Blog | G5 Cyber Security

Security Hardening Guides

TL;DR

The CIS Benchmarks are generally the best starting point for security configuration guidance. They provide detailed, practical advice across many operating systems and applications. NIST publications offer deeper technical detail but can be more complex to implement.

1. Understanding Your Options

There are several sources of security configuration guidance available. Here’s a breakdown of the most useful:

2. Why CIS Benchmarks Are a Good Starting Point

CIS Benchmarks offer several advantages:

3. Accessing CIS Benchmarks

CIS Benchmarks are available through the CIS website. Some benchmarks are free, while others require a paid membership.

4. Implementing CIS Benchmarks – Example (Linux)

You can use tools like Lynis to automate some of the benchmark checks and hardening steps on Linux systems:

sudo apt update && sudo apt install lynis
sudo lynis audit system

Lynis will scan your system and provide a report with recommendations based on CIS benchmarks. You’ll need to review the report and manually implement the changes.

5. Using NIST Publications

NIST publications, particularly SP 800-53, are more comprehensive but require significant effort to implement:

6. Automating Configuration Management

To maintain security configurations over time, consider using configuration management tools such as:

These tools allow you to define your desired security state as code and automatically enforce it across your environment.

Exit mobile version