Check out these resources to automate your configuration review Credit: CIS Configuration management can be challenging. IT teams can become overwhelmed between various standards, compliance requirements, and security options. As the popularity of remote work grows, so does the complexity of implementing secure configurations. Thankfully, there are consensus-developed security recommendations and tools available to help automate the process.Why Do Secure Configurations Matter?Many servers, operating systems, and applications come with default settings that are put in place for convenience, not security. The CIS Benchmarks provide free configuration recommendations for more than 100 CIS Benchmarks across 25+ vendor product families. Implementing secure configurations is a way to help significantly improve your organization’s cyber defenses. Secure configurations can help protect against threats such as denial of service or unauthorized data access.Download CIS BenchmarksAnalyzing Target Endpoint SettingsThrough CIS SecureSuite Membership, your organization can take advantage of resources to help automate configuration review. Membership offers access to CIS-CAT Pro, a configuration assessment tool for analyzing a target endpoint’s settings. CIS-CAT Pro compares a target machine to the secure recommendations in the CIS Benchmark and provides a compliance score of 1-100. CIS-CAT Pro reports also demonstrate remediation steps for any non-compliant settings to help you improve your cyber defenses after each assessment.Try some features for free – download CIS-CAT Lite.Security That Moves With YouMany growing organizations are making room for remote employees. It’s important to keep security top of mind as you also offer flexibility and convenience. CIS-CAT Pro can assess remote machines through the Command Line Interface (CLI). Using the CLI, CIS SecureSuite Members can target Microsoft Windows endpoints using WinRM. CIS-CAT Pro can also remotely assess Unix/Linux environments and Cisco network device endpoints via SSH.Where security meets flexibilityConfiguration management can be difficult, especially when remote work comes into play. Whether your team works in two offices or 20, it’s never been easier to keep everyone on secure configurations. You can help harden your organization’s endpoints and implement a secure baseline by remotely assessing with CIS-CAT Pro v4. It will also help improve your compliance to the consensus-developed security recommendations contained within the CIS Benchmarks. There’s never been a better time to become a CIS SecureSuite Member.Learn More About CIS SecureSuite Membership Related content brandpost Sponsored by CIS Mapping Your Way To Compliance With Cybersecurity Frameworks Make cybersecurity program work more efficiently by "mapping" frameworks to security resources By CIS Apr 23, 2021 3 mins Security brandpost Sponsored by CIS Managing Your Cybersecurity Program for the Win Discover how the right tool helps save time, prevents errors, offers transparency, and measures compliance By CIS Apr 23, 2021 4 mins Security brandpost Sponsored by CIS Remediate Insecure Configurations to Improve Cybersecurity With CIS, translate cyber threat information into action while saving time By CIS Apr 14, 2021 5 mins Security brandpost Sponsored by CIS How Configuration Assessments Help Improve Cyber Defenses Assessing Regularly is the Key to Reducing Risk from Poorly Configured Systems By CIS Apr 06, 2021 4 mins Security PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe