Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world

About Us Leadership Principles Testimonials


secure your organization
Secure Your Organization

secure specific platforms
Secure Specific Platforms

cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments

View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers




filter by topic
Filter by Topic

View All Resources  
CIS Logo Show Search Expand Menu

Avoid Configuration Drift Through Effective Monitoring

Once your organization is secured, you'll need to ensure that your environment doesn't stray from its protected state. Configuration drift may be inevitable, but you can leverage best practices to minimize its consequences.

Why Does Configuration Drift Occur?

Whether by choice or chance, change happens in IT environments. Software updates are rolled out, ad hoc decisions are made, end users change settings, and new systems are introduced – often quickly, to meet deadlines. When these decisions are made in haste, security considerations can be incomplete or missing altogether.

Even if systems were secure to start with, the once-hardened IT environments develop "gaps" over time. It's not always easy to keep track of the changes that can lead to configuration drift. You'll need a management tool that provides you with the big (and granular) picture, so your team can effectively monitor and remedy the situation.

Preventing Configuration Drift

The best way to deal with configuration drift is to stay on top of it. A well managed cybersecurity program helps ensure that you maintain ongoing awareness and proof of secure configurations.

For example, you’ll want to consider tools and resources to:

  • Identify internal and external security requirements with the help of the CIS Controls, and document your progress toward meeting them
  • Assess whether systems are configured to comply with CIS Benchmarks configuration recommendations
  • Develop and tailor specific configurations within the CIS Benchmarks to meet your unique needs
  • Implement secure configurations and monitor them regularly for configuration drift

Resources for Monitoring and Correcting Configuration Drift

You'll want to monitor configuration over time to ensure that your environment doesn't stray from its hardened state. A quick view of your configurations in one place helps you do this effectively and efficiently. CIS-CAT Pro, a configuration assessment and reporting tool, can help.

Use CIS-CAT Pro Assessor to scan systems, then feed the assessment results into CIS-CAT Pro Dashboard. You can view a graphical representation of assessment results, comparison reports, a view of your hardening efforts over time, and more. If your overall conformance score drops below a previous score, you receive an alert.

CIS-CAT Pro Dashboard provides a holistic view of your environment's conformance to the CIS Benchmarks. You can observe the evolution of the hardening of your target endpoints and quickly identify vulnerabilities. You'll get both the big picture and the ability to dive down into the details.

Need to make a configuration change to your system? Use CIS WorkBench to tailor the configuration recommendations of the CIS Benchmarks to your organization’s specific needs. CIS Build Kits are group policy objects (GPOs) and Linux shell scripts you can use to push those configurations to your test and then production environments.

Put Policy into Practice

CIS SecureSuite Membership is based on the security best practices of the CIS Controls and CIS Benchmarks. Members have access to tools like the CIS Controls Self Assessment Tool (CSAT) and CIS-CAT Pro to effectively assess security compliance. Other benefits include the ability to customize configuration, technical support, and taking part in a global community focused on creating confidence in the connected world.