Security guidance always recommends systems and applications in your environment are securely configured, but what exactly does that really mean? How do you implement it? How do you maintain it? This presentation will provide a methodology on how to implement and maintain secure configuration in your environment by following a five-phased approach: Identify, Assess, Apply, Verify, Monitor.
Session Objectives: - Gain a better understanding of industry recognized hardening standards such as CIS Benchmarks, understand the common pitfalls encountered when trying to implement secure configuration in environments and advice on overcoming them, and a five-phased approach and actionable takeaways for implementing and maintaining secure configurations.
900 Barton Springs Rd
Austin, TX 78704
United States