New York Tech Media
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
New York Tech Media
No Result
View All Result
Home Cybersecurity

How to implement secure configurations more quickly

New York Tech Editorial Team by New York Tech Editorial Team
October 25, 2021
in Cybersecurity
0
How to implement secure configurations more quickly
Share on FacebookShare on Twitter

Secure configurations are a key best practice for limiting an organization’s cyber vulnerabilities. Since systems don’t ship securely, it’s important to review and implement recommended guidance.

Configure systems securely with the CIS Benchmarks

The CIS Benchmarks are secure configuration guidelines covering 100+ technologies for 25+ product vendor families. They are the only consensus-based secure configuration guidelines both developed and accepted by government, business, and academia worldwide. CIS Benchmarks are referenced by other frameworks such as PCI DSS, FISMA, HIPAA, and more.

The Center for Internet Security (CIS) has worked with a global community of cybersecurity experts for 20 years to identify, validate, and promote cybersecurity best practices. The CIS Benchmarks security recommendations are released for free in PDF format to help every organization secure their systems and data.

Download CIS Benchmarks. No-cost guidance is also available for cloud technologies through the CIS Foundation Benchmarks.

CIS Build Kits – A helpful implementation tool

While these no-cost resources are great, it can be time-consuming and challenging to implement them manually from a PDF. This is why we’ve developed CIS Build Kits. These automated tools provide IT professionals with the option for both a rapid implementation of CIS Benchmark recommendations, along with confirmation that the implementation has been performed correctly.

CIS Build Kits are automated, efficient, repeatable, and scalable resources. They can be applied via the group policy management console in Windows, or through a shell script in Linux (Unix, *nix) environments. They can be tailored (customized) to an organization’s particular use case. Combined with the use of other CIS SecureSuite resources, Build Kits reduce the time to implement.

Video: Easily Customize and Apply Secure Configurations with CIS Build Kits.

3 tips for using CIS Build Kits

Here are three of the most important tips for making sure you successfully use Build Kits:

1. Scan and review CIS Benchmark recommendations - Save time by using CIS-CAT Pro, a configuration assessment tool, to scan your environment. Once complete, review the results. This will help to identify any areas not configured to the CIS Benchmark, allow you to review the data, and help determine any potential impacts of implementing the setting. You can customize them as needed.

2. Use a test environment - Apply CIS Build Kits in a test environment first. Testing first helps you avoid any policy or performance conflicts by modifying the Build Kits to best fit your organization’s environment. Take a look at the ReadMe file within the Build Kit for instructions based on the system as the application will be unique depending on the system involved.

3. Review settings - Before deploying, review the settings once more using CIS-CAT Pro. Be sure to pay attention to the settings noted in each CIS Benchmark that must be applied manually, such as root or admin configurations.

Once you’ve completed these steps you’re ready to deploy in a live environment.

Sample Build Kits

Want to see what Build Kits have to offer? Try a sample CIS Build Kit today and see how easy it is to start secure and stay secure with CIS resources. These sample Build Kits contain a subset of the recommendations within the CIS Benchmark and are not intended to be fully implemented, but rather to provide you a snapshot of what to expect with the full CIS Build Kit. Samples include:

  • A sample CIS Build Kit for Microsoft Windows: Group Policy Objects (GPOs) engineered to work with most Microsoft Windows systems that rapidly apply select CIS Benchmark configuration settings to harden workstations, servers, and other Windows computing environments.
  • A sample CIS Build Kit for Linux: Custom script designed to harden a variety of Linux environments by applying secure CIS Benchmark configurations with a few simple clicks. The Linux Build Kit evaluates the entire CIS Benchmark and creates a log file that lists the recommendations that will require manual review/remediation.

Membership and more

Complete CIS Build Kits are available to CIS SecureSuite Members as part of their Membership, and can be easily downloaded via CIS WorkBench. More than 50 Build Kits are currently available.

Membership includes access to full-format, machine-readable CIS Benchmarks, the CIS-CAT Pro configuration assessment tool with remote assessment capabilities, creation of custom configuration policy via CIS WorkBench, CIS CSAT Pro for assessing implementation of the CIS Controls, and more.

Become a CIS SecureSuite Member today!

