The document discusses securing hardware and software configurations according to Critical Security Control 3. It recommends establishing standard secure configurations for operating systems and applications through hardening guides. Master images should be stored securely and configurations enforced through automated tools to prevent unauthorized changes. Free tools mentioned include CIS benchmarks and FOG for imaging, while commercial tools include Qualys for compliance assessments and Deep Freeze for image management. The overall message is that organizations must securely configure all systems according to standards and manage configurations over time through automation.
Related topics: