Articles 1 min read

SANS Spotlight: Back to Basics – Building a Foundation for Cyber Integrity

Applications depend on file-based architectures to process data and store content, as do the networks and endpoints that support these applications—placing file integrity at the heart of maintaining a secure cyber profile. But cybersecurity must also protect system integrity. This refers to the state of the infrastructure (encompassing applications, endpoints and networks).

This white paper, authored in partnership with the SANS Institute, lays out a six-step guide to help you achieve cyber integrity across your entire agency or organization. Learn the practical strategies needed to:

  • Establish the configuration baseline for your infrastructure
  • Determine the key files and processes you need to monitor your established baseline
  • Document your static and dynamic configuration monitoring procedures
  • Implement continuous vulnerability monitoring
  • Establish formal change management processes to evaluate requests and track outcomes
  • Establish training for your staff

Building cyber integrity is a significant effort. The Center for Internet Security (CIS) Critical Security Controls provide a valuable, effective framework for establishing cyber integrity, and the SANS Institute is the trusted industry leader whose expertise can help you use the CIS Controls to the fullest. Download the whitepaper now.

The Business Transformation Network has shared this article in partnership with Tripwire.

Hear it first

Stay up to date with our latest content and events

Watch, read or listen to content from the brightest leaders across the world of People, Process & Technology.

Find out about the latest events across Europe

Network with like-minded professionals in your industry

Find and apply for the best jobs

See content that you like?

Share your experience by joining your exclusive roundtables, or contribute to our content like industry peers.

Get involved