Georgetown University – Restricted List of Ports, Protocols, and/or Services
3.4 3.4.7 Configuration Management
https://security.georgetown.edu/config-mgt-policy/least-functionality-guidelines/restricted_ports/#
This link provides a list of ports, protocols, and/or services that Georgetown University blocks in support of their least functionality guideline.
https://helpdeskgeek.com/networking/determine-open-and-blocked-ports/
This link provides the definition of a network port and shows the reader how to find open and closed ports.
Master of Project Academy – ITIL Change Management Process: Models You Need to Know
3.4 3.4.3 3.4.4 3.4.5 Configuration Management
https://blog.masterofproject.com/change-management-process-itil/
This blog reviews the ITIL change management process and covers various models and workflows that are part of this process.
Microsoft – Windows 10 Version 1903: Prevent Software Installation by Users
3.4 3.4.9 Configuration Management
https://learn.microsoft.com/en-us/archive/technet-wiki/53218.windows-10-version-1903-prevent-software-installation-by-users
This article from Microsoft, describes how administrators can configure Windows 10 to prevent users from installing software.
https://www.tenable.com/blog/auditing-microsoft-security-compliance-toolkit-baselines
This blog covers the Microsoft Security Compliance toolkit as a tool to audit security baselines. This toolkit is set of tools produced by Microsoft so organizations can apply Microsoft-recommended security configurations to their environment.
https://isoo.blogs.archives.gov/category/marking-examples/
This blog provides examples of correctly marking Controlled Unclassified Information (CUI) and forms for purchase.
https://ncp.nist.gov/repository
The National Checklist Program (NCP), defined by the NIST SP 800-70, is the U.S. government repository of publicly available security checklists (or benchmarks) that provide detailed low level guidance on setting the security configuration of operating systems and applications.
https://www.ncsc.gov.uk/collection/10-steps
This article helps identify key controls that should be considered when establishing a secure configuration.
netwrix – Handling Open Ports Secure and Finding Vulnerabilities
3.4 3.4.7 Configuration Management
https://blog.netwrix.com/2022/08/16/open-network-ports/
This article from netwrix outlines open ports, discusses the risks of open ports, which open ports are safe, and ways to find open ports in your network. They also share tips for ensuring port security.
NIST SP 800-128 Guide for Security-Focused Configuration Management of Information Systems
3.4 3.4.1 Configuration Management
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-128.pdf
This NIST Special Publication covers general guidelines for ensuring that security considerations are integrated into the configuration management process.