Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Next »

Purpose

Baseline configurations are documented sets of configurable specifications for various types of systems, from operating systems to peripherals to cloud instances. Building and maintaining your systems according to known baseline configurations helps to ensure that your systems have been setup in a secure and acceptable fashion.


Audience

FACULTY RESEARCHERS ADMIN STAFF IT STAFF STUDENTS


On this page

 Expand to view table of contents.

Initial considerations

Evaluate possible institutional options.

Maintain an asset inventory.

Follow general security best practices.

  • The majority of security events and incidents occur when general best practices are insufficiently followed or ignored. By applying a holistic approach to securing your systems, often referred to as “defence-in-depth”, you help reduce the risk of data loss or breach.


What can I do?

Visit the Center for Internet Security (CIS)'s Benchmarks website for security recommendations.

  • https://downloads.cisecurity.org/

    • This includes recommendations for:

      • operating systems,

      • server software,

      • cloud providers,

      • mobile devices,

      • network devices,

      • desktop software, and

      • multi-function device.

Avoid removing software restrictions imposed by the manufacturer on your device.

  • Do not jailbreak or root your device to exploit privileged access, as it provides an easier means for malicious software to exploit your device.


  • No labels