DE.CM-09.287

Does your organization have a process to monitor software configurations for deviations from established security baselines?

Explanation

Security baselines define the approved, secure configuration settings for software systems. Monitoring for deviations helps identify unauthorized changes, misconfigurations, or security drift that could introduce vulnerabilities. This includes monitoring changes to operating systems, applications, databases, network devices, and cloud services against their documented secure configurations. Evidence could include configuration management reports, automated scanning results from tools like Tripwire or Nessus that compare current configurations against baselines, change management logs showing detection and remediation of unauthorized deviations, or dashboard screenshots from security configuration assessment tools.

Implementation Example

Monitor software configurations for deviations from security baselines

ID: DE.CM-09.287

Context

Function
DE: DETECT
Category
DE.CM: Continuous Monitoring
Sub-Category
Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events

ResponseHub is the product I wish I had when I was a CTO

Previously I was co-founder and CTO of Progression, a VC backed HR-tech startup used by some of the biggest names in tech.

As our sales grew, security questionnaires quickly became one of my biggest pain-points. They were confusing, hard to delegate and arrived like London busses - 3 at a time!

I'm building ResponseHub so that other teams don't have to go through this. Leave the security questionnaires to us so you can get back to closing deals, shipping product and building your team.

Signature
Neil Cameron
Founder, ResponseHub
Neil Cameron