Skip to Main Content
A CISO Guide to Cyber Resilience
book

A CISO Guide to Cyber Resilience

by Debra Baker
April 2024
Intermediate to advanced content levelIntermediate to advanced
238 pages
6h 10m
English
Packt Publishing
Content preview from A CISO Guide to Cyber Resilience

12

Secure Configuration Baseline

This chapter is about creating a secure configuration baseline. Remember that security is a journey, and you can’t do everything at once. This is why risk management is so important—being able to weigh your risks, impacts, likelihood, and budget considerations. The company you work for is a business, so you have to balance controls, risk, and budget. As far as executive management goes, they aren’t going to care as much about security as you do. We will discuss how to decide what controls should be enforced and what security baseline you should follow. Next, we’ll discuss CIS and STIGs, why to choose either one and the best way to go about deploying your new security baseline.

In this chapter, we’re going to ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Cyber Threat Intelligence

Cyber Threat Intelligence

Martin Lee
Mastering Cyber Intelligence

Mastering Cyber Intelligence

Jean Nestor M. Dahj

Publisher Resources

ISBN: 9781835466926