top of page
  • Writer's pictureCHTS

CIS #4: Secure Configuration of Enterprise Assets

We are focusing on Control #4 from the Center for Internet Security. This control focuses on the secure configuration of enterprise assets, such as:

  • Servers

  • Workstations

  • Portable and Mobile Devices (laptops and cell phones)

  • Network Devices (switches, access points, printers)

  • Internet of Things (IoT) Devices (smart devices like thermostats, cameras, appliances, etc.)


To ensure that these devices are safely communicating on the internet as well as on your local network, security features and policies must be enabled and adjusted. These Secure Configurations keep your data and network traffic from falling into the wrong hands, and include the following:

  • Enforcing automatic screen locks

  • Updating software and firmware

  • Enabling hardware and software firewalls

  • Using next-generation antivirus/antimalware

  • Accessing devices via secure ports

  • Disabling default accounts

  • Limiting device management to secured network protocols

These configurations along with the encryption and secure disposal of end-user devices are vital defenses in the ever-changing landscape of cyber security.

If you have any questions about your organization’s enterprise assets and their secure configuration, please call us at 719-264-1384 and ask to speak to your Team Manager!

2 views0 comments

Recent Posts

See All
bottom of page