Configuration Hardening

Model | Operations | Environment Management | Configuration Hardening

Benefit

Hardened basic configuration settings of your components

Activity

Understanding the importance of securing the technology stacks you’re using, apply secure configuration to stack elements, based on readily available guidance (e.g., open source projects, vendor documentation, blog articles). When your teams develop configuration guidance for their applications, based on trial-and-error and information gathered by team members, encourage them to share their learnings across the organization.

Identify key elements of common technology stacks, and establish configuration standards for those, based on teams’ experiences of what works.

At this level of maturity, you don’t yet have a formal process for managing configuration baselines. Configurations may not be applied consistently across applications and deployments, and monitoring of conformance is likely absent.

Question

Do you harden configurations for key components of your technology stacks?

Quality criteria

You have identified the key components in each technology stack used
You have an established configuration standard for each key component

Answers

No
Yes, for some components
Yes, for at least half of the components
Yes, for most or all of the components

Benefit

Consistent hardening of technology stack components in your organization

Activity

Establsh configuration hardening baselines for all components in each technology stack used. To assist with consistent application of the hardening baselines, develop configuration guides for the components. Require product teams to apply configuration baselines to all new systems, and to existing systems when practicable.

Place hardening baselines and configuration guides under change management, and assign an owner to each. Owners have ongoing responsibility to keep them up-to-date, based on evolving best practices or changes to the relevant components (e.g., version updates, new features).

In larger environments, derive configurations of instances from a locally maintained master, with relevant configuration baselines applied. Employ automated tools for hardening configurations.

Question

Do you have hardening baselines for your components?

Quality criteria

You have assigned an owner for each baseline
The owner keeps their assigned baselines up to date
You store baselines in an accessible location
You train employees responsible for configurations in these baselines

Answers

No
Yes, for some components
Yes, for at least half of the components
Yes, for most or all of the components

Benefit

Clear view on component configurations to avoid non-conformities

Activity

Actively monitor the security configurations of deployed technology stacks, performing regular checks against established baselines. Ensure results of configuration checks are readily available, through published reports and dashboards.

When you detect non-conforming configurations, treat each occurrence as a security finding, and manage corrective actions within your established Defect Management practice.

Further gains may be realized using automated measures, such as “self-healing” configurations and security information and event management (SIEM) alerts.

As part of the process for updating components (e.g., new releases, vendor patches), review corresponding baselines and configuration guides, updating them as needed to maintain their relevance and accuracy. Review other baselines and configuration guides at least annually.

Periodically review your baseline management process, incorporating feedback and lessons learned from teams applying and maintaining configuration baselines and configuration guides.

Question

Do you monitor and enforce conformity with hardening baselines?

Quality criteria

You perform conformity checks regularly, preferably using automation
You store conformity check results in an accessible location
You follow an established process to address reported non-conformities
You review each baseline at least annually, and update it when required

Answers

No
Yes, for some components
Yes, for at least half of the components
Yes, for most or all of the components