Inventory Management
Proactively Hardening Systems: Application and Version Hardening
The first article in this series examined configuration hardening, essentially looking at ports, processes and services as the “doors, gates and windows” into a network where security configuration management (SCM) becomes the ...
Configuration Hardening: Proactively Guarding Systems Against Intrusion
The concept of configuration hardening has nice imagery to it. When we use it to describe battle-hardened soldiers who have been tested in combat, a grim, determined image invariably leaps to mind ...
20 Critical Security Controls – Control 1: Inventory and Control of Hardware Assets
Today, I will be going over Control 1 from version 7 of the top 20 CIS Controls – Inventory and Control of Hardware Assets. I will go through the eight requirements and ...