Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

🎓 Purpose

Baseline configurations are documented sets of configurable specifications for various types of systems, from operating systems to peripherals to cloud instances. Building and maintaining your systems according to known baseline configurations helps to ensure that your systems have been setup in a secure and acceptable fashion.

👥 Audience

Status
titlefaculty
Status
colourBlue
titleresearchers
Status
colourRed
titleAdmin staff
Status
colourPurple
titleIT staff
Status
colourGreen
titlestudents


🔖 Contents

Table of Contents
minLevel1
maxLevel3
include
outlinefalse
indent
styledefault
excludePurpose|Audience|Contents|Search|Additional help|Related articles
typelist
class
printablefalse

(question) Initial considerations

🔍Evaluate possible institutional options.

📋 Maintain an asset inventory.

🛡️Follow general security best practices.

  • The majority of security events and incidents occur when general best practices are insufficiently followed or ignored. By applying a holistic approach to securing your systems, often referred to as “defence-in-depth”, you help reduce the risk of data loss or breach.


\uD83D\uDCD8 What can I do?

🛡️Visit the Center for Internet Security (CIS)'s Benchmarks website for security recommendations.

  • https://downloads.cisecurity.org/

    • This includes recommendations for:

      • operating systems,

      • server software,

      • cloud providers,

      • mobile devices,

      • network devices,

      • desktop software, and

      • multi-function device.

🖥️Use supported version of operating systems and configure automatic updates.

Note

If devices cannot be updated but are required for your work, contact your local IT group regarding how to securely segregate devices from institutional networks. https://uoft-infosec-cf.atlassian.net/wiki/spaces/ISH/pages/4948958/Additional+help#%F0%9F%96%A5%EF%B8%8F-Information-Technology-(IT)

Windows

  • Automatic updates are enabled by default within current versions of Windows and cannot be disabled.

MacOS

Linux

Android

iOS

⚙️Regularly patch and update your software and applications.

  • Configure automatic updates where available.

🏴‍☠️Avoid removing software restrictions imposed by the manufacturer on your device or use untrusted software.

  • Do not jailbreak or root your device to exploit privileged access, as it provides an easier means for malicious software to exploit your device.

  • Do not install or use pirated software on devices with access to institutional data.

  • Do not sideload software onto mobile devices which bypass the Apple or Google Play Store, as they not subject to scans which flag potential harm.


Page Properties
hiddentrue

Name

Role

Date

Michael Laurentius

Author

Sue McGlashan

Approver (Manager)

Reviewer

Live Search
spaceKeyISH
sizelarge
additionalpage excerpt
placeholderHow do I...
typepage
labelskb-how-to-article,kb-general-concepts,kb-spec-how-to-article


✉️ Additional help

👥 General

https://uoft-infosec-cf.atlassian.net/wiki/spaces/ISH/pages/4948958/Additional+help#%F0%9F%9B%A1%EF%B8%8F-Information-Security-(IS)

https://uoft-infosec-cf.atlassian.net/wiki/spaces/ISH/pages/4948958/Additional+help#%F0%9F%96%A5%EF%B8%8F-Information-Technology-(IT)

🔬 Researchers

https://security.utoronto.ca/services/research-information-security-program/


Filter by label (Content by label)
showLabelsfalse
max10
showSpacefalse
excerptTypesimple
cqllabel = "secure" and title !~ "Securely setup"