Source |
CSO |
Identifiant |
6078558 |
Date de publication |
2022-07-27 12:57:00 (vue: 2022-08-01 13:05:33) |
Titre |
BrandPost: How a Cybersecurity Program Can Counter Configuration Drift |
Texte |
Once your organization is secured, you'll need to ensure that your environment doesn't stray from its protected state. Configuration drift may be inevitable, but you can leverage best practices to minimize its consequences.Why does configuration drift occur?
Whether by choice or chance, change happens in IT environments. Software updates roll out, ad hoc decisions take effect, end users change settings, and new systems come in. When these decisions are made in haste, security considerations can be incomplete or missing altogether.Even if systems were secure to start with, the once-hardened IT environments develop “gaps” over time. It's not always easy to keep track of the changes that can lead to configuration drift. You'll need a management tool that provides you with a big (and granular) picture so that your team can effectively monitor and remedy the situation.To read this article in full, please click here |
Envoyé |
Oui |
Condensat |
altogether always are article best big brandpost: but can chance change changes choice click come configuration consequences considerations counter cybersecurity decisions develop does doesn drift easy effect effectively end ensure environment environments even from full granular happens hardened haste here hoc how incomplete inevitable its keep lead leverage made management may minimize missing monitor need new not occur once organization out over picture please practices program protected provides read remedy roll secure secured security settings situation software start state stray systems take team these time tool track updates users when whether why you your “gaps” |
Tags |
Tool
Guideline
|
Stories |
|
Notes |
|
Move |
|