Americas

  • United States

Asia

Oceania

Configuration Security for Remote Endpoints with CIS-CAT Pro

BrandPost By CIS
Feb 24, 20212 mins
Security

Check out these resources to automate your configuration review

untitled design 20
Credit: CIS

Configuration management can be challenging. IT teams can become overwhelmed between various standards, compliance requirements, and security options. As the popularity of remote work grows, so does the complexity of implementing secure configurations. Thankfully, there are consensus-developed security recommendations and tools available to help automate the process.

Why Do Secure Configurations Matter?

Many servers, operating systems, and applications come with default settings that are put in place for convenience, not security. The CIS Benchmarks provide free configuration recommendations for more than 100 CIS Benchmarks across 25+ vendor product families. Implementing secure configurations is a way to help significantly improve your organization’s cyber defenses. Secure configurations can help protect against threats such as denial of service or unauthorized data access.

Download CIS Benchmarks

Analyzing Target Endpoint Settings

Through CIS SecureSuite Membership, your organization can take advantage of resources to help automate configuration review. Membership offers access to CIS-CAT Pro, a configuration assessment tool for analyzing a target endpoint’s settings. CIS-CAT Pro compares a target machine to the secure recommendations in the CIS Benchmark and provides a compliance score of 1-100. CIS-CAT Pro reports also demonstrate remediation steps for any non-compliant settings to help you improve your cyber defenses after each assessment.

Try some features for free – download CIS-CAT Lite.

Security That Moves With You

Many growing organizations are making room for remote employees. It’s important to keep security top of mind as you also offer flexibility and convenience. CIS-CAT Pro can assess remote machines through the Command Line Interface (CLI). Using the CLI, CIS SecureSuite Members can target Microsoft Windows endpoints using WinRM. CIS-CAT Pro can also remotely assess Unix/Linux environments and Cisco network device endpoints via SSH.

Where security meets flexibility

Configuration management can be difficult, especially when remote work comes into play. Whether your team works in two offices or 20, it’s never been easier to keep everyone on secure configurations. You can help harden your organization’s endpoints and implement a secure baseline by remotely assessing with CIS-CAT Pro v4. It will also help improve your compliance to the consensus-developed security recommendations contained within the CIS Benchmarks. There’s never been a better time to become a CIS SecureSuite Member.

Learn More About CIS SecureSuite Membership