server, Oracle Database, IBM Db2, MariaDB, MongoDB, PostgreSQL, MySQL
Database benchmarks cover authentication and account configuration, role and privilege configuration, audit configuration, encryption at rest and in transit, logging baseline, and the platform-specific hardening recommendations. Database benchmark evidence ties to the data classification record (which data classes the database holds) so the configuration baseline answers the protection expectations the data class carries.
Level 1 versus Level 2 profiles and the deployment-context variants
Each benchmark organises recommendations into Level 1 and Level 2 profiles. Level 1 is the practical baseline that does not significantly impact functionality and is the floor most regulated programmes are expected to reach. Level 2 is the stricter baseline that may break functionality, performance, or compatibility and typically requires explicit risk acceptance against the asset criticality and the threat model. Some benchmarks also publish deployment-context variants per operating mode (server vs workstation, domain-joined vs standalone, on-premises vs cloud, container host vs cluster control plane). The profile decision is the single most consequential scoping decision in a benchmark programme because every audit conversation reads against it.
- Select the benchmark version against the named platform version actually deployed, not against the most recent benchmark version in the catalogue. The catalogue carries multiple benchmark versions per platform to match supported software versions in production
- Pick the Level 1 profile as the practical baseline for production assets. Level 1 recommendations do not significantly impact functionality and are the floor most regulated programmes are expected to reach
- Pick the Level 2 profile only when the asset criticality, threat model, or regulatory expectation justifies the operational impact. Level 2 recommendations may break functionality and require explicit risk acceptance
- Pick the deployment-context profile variant where the benchmark publishes one (server vs workstation, domain-joined vs standalone, on-premises vs cloud, container host vs cluster control plane) so the recommendations match the operating context
- Document every recommendation deferred, modified, or compensated for, with rationale tied to the asset record. The benchmark evidence pack at audit reads the deviations as much as it reads the implemented recommendations
- Refresh the profile decision when the benchmark version updates, when the platform version updates, when the asset criticality changes, or when the regulatory expectation shifts, not only on the annual review
Scored versus Not Scored recommendations and what the scanner score does not tell you
CIS classifies each recommendation as Scored or Not Scored. The distinction matters at evidence time because most third-party scanners report a benchmark score against the Scored items only, while the framework reads expect evidence on both. A programme that reads the scanner score as the entire benchmark posture ships an evidence pack that misses every Not Scored item the assessor will still ask for.
- Scored recommendations are objectively measurable: the audit command returns a specific value, the file permission is exactly the prescribed bitmask, the registry key holds the prescribed setting, the configuration parameter matches the prescribed value
- Not Scored recommendations require operator judgement: a documented policy must exist, a defined process must be in place, a procedural control must be operated. The benchmark expects evidence of the procedural control rather than a binary check
- Benchmark scores produced by scanners read against the Scored items only. The reported score is the percentage of Scored recommendations the asset passes, not the percentage of all recommendations
- Not Scored recommendations still need evidence in the workspace alongside the policy artefact, the implementation record, and the named owner. An assessor who reads only the scanner score will see a partial picture
- Mixed-evidence recommendations need both the technical check and the procedural artefact. Treat the recommendation status as Implemented only when both sides of the evidence are captured
Building the benchmark evidence pack
Evidence packs fail review when artefacts are scattered across drives, ticket systems, and screenshots without a clear link back to a benchmark recommendation. Build the pack as you go, keep raw scanner output alongside the per-recommendation summary, and tie every artefact to the engagement record. The pairs below are what the assessor actually reads when the benchmark is the underlying evidence for the configuration management control.
