Secure Configuration of Enterprise Assets and Software v2


Good security isn’t about buying a solution. It’s about configuring your environment in a way that reduces the attack surface and makes the business more resilient against threats.
— Richard Bejtlich, Security Strategist, Former CSO at Mandiante Source
 

Overview

Harden your systems by applying secure configuration baselines to operating systems, applications, and network devices. Disable unnecessary services and protocols, close unused ports, and enforce strong passwords. Utilize configuration management tools to automate and standardize secure configurations across your environment. Regularly audit configurations for deviations from established baselines and promptly remediate any discrepancies.

Best Practices

For engineers, the focus is on technical implementation, including creating and maintaining secure baselines, automating configuration management, conducting regular vulnerability scans, managing patches effectively, applying the principle of least privilege, securing network configurations, and implementing continuous monitoring.

For management, the emphasis is on governance, policy-making, and resource allocation. This includes establishing clear policies, ensuring adequate resources are available, mandating regular audits, conducting risk assessments, investing in training and awareness programs, managing vendor security, and establishing metrics for reporting and improvement.


These steps are a basic steps for remediation for Windows, OSX, Linux, AWS, GCP, and Azure. As tool change, remediation advice changes. This entry maps to the code or ID referenced in the entry. Please check back regularly for updates to this library entry.


For Engineers

Implement Secure Baselines

  • Develop and maintain secure configuration baselines for all types of systems (e.g., servers, workstations, network devices).

  • Example: Create a hardened Windows Server template that disables unnecessary services, applies the latest security patches, and configures strong password policies.

Automate Configuration Management

  • Use configuration management tools to automate the application and maintenance of secure configurations.

  • Example: Implement Ansible playbooks to consistently apply and enforce security configurations across Linux servers.

Regular Vulnerability Scanning

  • Conduct regular vulnerability scans to identify misconfigurations and security weaknesses.

  • Example: Use tools like Nessus, Qualys, or OpenVAS to perform weekly scans of all systems and promptly address any critical findings.

Patch Management

  • Establish a robust patch management process to keep all systems and software up-to-date.

  • Example: Implement a patch management system like WSUS for Windows environments, ensuring critical security updates are applied within 14 days of release.

Principle of Least Privilege

  • Apply the principle of least privilege to all system configurations.

  • Example: For a web server, only enable the necessary ports (e.g., 80 and 443) and services (e.g., HTTP/HTTPS), disabling all others.

Secure Network Configurations

  • Implement secure network configurations, including proper segmentation and firewall rules.

  • Example: Configure VLANs to separate development, production, and management networks, with strict firewall rules controlling inter-VLAN traffic.

Continuous Monitoring

  • Implement continuous monitoring to detect and alert on configuration changes.

  • Example: Use a Security Information and Event Management (SIEM) system to monitor for unauthorized changes to critical system files or configurations.

For Management

Establish Clear Policies

  • Develop and enforce clear policies for secure configurations across the organization.

  • Example: Create a policy that mandates all new systems must be built from approved, secure baseline images before being connected to the network.

Establish Clear Policies

  • Develop and enforce clear policies for secure configurations across the organization.

  • Example: Create a policy that mandates all new systems must be built from approved, secure baseline images before being connected to the network.

Resource Allocation

  • Ensure adequate resources (both personnel and tools) are allocated for maintaining secure configurations.

  • Example: Approve budget for a dedicated security engineer role and necessary tools like vulnerability scanners and configuration management software.

Regular Audits

  • Mandate regular audits of system configurations to ensure compliance with established baselines.

  • Example: Require quarterly audits of all production systems, with reports submitted to the CIO detailing compliance levels and any remediation efforts.

Risk Assessment

  • Conduct regular risk assessments to identify high-priority areas for secure configuration efforts.

  • Example: Perform an annual risk assessment to identify critical systems that require more frequent security reviews and stricter configuration controls.

 

Training and Awareness

  • Invest in training programs to ensure all IT staff understand the importance of secure configurations.

  • Example: Organize bi-annual security configuration workshops for IT staff, covering the latest best practices and emerging threats.

Vendor Management

  • Establish processes to ensure third-party vendors adhere to your secure configuration standards.

  • Example: Develop a vendor security assessment questionnaire that includes questions about their configuration management practices, to be completed before engaging with new vendors.

Metrics and Reporting

  • Establish key performance indicators (KPIs) for secure configurations and require regular reporting.

  • Example: Set a KPI that 95% of all systems must be compliant with the latest secure configuration baseline at all times, with monthly compliance reports to be reviewed in management meetings.

Remember, the specific implementation of these practices may vary depending on the organization's size, industry, and regulatory requirements. Regular review and updating of these practices is crucial to maintain an effective security posture.

Previous
Previous

Asset Inventory and Control v2

Next
Next

Account Management v2