var _gaq = _gaq || []; _gaq.push(['_setAccount', 'UA-35754314-2']); _gaq.push(['_setDomainName', 'securityeverafter.com']); _gaq.push(['_trackPageview']); (function() { var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true; ga.src = ('https:' == document.location.protocol ? 'https://ssl' : 'http://www') + '.google-analytics.com/ga.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(ga, s); })();

Saturday, June 18, 2011

Control 3 - Secure Configurations for Hardware and Software on Laptops, Workstations, and Servers

Control 3 builds on the previous two controls, Inventory of Authorized and Unauthorized Devices
and Inventory of Authorized and Unauthorized Software.

The intent of this control is to develop secure configurations for your systems and montior for any deviation from this standard. To implement this control, you must invest in some manual work in making configuration standards and then regular and automated comparison to these standards using readily available tools.

The real work in this control starts by reviewing configuration guides from several expert sources. These resources have detailed guides that explain the security considerations of each setting. It is a considerable amount of effort to review these documents in detail, however going through this process will help you better understand your system settings. It will also undoubtedly make you more aware of the importance better protecting your systems from attackers.

Guides that will help:

Tools that will help:

4 comments:

  1. Security can always in an issue in software and hardware for laptops or desktops. These guidelines can really help in a lot of ways.

    Fallowfield PC Repair

    ReplyDelete
  2. To implement this control, you must invest in some manual work in making configuration standards and then regular and automated comparison to these standards using readily available tools. laptop finder

    ReplyDelete
  3. Security can always in an issue in software and hardware you must invest in some manual work in making configuration standards and then regular and automated comparison

    ReplyDelete
  4. As much as I love laptops, I find myself using the tablet more.

    ReplyDelete