- Scope and applicability statement (assets in scope per benchmark, benchmark version per asset, profile selected, deferrals and compensating controls with rationale)
- Authenticated scan output per asset with per-recommendation pass and fail, retained per scan window so the trend across cycles is readable
- Bulk import of CIS-CAT, Nessus CIS Benchmark policy, Tenable CIS Compliance, Rapid7 InsightVM Policy, or Wiz CIS Benchmark scanner output where the external scanner produced the per-recommendation evidence
- Code scanning output against infrastructure-as-code manifests where the manifest is the source of truth for the configuration (Kubernetes YAML, Terraform, CloudFormation, Helm charts)
- Manual benchmark evidence for Not Scored recommendations: the policy artefact, the implementation record, the named owner, the review cadence, and the next review date
- Remediation log per failed recommendation: original date, planned date, current date, reason for change, approving authority, evidence of the remediation, and the retest record
- Crosswalk record mapping benchmark recommendations to ISO 27001 Annex A 8.9, SOC 2 CC6.6, PCI DSS Requirement 2, NIST SP 800-53 CM-6, NIST CSF 2.0 PR.PS-01, and CIS Controls Safeguards 4.1 to 4.7
- Activity log entries for the benchmark scope decisions, the scanner runs, the finding transitions, the override decisions, and the retest closures, with actor and date per step
Turning failed recommendations into tracked work
The benchmark scan output is a snapshot of the configuration baseline at a single point in time. A snapshot is not a programme. Each failed Scored recommendation and each Not Scored recommendation without procedural evidence should produce a remediation item with a planned fix, target date, and named owner. SecPortal's findings management is built around the same model: a finding has severity, an owner, a control mapping, and a remediation timeline. Treat the benchmark register per asset as a live view of open work, not as a quarterly export.
- Open a remediation item the moment a Scored recommendation fails or a Not Scored recommendation lacks the procedural evidence the benchmark expects
- Capture the benchmark identifier, the recommendation number, the asset reference, the profile assessed against, the severity, the named owner, and the evidence pointer per item
- Record the planned remediation steps, the milestones, the target completion date, and any compensating controls applied during the gap
- Track schedule slippage explicitly: original target date, current target date, reason for change, approving authority
- Close the item only after the retest scan or the evidence collection confirms the recommendation passes against the same profile
- Roll status into the benchmark register per asset so the picture stays current rather than drifting between assessment cycles
Anti-patterns that produce silent benchmark drift
Six anti-patterns recur in programmes that ship benchmark output without an underlying operating discipline. Each pattern produces a posture gap the scanner output cannot surface, because the scanner output is the wrong evidence source for the question.
- Treating the benchmark version as evergreen: the benchmark catalogue updates against the platform version, so a stale benchmark version misses recommendations the current benchmark adds and over-includes recommendations the current benchmark removed
- Treating Scored recommendations as the entire benchmark: the scanner score reads only against the Scored items, and the Not Scored items still carry audit evidence expectations the scanner cannot produce
- Treating Level 1 profile as the only useful baseline: critical assets that justify Level 2 inherit a coverage gap when the programme operates a single profile across the portfolio
- Treating per-asset assessment as the entire evidence layer: the benchmark register per asset is half the picture; the crosswalk to ISO 27001 8.9, SOC 2 CC6.6, PCI DSS Req 2, and NIST 800-53 CM-6 is the other half that lets the same evidence answer multiple framework reads
- Treating the benchmark as an annual project rather than a continuous discipline: configuration drift between scans accumulates undetected change, so the benchmark register expires faster than the cycle expects when the cadence does not match the change rate
- Treating the benchmark as documentation: the benchmark is an executable specification that produces evidence when scanned and policy when implemented. Reading it as a document without running it produces a binder rather than a programme
Continuous benchmark monitoring rather than annual snapshots
A benchmark that runs once a year against an asset reconfigured weekly produces a posture that expires faster than the assessment cycle expects. The structural fix is matching cadence to change rate per asset class: continuous or near-continuous benchmark assessment for the highest-velocity assets (cloud account configuration, Kubernetes cluster configuration, container image baselines), weekly or biweekly for medium-velocity assets (server operating systems, database platforms, web server software), monthly or quarterly for low-velocity assets (network devices on a slow change cadence, locked-down kiosk endpoints, regulated infrastructure with a controlled change window). The continuous monitoring workflow and the authenticated scanning capability are the patterns the workspace uses to produce that record without manual chasing. Pair them with the cloud security posture remediation workflow for the cloud foundations benchmarks, the patch management coordination workflow for the operating system benchmarks, and the compliance audits workflow for the multi-framework evidence reads against the benchmark output.
Cloud foundations benchmarks and the platform engineering handoff
Cloud foundations benchmarks (CIS AWS Foundations, CIS Microsoft Azure Foundations, CIS Google Cloud Platform Foundations) read against the account control plane (identity, logging, networking, key management, storage default settings) rather than against the workloads running inside the account. The result is the account-level configuration baseline that the workload-side scanner output assumes. Cloud security and platform engineering teams operate the foundations benchmark on a per-account basis; the workload teams operate the application-side scanner output against the workloads inside.
