- Platform
- Main Menu
- Platform
- Platform Overview
- SL1
- Skylar AI
- Skylar Advisor
- Skylar Analytics
- Skylar Automated RCA
- Restorepoint
- Hybrid Cloud Monitoring
- Multi-Cloud Monitoring
- Network Monitoring
- Integrations
- Trust Center
- Technology Partners
- Why ScienceLogic
- Compare
- Virtual KeynoteWatch the Video
Introducing Skylar AI: the suite of advanced AI capabilities that will redefine productivity, creativity, and decision-making across industries.
- Solutions
- Main Menu
- Solutions
- By Industry
- Solutions
- By Industry
- Enterprise IT Solutions
- Global System Integrators
- Service Providers
- Government & Public Sector
- Financial Services
- Channel Partners
- Learn More
We saw a better than 80% reduction in incident-related noise.
Download the Forrester Total Economic Impact™ which examined four enterprises with large, complex IT estates to measure the value and return on investment of ScienceLogic's AIOps Solution.
- By Solution
- Solutions
- By Solution
- AIOps Digital Transformation
- Business Service Management
- Tool Consolidation & Modernization
- IT Workflow Automation
- IT Infrastructure Monitoring
- Network Management
- Network Compliance
- Learn More
We saw a better than 80% reduction in incident-related noise.
Download the Forrester Total Economic Impact™ which examined four enterprises with large, complex IT estates to measure the value and return on investment of ScienceLogic's AIOps Solution.
- By Use Case
- Solutions
- By Use Case
- Accelerate Incident Response with Automated ITSM Workflows
- Automated Troubleshooting & Remediation
- Eliminate Visibility Gaps with Hybrid Cloud Monitoring
- Automate PCI DSS Compliance Checks for Network Devices
- Reduce MTTR and Boost Efficiency
- Learn More
We saw a better than 80% reduction in incident-related noise.
Download the Forrester Total Economic Impact™ which examined four enterprises with large, complex IT estates to measure the value and return on investment of ScienceLogic's AIOps Solution.
- Customers
- Resources
- About
Security and Compliance Network Cyber Essentials
Best practices are key when approaching your cybersecurity and compliance strategy, any source of guidance is beneficial.
The Cyber Essentials is a UK Government, industry-supported set of best practices introduced by the National Cyber Security Center (NCSC) to help organizations demonstrate operational security maturity.
The guidance contained within is not country-specific, any organization can use it to guide their security program to build a more secure foundation for their business and focus technical architecture and setup on secure best practices.
The program offers two routes to certification:
- Cyber Essentials: A self-assessed option giving protection against a wide range of cyber-attacks, showing organizations how to address the basics and prevent the most common types of incidents.
- Cyber Essentials Plus: Includes a hands-on technical verification of the controls and best practices put into place that align with the Cyber Essentials certification.
The UK government requires all suppliers bidding for contracts involving the handling of sensitive and personal information to hold an up-to-date Cyber Essentials certificate.
However, while the technical best practices provide specific guidance to follow it is important to understand the intent of the guidance and augment or modify them to ensure a secure and resilient outcome.
Firewalls and other network devices
All devices run network services to allow them to communicate with other devices and services. By restricting access to these services, you reduce your exposure to attacks. You can do this using firewalls or network devices with firewall functionality. For cloud services, you can achieve this using data flow policies.
The Firewall requirement specifies several controls, including that you must change default administrative passwords to a secure alternative, or disable remote administrative access. We strongly recommend that administrative access is disabled or restricted to a high degree. In a recent Cisco Zero Day the administrative access was used to gain access to organization’s networks.
You must also block unauthenticated inbound connections by default, this is often setup by default but can be removed, and in the real-world firewall rules are often relaxed to fix problems or allow applications to operate to maintain availability. We strongly recommend monitoring configuration and changes at the source, as well as through change management and approval processes.
Insecure default configurations
For all devices, especially those that provide network capabilities you must ensure that computers and network devices are properly configured to provide only the services required to fulfil their role
Standard out-of-the-box configurations often include one or more weak points such as pre-enabled user accounts and pre-installed – but unnecessary – applications or services.
These default installations can allow attackers to gain unauthorized access to your organization’s sensitive information. You should ensure that systems are configured with the minimum set of access and services to provide the most secure systems.
Security vulnerability management
Vulnerability management is a key topic for all security teams, Cyber Essentials requirements states that you must ensure that devices and software are not vulnerable to known security issues for which fixes are available.
The Cyber Essentials requirements recommend that all released updates are applied within 14 days of being available. This is a reasonable time frame for teams to operate, however it is also true that vulnerabilities often start to be exploited by attackers within days of being disclosed.
In the real-world updates can take time to deploy, teams will often put compensating controls into place to limit the exploitability of the vulnerability – we recommend that those compensating controls are verified at source to ensure they stay in place until the updates are made.
If they are not limiting business services – they are doing no harm – it is good practice to leave them in place. Vulnerabilities exist before they are disclosed by vendors, so it is wise to operate the most secure state possible at all times.
How ScienceLogic can help
ScienceLogic’s solutions provide the means to monitor – and alert – based on known good state for configurations, your teams can maintain vital awareness of the actual state of network configurations against network security best practices such as the UK’s Cyber Essentials.
By comparing the configurations during regular backups using simple or complex rules and pre-configured templates repetitive processes – like audits and configuration backups – can be automated to manage those configurations.
It is of utmost importance for organizations to build a comprehensive understanding of their systems with a complete inventory of assets allowing you to understand what assets you have and how they are configured.
Contact us to discuss our Network Configuration Management and Compliance solutions with one of our experts.