top of page

Securing Configuration for Devices: Ensure secure operating systems, applications, servers, and network equipment configurations.

New week, new cybersecurity newsletter!

Following our previous article on the SANS Top 20 Critical Security Controls, we will focus on parameter number 2, related to "Securing Configuration for Devices: Ensure secure operating systems, applications, servers, and network equipment configurations." 


This control is crucial for enhancing the overall cybersecurity posture of an organization by focusing on the proper configuration of its IT assets. Let's delve into the critical aspects of this control and why it is an essential parameter for robust security.

Understanding Secure Configuration for Devices: What does this mean to begin with? 

Secure Configuration for Devices is about establishing and maintaining a baseline of secure configurations for all the systems and applications within an organization.

This matter includes operating systems, applications, servers, and network devices. Adequately configured devices are less susceptible to vulnerabilities and exploitation.


1. Step 1: Let's focus on Baseline Configurations!


Organizations should define and enforce secure baseline configurations for all devices. This baseline includes turning off unnecessary services, removing default accounts, and implementing robust authentication mechanisms.

It could consist of multi-factor authentication, complex password policies, and role-based access control. This layered approach, including biometric authentication and continuous monitoring, reduces the risk of unauthorized access and enhances overall security by incorporating a variety of robust authentication mechanisms. 


2. Operating Systems and Applications

Secure configurations involve keeping operating systems and applications updated with the latest security patches. Examples include (but are not limited to) security updates for Microsoft Windows, web browsers like Google Chrome and Mozilla Firefox, server software such as Apache, and content management systems like WordPress. These patches enhance system security and protect against potential exploits



3. Server Configurations

Server configurations should align with security best practices. This matter involves disabling unnecessary services (Turning off Unused Services through Regular Audits), limiting user privileges (Implementing the Principle of Least Privilege (PoLP), Using Role-Based Access Control (RBAC), and configuring access controls (Firewall, ACLs Strong Authentication, Encryption…). Servers often contain sensitive data, making them attractive targets for attackers. Secure configurations mitigate these risks.


4. Network Equipment

Network devices, such as routers and firewalls, are critical in securing an organization's network. Secure device configurations involve proper access control lists, logging, and monitoring. Misconfigured network equipment can lead to unauthorized access and data breaches.


1. Minimizing Vulnerabilities

Secure configurations significantly reduce the number of vulnerabilities in a system. By following best practices, organizations can proactively address potential weaknesses, making it harder for attackers to exploit them.

2. Compliance Requirements

Many regulatory frameworks and industry standards mandate secure configurations as part of compliance. Adhering to these standards helps meet legal requirements and ensures a higher level of security.

Federal regulations that may apply to you for the province of Quebec include the Personal Information Protection and Electronic Documents Act (PIPEDA) and its amendments, including the Digital Privacy Act. Additionally, the province has its privacy law, the Act Respecting the Protection of Personal Information in the Private Sector (APPI). Compliance with standards like PCI DSS, NIST Cybersecurity Framework, and ISO/IEC 27001


3. Reducing Attack Surface

A well-configured system reduces its attack surface, limiting the avenues for attackers to gain unauthorized access. Unnecessary services and open ports are potential entry points that can be minimized through secure configurations.


4. Enhancing Incident Response

In the event of a security incident, having a well-documented and secure configuration facilitates a more effective incident response. IT teams can quickly identify deviations from the baseline and take corrective actions.

5. Protecting Reputation

Security breaches resulting from misconfigurations can harm an organization's reputation. By implementing secure configurations, businesses demonstrate a commitment to cybersecurity, instilling confidence in customers, partners, and stakeholders.


1. Automated Configuration Management

Use automated tools for configuration management to ensure consistency and efficiency in maintaining secure configurations across many devices.

2. Regular Audits and Assessments

Conduct regular audits and assessments to validate that devices adhere to the established secure configurations. This ongoing monitoring helps identify and address deviations promptly.

3. Employee Training

Educate employees on the importance of secure configurations and their role in maintaining a secure IT environment. Human error is a common cause of misconfigurations.

4. Documentation

Maintain detailed documentation of baseline configurations and any changes made. This documentation is valuable for audits, incident response, and ensuring accountability.

5. Collaboration with Vendors

Work closely with vendors to stay informed about recommended configurations and security updates. Vendors often release patches and updates to address known vulnerabilities.


Bradley & Rollins is by your side to support you in all these areas and is ready to assist you in your cybersecurity challenges. Do not hesitate to reach out!

22 views0 comments


bottom of page