Building a Business Case for Integrity Monitoring

April 8, 2020

The State of Security

There are a number of different security devices that need to be continually monitored because they represent attack vectors. That’s why understanding configuration management is critical to security hygiene. As practitioners, we need to adhere to CIS Controls as they provide a critical baseline for maintaining our security framework and keeping up our integrity monitoring processes. There are a number of different parameters that can be monitored within specific security devices. These parameters need to be identified and remediation actions defined.