Using Secure Configurations | Standardize Your Security
Linux Academy
MAY 31, 2019
This included installing operating system updates, NTP servers, DNS servers, static IPs, audit log options, anti-virus, etc. As soon as an image or template is out of date, we deploy insecure operating systems, which is what this security control prevents. Monitoring Changes to Identify Attackers or Rogue Employees.
Let's personalize your content