Cybersecurity Checklist Part 3 – Tracking Changes, Patching, and Endpoint Security
You’ve started to protect the perimeter of your environment with the basics of security and managing your assets and vendors. Now it’s time to track the changes that occur in your environment to mitigate risks and solve problems that may occur.
Configuration Management – Configuration management involves the steps you take to setup your equipment. Whether it’s a server, a PC, or a device, you should document the process of configuration to ensure it is secure and ready for deployment. A good configuration management process will ensure that you have exactly what is required for each device based on the requirements of the organization. You should also ensure that only specific users can complete configurations.
Change Management – Now that you have a system in place to manage the configuration of your devices, you need to create a change management system to document any changes that occur. Whenever you make a change to a server, PC, or a device, that change should be tracked. If a problem arises in your environment, you can refer to the change log to see if any recent changes you made may be causing the problem. All updates should be tracked in your configuration of each device so that you can easily refer to them when troubleshooting issues in your environment. Again, only specific users should be authorized to make changes to your environment. From a compliance standpoint, change management is also necessary to preserve the integrity of your systems and IT policies.
Endpoint Security – Securing every endpoint in your environment is extremely important to protecting your environment. Think of your network security strategy as you would think about how you protect your property. You’ve built the fence; now you need to lock the doors and the windows to prevent unwanted threats from entering your network. Endpoint security is more than just anti-virus software. It’s network access control, data loss prevention, email and file encryption, and more. Consider a next-generation firewall as one of your endpoint security methods. These types of “smart” firewalls constantly analyze the data that passes through your network, while giving you control what your network users can do on the Internet.
Next blog we’ll look at how to classify data, developing an encryption strategy, and Backup/Disaster Recovery/Archiving. For more information on endpoint security solutions, contact us today.