[cs615asa] Blue Team Link Week 10

Huajie Xu hxu35 at stevens.edu
Mon Apr 8 18:11:07 EDT 2019


Hello everyone,

This week, Blue Team found an article talking about the importance of Configuration Management, the 4 stages to robust SCM, and other things an administrator should consider while implementing Sonfiguration Management.

According to the author, SCM can not only identify misconfigurations that make the systems vulnerable but can also identify “unusual” changes to critical files or registry keys. The 4 stages are: Device Discovery, Establish Configuration Baselines, Assert Alert and Report changes and Remediate.

There are also other considerations such as Policy creation and management. Although the configuration management process is complex, works will be handled properly through automation if using the right SCM methods.

https://www.tripwire.com/state-of-security/security-data-protection/security-configuration-management/why-security-configuration-management-matters/
[https://www.tripwire.com/state-of-security/wp-content/uploads/sites/3/thumb_shutterstock_279097199_1024.jpg]<https://www.tripwire.com/state-of-security/security-data-protection/security-configuration-management/why-security-configuration-management-matters/>

Why Security Configuration Management (SCM) Matters<https://www.tripwire.com/state-of-security/security-data-protection/security-configuration-management/why-security-configuration-management-matters/>
Without a security configuration management plan, the task of maintaining secure configurations even on a single server is daunting. But if you’re using the right SCM tool, the bulk of the work will be handled for you through automation.
www.tripwire.com


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.stevens.edu/pipermail/cs615asa/attachments/20190408/817dbec3/attachment-0001.html>


More information about the cs615asa mailing list