AT&T Cybersecurity – Free and Commercial Tools to Implement the CIS Security Controls, Part 10 &11;: Secure Configurations & Control for Network
3.4 3.4.2 Configuration Management
https://cybersecurity.att.com/blogs/security-essentials/free-and-commercial-tools-to-implement-cis-security-controls-secure-config-control-for-network
This article lists free and commercial tools that a company can use to help comply with CIS Controls 10 and 11.
https://www.cisecurity.org/cis-benchmarks
This is a summary page for the 140+ configuration guidelines for various technology groups to safeguard systems developed by CIS.
https://vimeo.com/271916109
This is a video from Qualys that shows how to assess a security configuration.
https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/8/pdf/security_hardening/red_hat_enterprise_linux-8-security_hardening-en-us.pdf
This is a security hardening guide for Red Hat Enterprise Linux 8, developed by Red Hat, Inc.
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt6cbaf88421cd16f6/5e9dfac0674ec260f325c430/router_and_switch_security_policy.pdf
This is a router and switch security policy provided by SANS. This document serves an example of the minimum requirements for security configuration for routers and switches.
https://conf.splunk.com/files/2017/slides/using-splunk-to-assess-and-implement-critical-security-control-3-secure-configurations-for-hardware-and-software.pdf
This is a presentation from a Splunk Conference on how to use splunk to assess and implement critical security control #3 which is secure configurations for hardware and software.
https://security.berkeley.edu/secure-device-configuration-guideline
This is UC Berkley’s secure device configuration guideline with adherence to their security policy mandate. This is an example of a how to assess a secure configuration.
https://www.vmware.com/topics/network-infrastructure-security
Network Infrastructure Security, typically applied to enterprise IT environments, is a process of protecting the underlying networking infrastructure by installing preventative measures to deny unauthorized access, modification, deletion, and theft of resources and data.
https://www.youtube.com/watch?v=QNRjjkzvWK0
This is a video from CIS that covers secure configurations for hardware and software.