Credit: Source link

Previous Post

Despite spending millions on bot mitigation, 64% of organizations lost revenue due to bot attacks

Next Post

Network and IoT security in a zero trust security model

New York Tech Editorial Team

New York Tech Editorial Team

New York Tech Media is a leading news publication that aims to provide the latest tech news, fintech, AI & robotics, cybersecurity, startups & leaders, venture capital, and much more!

Next Post
Network and IoT security in a zero trust security model

Network and IoT security in a zero trust security model

  • Trending
  • Comments
  • Latest
Meet the Top 10 K-Pop Artists Taking Over 2024

Meet the Top 10 K-Pop Artists Taking Over 2024

March 17, 2024
Panther for AWS allows security teams to monitor their AWS infrastructure in real-time

Many businesses lack a formal ransomware plan

March 29, 2022
Zach Mulcahey, 25 | Cover Story | Style Weekly

Zach Mulcahey, 25 | Cover Story | Style Weekly

March 29, 2022
10 Raunchy Movies on Netflix You Won’t Regret Watching

10 Raunchy Movies on Netflix You Won’t Regret Watching

May 20, 2024
How To Pitch The Investor: Ronen Menipaz, Founder of M51

How To Pitch The Investor: Ronen Menipaz, Founder of M51

March 29, 2022
Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

March 29, 2022
Startups On Demand: renovai is the Netflix of Online Shopping

Startups On Demand: renovai is the Netflix of Online Shopping

2
Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

1
Menashe Shani Accessibility High Tech on the low

Revolutionizing Accessibility: The Story of Purple Lens

1

Netgear announces a $1,500 Wi-Fi 6E mesh router

0
These apps let you customize Windows 11 to bring the taskbar back to life

These apps let you customize Windows 11 to bring the taskbar back to life

0
This bipedal robot uses propeller arms to slackline and skateboard

This bipedal robot uses propeller arms to slackline and skateboard

0
laptop on glass table

Automat-it Cuts Deployment Friction as Monce Scales AI Order Processing on AWS

April 13, 2026
Lee's Famous Recipe Chicken

Why Lee’s Famous Recipe Chicken Is Betting on Hi Auto to Quietly Rewire the Drive-Thru

April 9, 2026
computer generated image of letters

San Francisco Tribune Lists 11 HumanX Startups Moving AI Closer to the Operating Core

April 8, 2026
Impala CEO and Highrise AI CEO

The Industrialization of AI Infrastructure: What Impala and Highrise AI Reveal About the Next Scaling Frontier

April 7, 2026
Employee Time Tracking

What is an Employee Time Tracking Solution? A Definite Guide for 2026

March 31, 2026
Voltify founders

Voltify Raises $30 Million Seed Round as It Challenges $1 Trillion Rail Electrification Model

March 31, 2026

Recommended

laptop on glass table

Automat-it Cuts Deployment Friction as Monce Scales AI Order Processing on AWS

April 13, 2026
Lee's Famous Recipe Chicken

Why Lee’s Famous Recipe Chicken Is Betting on Hi Auto to Quietly Rewire the Drive-Thru

April 9, 2026
computer generated image of letters

San Francisco Tribune Lists 11 HumanX Startups Moving AI Closer to the Operating Core

April 8, 2026
Impala CEO and Highrise AI CEO

The Industrialization of AI Infrastructure: What Impala and Highrise AI Reveal About the Next Scaling Frontier

April 7, 2026

Categories

  • AI & Robotics
  • Benzinga
  • Cybersecurity
  • FinTech
  • New York Tech
  • News
  • Startups & Leaders
  • Venture Capital

Tags

AI AI QSRs Allseated Automat-it AWS B2B marketing Business CISO CISO Whisperer Collaborations Companies To Watch cryptocurrency Cybersecurity Entrepreneur Fetcherr Finance FINQ Fintech Funding Announcement hi-tech Hi Auto Impala Investing Investors investorsummit Israel israelitech Leaders LinkedIn Leaders Metaverse Mindset Minnesota omri hurwitz PointFive PR QSR Real Estate start- up startupnation Startups Startups On Demand Tech Tech leaders Unlimited Robotics VC
  • Contact Us
  • Privacy Policy
  • Terms and conditions

© 2024 All Rights Reserved - New York Tech Media

No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital

© 2024 All Rights Reserved - New York Tech Media