The hardening checklists are based on the comprehensive checklists produced CIS. The Information Security Office has distilled the CIS lists down to the most critical steps for your system, with a particular focus on configuration issues that are unique to the computing environment at The University of Texas at Austin.