CIS Security baseline Configuration Plan

Introduction

Governance and Compliance

Risk Assessment

Baseline Configuration Development

Implementation

Monitoring and Auditing

Change Management

Training and Awareness

Review and Maintenance

Incident Response

Conclusion

Related Checklists