Kumitech's Security Configuration Analysis refers to the process of examining the settings and configurations of a computer or network system to identify potential security vulnerabilities. This can be done manually or through the use of automated tools. The goal of this analysis is to identify and remediate any issues that could be exploited by attackers to gain unauthorized access or compromise the system.
Enhancements refer to any changes or improvements made to the system after the analysis is complete, in order to strengthen its security. This can include updating software and hardware, implementing new security controls, or changing configurations to reduce the risk of successful attacks. The end goal of Security Configuration Analysis and Enhancements is to harden the system against potential threats and maintain the Confidentiality, Integrity, and Availability of the system based on Center for internet Security (CIS) Benchmark recommendations and guidance
1.1 3.4 Deploy Automated Operating System Patch Management Tools
Deploy automated software update tools in order to ensure that the operating systems are running the most recent security updates provided by the software vendor.
Security patches are updates to a computer system’s operating system or installed software, and are a basic part of IT maintenance. The patches the OS developers provide may contain new features, but also contain fixes to recently discovered security vulnerabilities. Operating systems go “stale” and need to be updated. Without a constant stream of security patches, computer systems are more vulnerable to malware that can read sensitive company data, or simply destroy it. Accordingly, patching systems is one of the primary ways an enterprise can protect itself from attackers.