The handoff between the platform engineering team and the workload teams matters at audit: a workload that fails an authenticated scan inside an account that also fails CIS AWS Foundations carries two separate findings against two separate owners. The benchmark register per account and the finding register per workload sit on the same workspace so the assessor sees both sides of the configuration assurance posture without reconciling across consoles.
Kubernetes and container benchmarks across the source-to-runtime layers
The Kubernetes and container benchmarks read across three layers: the manifests at source, the images at build, and the cluster at runtime. Source-side coverage through code scanning catches the manifests that define the cluster (Kubernetes YAML, Helm charts, Kustomize overlays, Terraform) against IaC scanning expectations. Build-side coverage catches the image hygiene at the registry against image scanning expectations. Runtime coverage sits on the running cluster and is captured against the live configuration during the authenticated assessment window. A programme that operates only one of the three layers inherits a benchmark coverage gap; the workspace record carries findings from all three sources against the same cluster reference so the gap is visible.
Multi-framework crosswalk: one benchmark, multiple framework reads
The economic case for the benchmark catalogue is the multi-framework crosswalk. A single CIS Linux Benchmark assessment against a production host produces evidence that answers ISO 27001 Annex A 8.9 configuration management, SOC 2 CC6.6 logical access security measures, PCI DSS Requirement 2 secure configuration standards, NIST SP 800-53 CM-6 configuration settings, NIST CSF 2.0 PR.PS-01 configuration management practices, and CIS Controls Safeguards 4.1 through 4.7. The same evidence supports the FedRAMP authorisation package, the HIPAA Security Rule administrative safeguard for security management, the DORA digital operational resilience reads on ICT systems, and the NIS2 Annex II configuration management expectations. The control mapping cross-framework crosswalks workflow is the workspace pattern for capturing the benchmark recommendation once and reading it against each framework control reference without rebuilding the evidence pack.
Where SecPortal fits in the CIS Benchmarks workflow
SecPortal is the operating layer for the benchmark programme, not a replacement for the CIS catalogue or the assessor. The platform handles scope, per-asset benchmark scope decisions, scanner output ingestion, findings management, remediation tracking, and the assessor-ready output, so the benchmark assessment runs as a structured workflow rather than a long email thread. Compliance tracking covers the benchmark crosswalk to the frameworks an enterprise entity frequently has to satisfy.
- Compliance tracking maps every finding to a CIS Benchmark recommendation and to the parallel ISO 27001 Annex A 8.9, SOC 2 CC6.6, PCI DSS Requirement 2, NIST SP 800-53 CM-6, and NIST CSF 2.0 PR.PS-01 control so a single piece of configuration evidence answers multiple framework reads
- Findings management with CVSS 3.1 scoring, CWE tagging, and 300+ templates so each failed recommendation lands as a tracked finding with severity, owner, target date, and remediation guidance
- 17-module authenticated scanning behind stored credentials so the configuration baseline check runs against the live host, the database, or the application server with the same workspace pattern as other authenticated tests
- 16-module external scanning against the verified perimeter so the externally visible configuration (TLS, headers, exposed services, open ports) reads against the benchmark expectations for the public-facing assets
- Code scanning (Semgrep SAST and dependency SCA) against repositories connected through GitHub, GitLab, and Bitbucket OAuth, so the IaC manifests that define cloud, container, and Kubernetes configuration are assessed at the source against the benchmark expectations
- Bulk finding import accepts Nessus, Burp Suite, and CSV exports against an engagement, so per-recommendation output from CIS-CAT, Nessus CIS Compliance, Tenable CIS Audit, Rapid7 InsightVM Policy, or cloud-posture scanners that already produce benchmark-tagged findings can land on the same workspace
- Continuous monitoring schedules (daily, weekly, biweekly, monthly) against the verified asset set so the benchmark register tracks configuration drift rather than capturing it as a once-a-cycle snapshot
- Engagement management for the benchmark scope decisions per asset and per profile, with the deferrals and compensating controls captured on the engagement record
- AI report generation that turns benchmark results, gap findings, remediation actions, and the multi-framework crosswalk into an assessor-ready narrative with executive summary, technical detail, and remediation roadmap
- Activity log with CSV export carries the scope decisions, the scanner runs, the finding transitions, the override decisions, and the retest closures, with actor and date per step so the audit trail holds up at fieldwork
Honest scope: where SecPortal stops and the rest of the toolchain takes over
SecPortal is the operating record and the multi-framework evidence layer. It is not a replacement for the per-recommendation native benchmark scanner, the configuration management tooling that performs the remediation, or the asset management platform that carries the inventory. The honest scope statement below names where SecPortal sits in the toolchain and where the programme continues to operate other tools alongside.
