官术网_书友最值得收藏!

Implementing a baseline

Once a direction has been determined on which baseline controls to use within your organization, you need to review the controls and deploy them throughout your organization, as well as build them into your current process moving forward.

CIS

If you opt to move forward with CIS benchmarks, you will need to download the checklist and customize them for your specific needs. CIS also has the option of purchasing hardened images to provide an easier deployment.

To download the latest CIS benchmarks, follow these steps:

  1. Open a browser and navigate to https://www.cisecurity.org/.
  2. Click on Cybersecurity Tools.
  3. Click on Download under CIS Benchmarks.
  4. Enter the required information, agree to the terms, then click on Get Free Benchmarks Now:

    Figure 2.6 – The CIS Benchmarks download page.

  5. Go to your mailbox and look for an email from CIS (check your Junk email folder too).
  6. Open the email and click on Access PDFs. You will be provided with a list of all the available CIS benchmarks in PDF format.
  7. Scroll down and you will see the Windows Server benchmarks:

    Figure 2.7 – The CIS benchmarks PDF

  8. Keep scrolling down and you will also see the Azure benchmarks:

    Figure 2.8 – The CIS benchmarks PDFs

  9. In addition, there are many more Windows-specific benchmarks for specific roles, such as IIS, SQL, Exchange, and so on.
  10. Once you have downloaded the PDFs, follow and implement the recommendations on them to strengthen your systems.

    Tip

    Visit the following link to access the CIS hardened images that map back to the CIS benchmarks: https://www.cisecurity.org/cis-hardened-images/.

Next, let's look at using the Microsoft SCT to download baselines for Windows.

Microsoft SCT

If you go down the Microsoft route with Windows security baselines, they provide a repository of resources that can be downloaded to allow the implementation of a baseline. To download these resources, follow these steps:

  1. Browse to https://docs.microsoft.com/en-us/windows/security/threat-protection/security-compliance-toolkit-10.
  2. Scroll down and click on download the tools.
  3. Click Download:

    Figure 2.9 – Microsoft SCT 1.0 download

  4. Select the desired versions or click on the box next to the filename to select them all.
  5. Click Next. You will receive all the toolkits in .zip format.

Downloading the preceding referenced toolkit will provide you with everything you need to deploy the recommended baselines from Microsoft. The following screenshot provides a quick overview of the baseline settings that can be deployed using the provided GPOs within the toolkit in Excel format. Notice that Microsoft provides separate settings not just for Windows 10 but also for a member server versus a Domain Controller (DC) server, providing additional settings specifically for your DCs. Also, if you look at the bottom of the spreadsheet, you will see the different categories that the strengthening is being applied to:

Figure 2.10 – The MS Security Baseline Windows 10 v1909 and Server v1909.xlsx spreadsheet

The referenced spreadsheet is MS Security Baseline Windows 10 v1909 and Server v1909.xlsx from the downloaded .zip files from the Windows 10 version 1909 and Windows Server version 1909 security baseline ZIP files referenced in the preceding steps. Chapters 8, Administration and Remote Management, Chapter 9, Keeping Your Windows Client Secure, and Chapter 10, Keeping Your Windows Server Secure, will provide more details on the implementation of security controls.

Tip

Microsoft SCT also provides additional details on the available tools to more efficiently manage your Windows baselines. You can find these details at https://docs.microsoft.com/en-us/windows/security/threat-protection/security-compliance-toolkit-10.

It is highly recommended that if you make any configuration changes from newly released baselines, you ease them into production and thoroughly test them first. In addition, ensure any changes go through your change control process for tracking and to offer transparency to your business.

Next, let's recap what we have covered in this chapter by providing a checklist of best practices that will help when building a security framework and implementing your baselines.

主站蜘蛛池模板: 昆明市| 上思县| 苍溪县| 义马市| 和静县| 固阳县| 临沭县| 民权县| 黔西县| 米脂县| 探索| 永清县| 新邵县| 湘阴县| 句容市| 清流县| 嘉定区| 安丘市| 清流县| 绥化市| 蛟河市| 新巴尔虎左旗| 平江县| 合山市| 崇义县| 通许县| 三穗县| 高邮市| 库伦旗| 仲巴县| 昭觉县| 英德市| 富裕县| 龙胜| 西昌市| 龙井市| 抚宁县| 洛阳市| 黑水县| 上高县| 永德县|