Building a Business Case for Integrity Monitoring
April 8, 2020
There are a number of different security devices that need to be continually monitored because they represent attack vectors. That’s why understanding configuration management is critical to security hygiene. As practitioners, we need to adhere to CIS Controls as they provide a critical baseline for maintaining our security framework and keeping up our integrity monitoring processes. There are a number of different parameters that can be monitored within specific security devices. These parameters need to be identified and remediation actions defined.