https://store-images.s-microsoft.com/image/apps.58114.167e89bd-571d-4a38-a7d6-9325ee107030.b62d4160-3ac3-4cc2-9933-fed1caaa5ad3.6db414c1-0066-40bd-a85e-9cd251cc8e6d

CIS Debian Linux 10 Benchmark L1

Center For Internet Security, Inc. 
Hardened according to a CIS Benchmark - the consensus-based best practice for secure configuration.
https://store-images.s-microsoft.com/image/apps.16437.167e89bd-571d-4a38-a7d6-9325ee107030.b62d4160-3ac3-4cc2-9933-fed1caaa5ad3.cc365078-9f12-49de-b6e3-2c29e4e37c51
/images/videoOverlay.png
https://store-images.s-microsoft.com/image/apps.16437.167e89bd-571d-4a38-a7d6-9325ee107030.b62d4160-3ac3-4cc2-9933-fed1caaa5ad3.cc365078-9f12-49de-b6e3-2c29e4e37c51
/images/videoOverlay.png
https://store-images.s-microsoft.com/image/apps.31332.167e89bd-571d-4a38-a7d6-9325ee107030.b62d4160-3ac3-4cc2-9933-fed1caaa5ad3.6006084a-d36e-42b6-8fe1-6c223006f8a0
https://store-images.s-microsoft.com/image/apps.48469.167e89bd-571d-4a38-a7d6-9325ee107030.b62d4160-3ac3-4cc2-9933-fed1caaa5ad3.697be2e3-4b2b-4a40-9fc5-08b4725a44f5
https://store-images.s-microsoft.com/image/apps.31065.167e89bd-571d-4a38-a7d6-9325ee107030.b62d4160-3ac3-4cc2-9933-fed1caaa5ad3.d41206cd-3ad2-4ea3-ac2a-190fb4291def

CIS Debian Linux 10 Benchmark L1

Center For Internet Security, Inc. 

Hardened according to a CIS Benchmark - the consensus-based best practice for secure configuration.

This image of CIS Debian Linux 10 is preconfigured by CIS to the recommendations in the associated CIS Benchmark. CIS Benchmarks are vendor agnostic, consensus-based security configuration guides both developed and accepted by government, business, industry, and academia. CIS Benchmarks also provide a foundation to comply with numerous cybersecurity frameworks.

Cloud environments and operating systems are not secure by default. Launching an image hardened according to the trusted security configuration baselines prescribed by a CIS Benchmark will reduce cost, time, and risk to an organization. This image has been hardened by CIS and is configured with the majority of the recommendations included in the free PDF version of the corresponding CIS Benchmark. The Level 1 Profile settings within the CIS Benchmark have been applied with the intent to provide a clear security benefit without inhibiting the utility of the technology beyond acceptable means.

To learn more or access the corresponding CIS Benchmark, please visit the Center for Internet Security website or visit our community platform, CIS WorkBench.

The Benchmark that is the basis for this image was developed for system and application administrators, security specialists, auditors, help desk professionals, and platform deployment personnel who plan to develop, deploy, assess, or secure solutions that incorporate Debian Linux 10. CIS Benchmarks are developed in a unique consensus-based process comprised of hundreds of security professionals worldwide as de facto, best-practice configuration standards.

https://store-images.s-microsoft.com/image/apps.16437.167e89bd-571d-4a38-a7d6-9325ee107030.b62d4160-3ac3-4cc2-9933-fed1caaa5ad3.cc365078-9f12-49de-b6e3-2c29e4e37c51
/images/videoOverlay.png
https://store-images.s-microsoft.com/image/apps.16437.167e89bd-571d-4a38-a7d6-9325ee107030.b62d4160-3ac3-4cc2-9933-fed1caaa5ad3.cc365078-9f12-49de-b6e3-2c29e4e37c51
/images/videoOverlay.png
https://store-images.s-microsoft.com/image/apps.31332.167e89bd-571d-4a38-a7d6-9325ee107030.b62d4160-3ac3-4cc2-9933-fed1caaa5ad3.6006084a-d36e-42b6-8fe1-6c223006f8a0
https://store-images.s-microsoft.com/image/apps.48469.167e89bd-571d-4a38-a7d6-9325ee107030.b62d4160-3ac3-4cc2-9933-fed1caaa5ad3.697be2e3-4b2b-4a40-9fc5-08b4725a44f5
https://store-images.s-microsoft.com/image/apps.31065.167e89bd-571d-4a38-a7d6-9325ee107030.b62d4160-3ac3-4cc2-9933-fed1caaa5ad3.d41206cd-3ad2-4ea3-ac2a-190fb4291def