Five Security Budget Tips for 2011
Five tips that IT organizations should use to remind the business side why it needs to invest in security.
Information systems are complicated beasts in a perpetual state of flux. Managing and maintaining the security of all the components (routers, switches, workstations, etc.) is no easy task when the system is constantly changing due to new software and hardware, new threats and patches deployed to fix problems with existing components.
In order to prevent adverse effects to system security in the face of such ongoing change, the National Institute of Standards and Technology (NIST) created the Guide for Security Configuration Management of Information Systems. While the guidelines are intended to assist organizations that manage and administer security measures for federal information system computing environments, these principles and concepts can also be applied in private sector businesses and other enterprises.
Whether you manage the system in-house or rely on an external supplier for these computing services, put these guidelines in place to stay on top of security risks and keep pace with change.