This article has been indexed from CSO Online
Secure configurations are a key best practice for limiting an organization’s cyber vulnerabilities. Since applications, hardware, and technology systems typically ship with default settings, it’s important to review and implement recommended guidance. In this article, the Center for Internet Security (CIS) offers advice and best practices.
Configure Systems Securely with the CIS Benchmarks
The CIS Benchmarks are secure configuration guidelines covering 100+ technologies for 25+ product vendor families. They are the only consensus-based secure configuration guidelines both developed and accepted by government, business, and academia worldwide. CIS Benchmarks are referenced by other frameworks such as PCI DSS, FISMA, HIPAA, and more.
Read the original article: BrandPost: How to Implement Secure Configurations Faster Than Ever