Secure Configuration for Hardware & Software on Mobile Devices, Laptops, Workstations & Servers
CIS Control 5
Establish, implement, and actively manage (track, report on, correct) the security configuration of mobile devices, laptops, servers, and workstations using a rigorous configuration management and change control process in order to prevent attackers from exploiting vulnerable services and settings.
Why is this Critical?
After developing and maintaining an accurate inventory of your hardware and software, it’s time to minimize your attack surface. By configuring these items properly, organizations can strengthen their security posture and avoid systems from being exploited. The default configuration settings for most platforms, applications, and devices are optimized for ease of use, not security. Open services and ports, unnecessary software, old vulnerabilities can all be exploited in their default state. For this reason, organizations must maintain standard security configuration standards for all operating systems and software.