[cs615asa] Blue Team Link Week 11

Brett Biggs bbiggs at stevens.edu
Mon Apr 15 12:22:20 EDT 2019


The blue team accidentally sent out our week 11 link last week. So this week we have the following article about Backups and Recovery and I have kept this write up below from last week as a reminder of our link for Configuration Management.

https://www.information-management.com/slideshow/avoiding-the-7-biggest-threats-to-data-backup

As we noted in class last week this article discusses the topics of backing up data shouldn't mean back-of-mind security, how administrators are not backing up properly in Office 365 (which we did not discuss but is a major issue for lots of organizations), testing your backups to ensure they will actually restore your data, ransomware affecting your backups, and maintaining a backup system in the same network operating environment may be easy, but it isn't smart.

These are all important factors to consider when implementing backups and restores, of which most we covered last week. As for this weeks article please see below.

Thanks,

Blue Team

From: cs615asa-bounces at lists.stevens.edu <cs615asa-bounces at lists.stevens.edu> On Behalf Of Huajie Xu
Sent: Monday, April 08, 2019 6:11 PM
To: cs615asa at lists.stevens.edu
Subject: [cs615asa] Blue Team Link Week 10

Hello everyone,

This week, Blue Team found an article talking about the importance of Configuration Management, the 4 stages to robust SCM, and other things an administrator should consider while implementing Sonfiguration Management.

According to the author, SCM can not only identify misconfigurations that make the systems vulnerable but can also identify "unusual" changes to critical files or registry keys. The 4 stages are: Device Discovery, Establish Configuration Baselines, Assert Alert and Report changes and Remediate.

There are also other considerations such as Policy creation and management. Although the configuration management process is complex, works will be handled properly through automation if using the right SCM methods.

https://www.tripwire.com/state-of-security/security-data-protection/security-configuration-management/why-security-configuration-management-matters/<https://nam02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.tripwire.com%2Fstate-of-security%2Fsecurity-data-protection%2Fsecurity-configuration-management%2Fwhy-security-configuration-management-matters%2F&data=02%7C01%7Cbbiggs%40stevens.edu%7Cad188874aa754a62acca08d6bc6f1ced%7C8d1a69ec03b54345ae21dad112f5fb4f%7C0%7C0%7C636903582798500653&sdata=qZmiNEHGH0Cu9oc%2F9V9iSkBHCUdhQorLHSRVA6YXNmI%3D&reserved=0>
[https://www.tripwire.com/state-of-security/wp-content/uploads/sites/3/thumb_shutterstock_279097199_1024.jpg]<https://nam02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.tripwire.com%2Fstate-of-security%2Fsecurity-data-protection%2Fsecurity-configuration-management%2Fwhy-security-configuration-management-matters%2F&data=02%7C01%7Cbbiggs%40stevens.edu%7Cad188874aa754a62acca08d6bc6f1ced%7C8d1a69ec03b54345ae21dad112f5fb4f%7C0%7C0%7C636903582798500653&sdata=qZmiNEHGH0Cu9oc%2F9V9iSkBHCUdhQorLHSRVA6YXNmI%3D&reserved=0>

Why Security Configuration Management (SCM) Matters<https://nam02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.tripwire.com%2Fstate-of-security%2Fsecurity-data-protection%2Fsecurity-configuration-management%2Fwhy-security-configuration-management-matters%2F&data=02%7C01%7Cbbiggs%40stevens.edu%7Cad188874aa754a62acca08d6bc6f1ced%7C8d1a69ec03b54345ae21dad112f5fb4f%7C0%7C0%7C636903582798510667&sdata=XgvRo%2BKIcuFiBihoTlk5tAEPjyyzIcSAdgx9L%2BiK%2FZQ%3D&reserved=0>
Without a security configuration management plan, the task of maintaining secure configurations even on a single server is daunting. But if you're using the right SCM tool, the bulk of the work will be handled for you through automation.
www.tripwire.com<http://www.tripwire.com>


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.stevens.edu/pipermail/cs615asa/attachments/20190415/1a4fe1b7/attachment.html>


More information about the cs615asa mailing list