System Integrity Best Practices
The two key components of system integrity are software authenticity and the assurance of user identity. US-CERT recommends that organizations routinely evaluate how to integrate these following best practices into their current environments to achieve these objectives.
These guidelines include:
- Enabling strong logging
- Limiting remote access
- Validating software and more
Included in this ZIP file are:
- Intro Page.pdf
- Terms and Conditions.pdf
- System Integrity Best Practices.pdf