{"id":166,"date":"2011-06-18T15:42:00","date_gmt":"2011-06-18T15:42:00","guid":{"rendered":"https:\/\/belayclientstaging.zone\/securityeverafter\/2011\/06\/18\/control-3-secure-configurations-for-hardware-and-software-on-laptops-workstations-and-servers\/"},"modified":"2011-06-18T15:42:00","modified_gmt":"2011-06-18T15:42:00","slug":"control-3-secure-configurations-for-hardware-and-software-on-laptops-workstations-and-servers","status":"publish","type":"post","link":"https:\/\/securityeverafter.com\/control-3-secure-configurations-for-hardware-and-software-on-laptops-workstations-and-servers\/","title":{"rendered":"Control 3 – Secure Configurations for Hardware and Software on Laptops, Workstations, and Servers"},"content":{"rendered":"

Control 3 builds on the previous two controls, Inventory of Authorized and Unauthorized Devices<\/a>
and
Inventory of Authorized and Unauthorized Software<\/a>.<\/p>\n

The intent of this control is to develop secure configurations for your systems and montior for any deviation from this standard. To implement this control, you must invest in some manual work in making configuration standards and then regular and automated comparison to these standards using readily available tools.<\/p>\n

The real work in this control starts by reviewing configuration guides from several expert sources. These resources have detailed guides that explain the security considerations of each setting. It is a considerable amount of effort to review these documents in detail, however going through this process will help you better understand your system settings. It will also undoubtedly make you more aware of the importance better protecting your systems from attackers.<\/p>\n

Guides that will help<\/u>:<\/p>\n