- SecPortal does not ship a packaged CIS-CAT-style benchmark scanner inside the platform. Programmes that need the per-recommendation native scanner output operate CIS-CAT Pro, CIS-CAT Lite, or a commercial scanner (Nessus, Tenable, Rapid7 InsightVM, Wiz, Prisma Cloud, Defender for Cloud) that produces benchmark-tagged findings and import the per-recommendation output into the workspace
- SecPortal does not pre-map the workspace controls to the full CIS Benchmark catalogue automatically. The compliance tracking feature carries the framework templates and the crosswalk between frameworks; the per-asset benchmark recommendation status is captured on the engagement record and the finding record
- SecPortal does not auto-remediate failed benchmark recommendations against the asset. Remediation runs against the named owner and the configuration management tooling the programme already operates (Ansible, Puppet, Chef, SaltStack, Microsoft Intune, AWS Systems Manager, Azure Automation, Terraform); the workspace records the remediation owner, the planned action, the actual action, and the retest evidence
- SecPortal does not ship packaged Jira, ServiceNow, Slack, SIEM, SOAR, CMDB, or HRIS integrations. The benchmark register sits in the workspace as the durable record; teams that operate ticketing or change management in other systems carry the work item out and bring the evidence back in
- SecPortal does not classify CIS Benchmark versions for the team automatically. The benchmark version per asset is a deliberate scope decision captured on the engagement record so the assessor reads the same version the programme committed to
For programmes that need a parallel prioritised technical control set, the Essential Eight catalogue covers a similar configuration baseline discipline under the Australian Government Protective Security Policy Framework with a maturity model rather than a Level 1 and Level 2 profile pair. For the broader programme-layer cyber hygiene catalogue the Benchmarks support, the CIS Critical Security Controls page covers the 18 controls and 153 safeguards that the per-asset benchmark evidence rolls up into.
Looking for the assessor-side workflow that brings the benchmark evidence into a multi-framework audit? The compliance audits use case captures how to run multi-framework assessments where benchmark evidence is reused across ISO 27001, SOC 2, PCI DSS, NIST 800-53, and NIST CSF control mappings without rebuilding the bundle from scratch. Security leadership reporting covers how the per-asset benchmark posture rolls up into the board-level configuration assurance view.
Key control areas
SecPortal helps you track and manage compliance across these domains.
Operating system benchmarks
Operating system benchmarks cover the major server and workstation platforms (Red Hat Enterprise Linux, CentOS, Ubuntu Server and LTS, Debian, Rocky Linux, Alma Linux, SUSE Linux Enterprise, Oracle Linux, Amazon Linux, Microsoft Windows Server, Microsoft Windows desktop, macOS, Solaris, AIX, IBM i). Each benchmark prescribes file permissions, account configuration, service hardening, kernel parameters, audit configuration, logging configuration, network configuration, software updates, system maintenance, and the explicit commands to verify each setting. The Level 1 profile is the practical baseline; the Level 2 profile adds the controls that may break functionality and require explicit risk acceptance. Authenticated scans against the host produce the evidence per check; the workspace record holds the result, the remediation owner, and the next assessment date.
Cloud foundations benchmarks
Cloud benchmarks cover account-level and service-level configuration for AWS (CIS AWS Foundations Benchmark), Azure (CIS Microsoft Azure Foundations Benchmark), Google Cloud (CIS Google Cloud Platform Foundations Benchmark), Oracle Cloud (CIS OCI Foundations Benchmark), IBM Cloud, and Alibaba Cloud. Each benchmark covers identity and access management, logging and monitoring, networking, storage, and platform-specific services. The benchmark output is the gap list per account, per region, per service that the cloud security or platform engineering team carries on the same workspace as the application scan output, so an account that fails a CIS AWS check sits in the same backlog as the application that runs inside it.
Container and Kubernetes benchmarks
Container benchmarks cover Docker (CIS Docker Benchmark) and Kubernetes (CIS Kubernetes Benchmark) plus the platform-specific distributions (CIS Amazon EKS Benchmark, CIS Azure Kubernetes Service Benchmark, CIS Google Kubernetes Engine Benchmark, CIS Red Hat OpenShift Benchmark). Each benchmark covers the daemon and runtime configuration, image and registry hygiene, container security profile, pod security policies, the control plane configuration, the worker node configuration, the policies and network configuration, the managed service controls, and the audit logging baseline. Code scanning against IaC manifests catches part of the picture at the source; the rest sits on the cluster and is captured against the live configuration during the authenticated assessment window.
