Purpose
Baseline configurations are documented sets of configurable specifications for various types of systems, from operating systems to peripherals to cloud instances. Building and maintaining your systems according to known baseline configurations helps to ensure that your systems have been setup in a secure and acceptable fashion.
Audience
Status |
---|
colour | Blue |
---|
title | researchers |
---|
|
Status |
---|
colour | Red |
---|
title | Admin staff |
---|
|
Status |
---|
colour | Purple |
---|
title | IT staff |
---|
|
On this page
Expand |
---|
title | Expand to view table of contents. |
---|
|
Table of Contents |
---|
minLevel | 1 |
---|
maxLevel | 3 |
---|
include | |
---|
outline | false |
---|
indent | |
---|
style | default |
---|
exclude | Purpose|Audience|On this page|Search|Additional help|Related articles |
---|
type | list |
---|
class | |
---|
printable | false |
---|
|
|
Initial considerations
Evaluate possible institutional options.
Consult with your local IT group about whether an institutionally managed system would meet your needs. These systems are managed by technical experts at the University, divisional, or departmental level, allowing you to focus more on the task at hand, rather than maintaining the security of unmanaged systems.
Maintain an asset inventory.
Follow general security best practices.
The majority of security events and incidents occur when general best practices are insufficiently followed or ignored. By applying a holistic approach to securing your systems, often referred to as “defence-in-depth”, you help reduce the risk of data loss or breach.
What can I do?
Visit the Center for Internet Security (CIS)'s Benchmarks website for security recommendations.
Avoid removing software restrictions imposed by the manufacturer on your device.
Page Properties |
---|
|
Name | Role | Date |
---|
Michael Laurentius | Author | | Sue McGlashan | Approver (Manager) | | | Reviewer | |
|