this post was submitted on 11 Apr 2024
3 points (100.0% liked)

cybersecurity

64 readers
2 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Community Rules

Enjoy!

founded 1 year ago
MODERATORS
 

What sources of technical controls does your organization use?

Do you base device/operating system configurations on:

  • CIS workbench?
  • NIST/STIG?
  • Microsoft best practice?
  • Google searches and 'that looks good'?

How closely rigorously does your organization enforce change management for policies or settings?

  • Can you change GPOs/Linux/Network device settings as needed?
  • During maintenance window?
  • After a group meeting with code/change review and some sort of approval authority?
you are viewing a single comment's thread
view the rest of the comments
[โ€“] scytale@lemm.ee 2 points 7 months ago (1 children)

ISO27001 for policy development. CIS benchmarks for configuration. CIS controls for assessments. NIST for guidelines.

[โ€“] redfox@infosec.pub 1 points 7 months ago

How far do you guys go?

'All of it's or until it's inconvenient?

What's the pain tolerance for when everyone says it makes the job too hard?

Ever compared CIS controls to STIG ACAP?

I've only ever used SCAP for a few reasons z but one being it's free.