Network device and infrastructure benchmarks
Network benchmarks cover Cisco (IOS Router, IOS Switch, ASA Firewall, NX-OS, Wireless LAN Controller), Juniper, Palo Alto (PAN-OS), Check Point, Fortinet (FortiGate), and the major load balancer and storage platforms. Each benchmark covers management plane hardening, authentication and accounting, control plane hardening, data plane hardening, configuration management, and logging. The benchmark evidence pairs with the network architecture review and the change record so the configuration baseline reads against the documented design rather than against an unowned snapshot.
Mobile, server software, desktop, and database benchmarks
The catalogue extends across mobile (Apple iOS, Apple iPadOS, Google ChromeOS, Google Android), server software (Apache HTTP Server, NGINX, Microsoft IIS, BIND DNS, OpenLDAP, Apache Tomcat), desktop software (Microsoft Office, Microsoft 365 Apps for Enterprise, Mozilla Firefox, Google Chrome, Microsoft Edge), and database platforms (Microsoft SQL Server, Oracle Database, IBM Db2, MariaDB, MongoDB, PostgreSQL). Each benchmark is the prescriptive baseline against the named version, so the workspace record names the platform, the version, the profile (Level 1 or Level 2), and the assessment cycle.
CIS Benchmark Level 1 versus Level 2 profiles
Each CIS Benchmark organises recommendations into Level 1 (the practical baseline that does not significantly impact functionality) and Level 2 (the stricter baseline that may impact functionality, performance, or compatibility and typically requires explicit acceptance). Some benchmarks also publish profile variants per deployment context (server vs workstation, domain-joined vs standalone, on-premises vs cloud, container host vs cluster control plane). The profile decision is the scoping decision the programme has to defend at audit: the benchmark version chosen, the profile selected, the recommendations deferred or compensated, and the rationale per deviation. The workspace record captures the profile choice on the engagement scope so each finding ties back to the profile it was assessed against.
Scored versus Not Scored recommendations
CIS Benchmarks classify each recommendation as Scored or Not Scored. Scored recommendations are objectively measurable (the audit command returns a specific value, the file permission is exactly the prescribed bitmask, the registry key holds the prescribed setting) and the benchmark score reads against compliance with the Scored items. Not Scored recommendations require operator judgement (a policy must exist, a process must be defined, a procedural control must be in place) and the benchmark expects evidence of the procedural control rather than a binary check. Scanners that produce a CIS benchmark score read against the Scored items only; Not Scored items still need to be evidenced in the workspace alongside the policy artefact and the implementation record.
How CIS Benchmarks relate to CIS Controls and other frameworks
CIS Benchmarks and CIS Critical Security Controls are companion catalogues with different scopes. The Controls are the 18 prioritised cyber programme priorities and 153 safeguards that describe what a security team should do. The Benchmarks are the prescriptive configuration baselines that describe how specific technologies should be configured. The Controls reference the Benchmarks for the configuration evidence in Control 4 (Secure Configuration of Enterprise Assets and Software). External frameworks read the Benchmark output as evidence: ISO 27001 Annex A 8.9 configuration management, SOC 2 CC6.6 logical access security measures, PCI DSS Requirement 2 secure configuration standards, NIST SP 800-53 CM-6 configuration settings, and NIST CSF 2.0 PR.PS-01 configuration management practices each accept CIS Benchmark assessment as the underlying configuration baseline evidence.
Related features
Compliance tracking without a full GRC platform
Vulnerability management software that tracks every finding
Test web apps behind the login
Find vulnerabilities before they ship
Monitor continuously catch regressions early
AI-powered reports in seconds, not days
Orchestrate every security engagement from start to finish
Every action recorded across the workspace
Document management for every security engagement
Run CIS Benchmark assessments on one operating record
Hold the scope decision, the benchmark version and profile, per-recommendation evidence, gap findings with owner and target date, retest results, and the multi-framework crosswalk on one workspace. Carry the same record into ISO 27001, SOC 2, PCI DSS, NIST 800-53, and NIST CSF reads without rebuilding the evidence pack. Start free.
No credit card required. Free plan available forever.