Technical Controls
from redfox@infosec.pub to cybersecurity@infosec.pub on 11 Apr 2024 21:56
https://infosec.pub/post/10949132
from redfox@infosec.pub to cybersecurity@infosec.pub on 11 Apr 2024 21:56
https://infosec.pub/post/10949132
What sources of technical controls does your organization use?
Do you base device/operating system configurations on:
- CIS workbench?
- NIST/STIG?
- Microsoft best practice?
- Google searches and ‘that looks good’?
How closely rigorously does your organization enforce change management for policies or settings?
- Can you change GPOs/Linux/Network device settings as needed?
- During maintenance window?
- After a group meeting with code/change review and some sort of approval authority?
threaded - newest
ISO27001 for policy development. CIS benchmarks for configuration. CIS controls for assessments. NIST for guidelines.
How far do you guys go?
'All of it’s or until it’s inconvenient?
What’s the pain tolerance for when everyone says it makes the job too hard?
Ever compared CIS controls to STIG ACAP?
I’ve only ever used SCAP for a few reasons z but one being it’s free.
In my experience the difference between theory and practice is that in theory and organisation claims to be certified in all the right ways, but in practice the CEO has a nephew who is “good with computers”.
What I’ve yet to see in 40 years in this profession is anything that assumes that you will be compromised and what you might put in place before that actually happens.