Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

Home > Tripwire > Secure Configuration Management Demystified

Secure Configuration Management Demystified

White Paper Published By: Tripwire
Published:  Nov 07, 2012
Type:  White Paper
Length:  13 pages

Properly configuring security parameters on servers, workstations and network infrastructure platforms has been a mainstay for best practices in information security. However, secure configuration management need not be as difficult as everyone thinks it is.

In this paper, we show how to use secure configuration concepts to reduce the overall attack surface, bring better coordination among groups within IT and elsewhere, and ultimately reduce the risk to your business by continuously improving the IT environment.

Tags : 
secure configuration, tripwire, information security, data security, network infrastructure platforms