官术网_书友最值得收藏!

Incorporating best practices

To finish off this chapter, we wanted to provide a checklist of the most important items that will help enforce your security baselines. The following list is ranked in order of importance as you look to build and enforce your baselines:

  • Select and deploy a framework to build a foundation.
  • Select a baseline foundation. We covered CIS and Windows security baselines in this chapter.
  • For your Windows devices, use the policy analyzer from the Microsoft SCT to review your baselines.
  • Create or use a Golden Image template for each use case that you can reuse and always keep up to date with the latest updates.
  • Build well-documented and easy-to-follow procedures that others can use and follow.
  • Use the automation of controls and tools to re-enforce the baseline—for example, MDM with Intune or Active Directory Group Policy.
  • Use compliance policies to validate whether controls are in place. This will also help with auditing devices that are non-compliant.
  • Implement a quarantine or risk access policy with non-compliant devices.
  • Implement efficient monitoring and reporting for device compliance. Power BI is a great way to visually provide reports.
  • Always keep up to date with both the Windows versions and the technology used to manage the devices. The modern world is very dynamic and moves at an extremely fast pace.

It's important to note that while creating a security framework and enforcing controls with full compliance is desirable, exceptions will need to be accounted for. It is recommended that your organization also includes a risk register that clearly documents the systems and applications that do not comply with the defined policies and standards. The register should identify all the risks as well as rate the implication or severity of each risk and its potential impact on the organization. These implications should not only be viewed from a security lens but should also identify potential legal liabilities and costs implications if the risks were exploited. Leadership should be made aware of these risks and should sign off on their acceptance. Furthermore, a stakeholder should be named as the accountable party and the register should be reviewed frequently to identify any possible solutions to mitigate the risks.

主站蜘蛛池模板: 德惠市| 隆林| 宁安市| 吴江市| 佛教| 南宁市| 佳木斯市| 同心县| 仙桃市| 二连浩特市| 万全县| 福州市| 东兴市| 湛江市| 马关县| 永清县| 星子县| 会泽县| 老河口市| 日喀则市| 晋中市| 墨江| 府谷县| 南安市| 鹤岗市| 汤阴县| 青州市| 蒙阴县| 正阳县| 齐河县| 隆林| 阳朔县| 桐城市| 花垣县| 博白县| 大同市| 尼玛县| 汝南县| 哈巴河县| 浦北县| 日喀则市|