NIST SP 800-53: CM-7 Least Functionality 3.4 3.4.7 3.4.8
NIST resource that defines requirements for configuring information systems to provide only essential capabilities such as restricting / blacklisting software.
NIST resource that defines requirements for configuring information systems to provide only essential capabilities such as restricting / blacklisting software.
This is a sample configuration management policy from the State of North Carolina that outlines the standards used for configuration management compliance.
This is a blog from Plutora on ITIl V4 change management.
This is a video from Qualys that shows how to assess a security configuration.
This is a security hardening guide for Red Hat Enterprise Linux 8, developed by Red Hat, Inc.
This is a router and switch security policy provided by SANS. This document serves an example of the minimum requirements for security configuration for routers and switches.
This sample policy from SANS, can be used to outline the requirements around installation of software on an organizations devices.
This SANS whitepaper covers how to implement and re-implement change policies.
This SANS whitepaper focuses on monitoring windows and linux baselines.
This is a blog that covers change management and configuration management and their revolutionizing cybersecurity.