article thumbnail

Five steps to password policy compliance

IT Security Guru

Brandon has been in the industry 20+ years, is a prolific blogger focusing on networking, virtualization, storage, security & cloud, and contributes to the community through various blog posts and technical documentation primarily at Virtualizationhowto.com.

article thumbnail

Measure Security Performance, Not Policy Compliance

The Falcon's View

Except, of course, that in the real world nobody ever took time to read the more detailed documents, Ops and Dev teams really didn't like being told how to do their jobs, and, at the end of the day, I was frequently reminded that publishing a policy document didn't translate to implementation. Now, note a couple things here.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

11 Key Steps of the Patch Management Process

eSecurity Planet

Also read: Patch Management Policy: Steps, Benefits and a Free Template Step 5: Create documentation before and after patching Keep detailed documentation throughout the patch management process. Document the condition of systems prior to patching, including versions, settings, and vulnerabilities.

article thumbnail

IaaS Security: Top 8 Issues & Prevention Best Practices

eSecurity Planet

Know the IaaS Security Model Provider Understand the security model of your IaaS provider by extensively examining their documentation and connecting with their support channels. Advanced features, such as self-service portals and connection with human resource systems, simplify access control and assure policy compliance.

article thumbnail

Implementing and Maintaining Security Program Metrics

NopSec

Example Security Metrics *Note: This is an example and not to be considered an exhaustive list or necessarily applicable to your specific organization Security Policy/Compliance Adherence Regulatory control compliance Firewall/network security audit data Configuration compliance tracking Compensation control (aka exception) tracking and documentation (..)

article thumbnail

Patch Management Policy: Steps, Benefits and a Free Template

eSecurity Planet

Review and Modify the Patch Management Policy. Even though the first formal Patch Management Policy may be approved by step three, keep in mind that all policies should be living documents that need to change as the organization changes. Overview : sets expectations and goals for the policy.

article thumbnail

10 Reasons to Celebrate 2020

McAfee

With the McAfee Web Security portfolio, organizations can enforce their internet policy compliance and extend their perimeter security for a borderless IT environment.” We believe this customer recognition validates our commitment to innovate and invest in technology that aims to reduce the cost and complexity of modern cybersecurity.