Key Benefits of Project Implementation
Enhanced Security Posture
Reduced Attack Surface
Improved Compliance
Strengthened Authentication Mechanisms
Audit and Monitoring
Supported platforms
Windows 2008
Windows 2012
RHEL 6
RHEL 7
Overview of the Project
CIS Profiles provide a practical and effective approach to securing your IT environment, offering pre-configured, well-researched security settings tailored to a wide range of systems and applications. Developed by the Center for Internet Security (CIS), these profiles are based on the latest threat intelligence and industry best practices. They simplify the process of securing infrastructure across platforms such as Windows, Linux, macOS, and cloud services. By implementing these profiles, organizations can ensure their systems are configured to minimize vulnerabilities, protecting against common threats and attacks.
The real value of CIS Profiles lies in the peace of mind they provide. By following these guidelines, organizations can stay ahead of potential security risks, reduce time spent on manual configurations, and ensure compliance with key industry regulations like HIPAA, PCI-DSS, and GDPR. Beyond just a set of recommendations, CIS Profiles help businesses lay a solid security foundation, safeguard sensitive data, streamline security processes, and foster a culture of proactive cybersecurity. With regular updates and a focus on actionable security, these profiles are a vital resource for organizations looking to strengthen their defenses and reduce risk.
I was approached by the Information Security (InfoSec) team to implement CIS policy controls across enterprise-supported operating systems, including on-premises, AWS, and Azure cloud environments. After reviewing the standards, I worked closely with both the Operating Systems and InfoSec teams to ensure alignment. Together, we decided to implement 95% of the policy controls outlined in the CIS report, excluding the remaining 5% due to non-alignment with Informatica standards.
I successfully designed and developed a cookbook to automate the implementation of the agreed standards, which was then audited and approved by a third-party cyber security agency.
Additionally, I developed InSpec profiles to verify the applied CIS policy controls and generate reports in HTML format, ensuring that the implementation was both validated and easily accessible. Tech: Chef, CIS Profiles, Inspec Profiles, Jenkins