{"id":3628,"date":"2026-04-12T16:50:22","date_gmt":"2026-04-12T14:50:22","guid":{"rendered":"https:\/\/www.steffiscloud.de\/?post_type=glossary&#038;p=3628"},"modified":"2026-04-12T16:50:25","modified_gmt":"2026-04-12T14:50:25","slug":"cis-controls","status":"publish","type":"glossary","link":"https:\/\/www.steffiscloud.de\/en\/glossary-en\/cis-controls\/","title":{"rendered":"CIS Controls"},"content":{"rendered":"<p>CIS Controls<br><br>CIS Controls (Center for Internet Security Controls) are a set of prioritized best practices designed to help organizations improve their <a class=\"glossaryLink\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt; &amp;lt;!-- wp:table --&amp;gt;\n&amp;lt;figure class=&amp;quot;wp-block-table&amp;quot;&amp;gt;&amp;lt;table class=&amp;quot;has-fixed-layout&amp;quot;&amp;gt;&amp;lt;tbody&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;Cybersecurity&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Cybersecurity refers to the protection of systems, networks, and data from digital attacks, unauthorized access, and damage.&amp;lt;\/td&amp;gt;&amp;lt;\/tr&amp;gt;&amp;lt;\/tbody&amp;gt;&amp;lt;\/table&amp;gt;&amp;lt;\/figure&amp;gt;\n&amp;lt;!-- \/wp:table --&amp;gt; &lt;\/div&gt;\" href=\"https:\/\/www.steffiscloud.de\/en\/glossary-en\/cybersecurity\/\" data-mobile-support=\"0\" data-gt-translate-attributes='[{\"attribute\":\"data-cmtooltip\", \"format\":\"html\"}]' tabindex=\"0\" role=\"link\">cybersecurity<\/a> posture. They provide actionable guidelines for protecting systems, networks, and data by focusing on critical security measures such as access control, vulnerability management, and continuous monitoring.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CIS Controls CIS Controls (Center for Internet Security Controls) are a set of prioritized best practices designed to help organizations [&#x2026;]<\/p>\n","protected":false},"author":1,"featured_media":0,"menu_order":158,"template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"glossary-categories":[],"glossary-tags":[],"glossary-languages":[19],"glossary-cat":[],"class_list":["post-3628","glossary","type-glossary","status-publish","hentry","glossary-languages-en"],"post_title":"CIS Controls","post_content":"<!-- wp:paragraph -->\n<p>CIS Controls<br><br>CIS Controls (Center for Internet Security Controls) are a set of prioritized best practices designed to help organizations improve their cybersecurity posture. They provide actionable guidelines for protecting systems, networks, and data by focusing on critical security measures such as access control, vulnerability management, and continuous monitoring.<\/p>\n<!-- \/wp:paragraph -->","related_terms":"","external_url":"","internal_reference_id":"","_links":{"self":[{"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/glossary\/3628","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/types\/glossary"}],"author":[{"embeddable":true,"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/users\/1"}],"version-history":[{"count":0,"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/glossary\/3628\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/media?parent=3628"}],"wp:term":[{"taxonomy":"glossary-categories","embeddable":true,"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/glossary-categories?post=3628"},{"taxonomy":"glossary-tags","embeddable":true,"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/glossary-tags?post=3628"},{"taxonomy":"glossary-languages","embeddable":true,"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/glossary-languages?post=3628"},{"taxonomy":"glossary-cat","embeddable":true,"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/glossary-cat?post=3628"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}