Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • SCM: Understanding Its Place in Your Organization’s Digital Security Strategy
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

SCM: Understanding Its Place in Your Organization’s Digital Security Strategy

5 years ago David Bisson
SCM: Understanding Its Place in Your Organization’s Digital Security Strategy

Digital attackers can compromise a system in a matter of minutes. But it generally takes organizations much longer to figure out that anything has happened. In its 2020 Data Breach Investigations Report (DBIR), for instance, Verizon Enterprise found that more than half of large organizations took days or even months to detect a security incident. Such dwell time gave attackers all they needed to move throughout an infected network and exfiltrate sensitive data.

The finding shared above raises an important question: how can organizations gain more timely insight into what’s happening on their networks?

The answer lies in organizations investing in their security fundamentals. This blog post will focus in on one of those basic measures: secure configuration management (SCM). After providing a definition of this security control, the post will describe how SCM complements an organization’s security and compliance efforts before illuminating how it can fit within an overarching digital security strategy.

What Is SCM?

The National Institute of Standards and Technology (NIST) defines security configuration management as “the management and control of configurations for an information system to enable security and facilitate the management of risk.” At its heart, SCM is a digital security process that’s designed to harden digital systems against digital attacks. It can also help organizations shrink their respective attack surfaces.

The purpose of SCM is to make sure an organization’s systems are properly configured to meet the organization’s security and compliance requirements. From a security standpoint, organizations need to minimize the existence of misconfigurations; malicious actors could weaponize a broken setting as an entry point into their network. This threat places the onus on organizations to define what a secure configuration baseline looks like for each of their assets and to then continuously monitor their assets for deviations. Any unexpected change could highlight the existence of a security issue.

Simultaneously, organizations need to apply SCM to their compliance efforts, as many industry standards and regulations incorporate some form of this security fundamental. As such, organizations can use secure configuration management to reduce the time it takes for them to prepare for an audit. They can also use the control to obtain visibility into their post-audit compliance state. SCM can help track changes to the network and raise an alert if deviations occur. Such functionality enables the organization to return to their secure baseline state well ahead of their next audit date.

How SCM Fits into an Organizational Security Strategy

Secure configuration management does not stand alone as a security control. By design, it works together with and augments other security measures. The Center for Internet Control (CIS) recognizes this fact, which is why it listed SCM fifth in its list of top security controls:

  1. Inventory and Control of Hardware Assets: Organizations need to know which hardware assets are connected to the network.
  2. Inventory and Control of Software Assets: Beyond hard, it’s important to have an inventory of what embedded code, applications and services require protection.
  3. Continuous Vulnerability Management: Once organizations have an inventory of their hardware and software, they can scan those assets for security weaknesses and use their vulnerability management plan to prioritize fixes.
  4. Controlled Use of Administrative Privileges: To safeguard the network even further, organizations should control the types of resources to which employees, contractors and others have access depending on their work duties.
  5. Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers: Last but not least, organizations must maintain the secure baselines of their hardware and software assets.

To maximize their efforts, organizations should implement SCM in coordination with additional security best practices, as well. They should specifically focus on cultivating a partnership between SCM and three other security fundamentals: enterprise integrity, file integrity monitoring and log management.

Enterprise Integrity

Integrity is crucial to an organization’s digital security. As one of the main components of the CIA Triad, integrity ensures that nothing varies from its current or expected state in a way that harms the business. SCM can help organizations ensure the integrity of its assets, thereby laying the foundation for trust and reliability among the organization’s customers and partners.

File Integrity Monitoring

A vital part of validating integrity involves pairing SCM with robust change management processes like FIM. Indeed, organizations need to detect the changes that make a data breach possible; FIM does this by spotting alterations on files and system attributes that deviate from a secure baseline. The important thing is that the FIM solution be able to differentiate expected changes from unforeseen modifications in real time.

Log Management

All of an organization’s devices and applications produce network logs, or records of events that occurred in those assets. As networks become bigger and more complex, organizations could easily become overwhelmed with logs, thereby making it difficult for them to detect security incidents amid all the noise. With SCM, however, organizations can add context to those events and focus their security efforts on their high-value assets.

For more information on SCM and its security benefits to the organization, please download Tripwire’s latest eBook “Mastering Configuration Management Across the Modern Enterprise: An Explorer’s Guide to SCM.”

The post ” SCM: Understanding Its Place in Your Organization’s Digital Security Strategy” appeared first on TripWire

Source:TripWire – David Bisson

Tags: Goverment, High Severity, TripWire

Continue Reading

Previous PoC Exploit Targeting Apache Struts Surfaces on GitHub
Next How safe are you while making transactions on the Internet?

More Stories

  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

3 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack

15 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

20 hours ago [email protected] (The Hacker News)
  • Data Breach

The Buyer’s Guide to AI Usage Control

21 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

22 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

1 day ago [email protected] (The Hacker News)

Recent Posts

  • Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries
  • AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack
  • ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories
  • The Buyer’s Guide to AI Usage Control
  • Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT