this post was submitted on 11 Apr 2024
3 points (100.0% liked)

cybersecurity

64 readers
2 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Community Rules

Enjoy!

founded 1 year ago
MODERATORS
 

What sources of technical controls does your organization use?

Do you base device/operating system configurations on:

  • CIS workbench?
  • NIST/STIG?
  • Microsoft best practice?
  • Google searches and 'that looks good'?

How closely rigorously does your organization enforce change management for policies or settings?

  • Can you change GPOs/Linux/Network device settings as needed?
  • During maintenance window?
  • After a group meeting with code/change review and some sort of approval authority?
top 3 comments
sorted by: hot top controversial new old
[–] scytale@lemm.ee 2 points 7 months ago (1 children)

ISO27001 for policy development. CIS benchmarks for configuration. CIS controls for assessments. NIST for guidelines.

[–] redfox@infosec.pub 1 points 7 months ago

How far do you guys go?

'All of it's or until it's inconvenient?

What's the pain tolerance for when everyone says it makes the job too hard?

Ever compared CIS controls to STIG ACAP?

I've only ever used SCAP for a few reasons z but one being it's free.

[–] vk6flab@lemmy.radio 1 points 7 months ago

In my experience the difference between theory and practice is that in theory and organisation claims to be certified in all the right ways, but in practice the CEO has a nephew who is "good with computers".

What I've yet to see in 40 years in this profession is anything that assumes that you will be compromised and what you might put in place before that actually happens.