0% found this document useful (0 votes)
28 views8 pages

Information Security Transformation-Nahil Mahmood-Lecture 109

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views8 pages

Information Security Transformation-Nahil Mahmood-Lecture 109

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

SECURITY HARDENING - SECURE SOFTWARE IMAGES

• CIS 20 CRITICAL
SECURITY CONTROLS
• CONTROL 5, VERSION 7
• Secure Configuration
for Hardware and
Software on Mobile
Devices, Laptops,
Workstations and
Servers

1
SECURITY HARDENING - SECURE SOFTWARE IMAGES

5.1 Establish Secure


Configurations
• Maintain documented,
standard security
configuration standards
for all authorized
operating systems and
software.

2
SECURITY HARDENING - SECURE SOFTWARE IMAGES

5.2 Maintain Secure


Images
• Maintain secure images
or templates for all
systems in the
enterprise based on the
organization's approved
configuration standards.
Any new system
deployment or existing
system that becomes
compromised should be
3
SECURITY HARDENING - SECURE SOFTWARE IMAGES

5.2 Maintain Secure


Images
• …imaged using one of
those images or
templates.

4
SECURITY HARDENING - SECURE SOFTWARE IMAGES

5.3 Securely Store Master


Images
• Store the master images
and templates on
securely configured
servers, validated with
integrity monitoring
tools, to ensure that
only authorized changes
to the images are
possible.

5
SECURITY HARDENING - SECURE SOFTWARE IMAGES

5.4 Deploy System


Configuration
Management Tools
• Deploy system
configuration
management tools that
will automatically
enforce and redeploy
configuration settings to
systems at regularly
scheduled intervals.

6
SECURITY HARDENING - SECURE SOFTWARE IMAGES

5.5 Implement Automated


Configuration Monitoring
Systems
• Utilize a Security
Content Automation
Protocol (SCAP)
compliant configuration
monitoring system to
verify all security
configuration elements,
catalog approved
exceptions, and alert..
7
SECURITY HARDENING - SECURE SOFTWARE IMAGES

5.5 Implement Automated


Configuration Monitoring
Systems
• …when unauthorized
changes occur.

END

You might also like