RedHat – Securing Red Hat Enterprise Linux 8 3.4 3.4.2 Configuration Management
This is a security hardening guide for Red Hat Enterprise Linux 8, developed by Red Hat, Inc.
This is a security hardening guide for Red Hat Enterprise Linux 8, developed by Red Hat, Inc.
This is a router and switch security policy provided by SANS. This document serves an example of the minimum requirements for security configuration for routers and switches.
This sample policy from SANS, can be used to outline the requirements around installation of software on an organizations devices.
This SANS whitepaper covers how to implement and re-implement change policies.
This SANS whitepaper focuses on monitoring windows and linux baselines.
This is a blog that covers change management and configuration management and their revolutionizing cybersecurity.
IT change management describes the practices designed to ensure successful prioritizing, approval, scheduling, and execution of changes to IT systems.
This site provides examples of templates that can be used throughout change management process such as change management template, change proposal template, change management communications plan template, etc.
This is a presentation from a Splunk Conference on how to use splunk to assess and implement critical security control #3 which is secure configurations for hardware and software.
This link provides various system hardening guides used by the University of Texas at Austin.