Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Would you recommend using a set of hardening guidelines like those available fro

ID: 3910781 • Letter: W

Question

Would you recommend using a set of hardening guidelines like those available from the Center for Information Security? You will find a sample of the guidance in this week's module. Why or why not? What is the value of using hardening guidance from a third party like CIS? What might be a downside to using these guidelines? Would you recommend using a set of hardening guidelines like those available from the Center for Information Security? You will find a sample of the guidance in this week's module. Why or why not? What is the value of using hardening guidance from a third party like CIS? What might be a downside to using these guidelines?

Explanation / Answer

Answer: CSI guides include levels for security which is Legacy, Enterprise, High Security.

Yes, we can recommend the set of guidelines like those available from the Center for Information Security to some extent because high security levels in these guidelines designed to restrict the functionality of the system. This includes several setting that that should be evaluated carefully before any implementation. These settings provide tight security even in windows system that is why it is popular. Although these (high security) settings provide additional security benefits, the settings may have an adverse effect on the usability of the system. It is always recommended to deploy high security after thoroughly testing the system otherwise NO.

Third party guidance prompts strong warnings to fully examine the guide in a high security environment at all times. However, these warnings are not always taken care of. Be sure to rigorously test every security configurations in the target environment. Security settings in addition to the recommended security settings may contradict the compliance test application test as part of the operating system testing process. In addition, third parties do not encourage the application of draft guidelines in a real-time production environment rather than in a test environment.

Downside of these guidelines is that they provide high security to the systems on the cost of usability of the system and restrictions on some actions to be done and system should be tested carefully before any deployment since it has adverse impact on the system.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote