Security baseline
A security baseline involves essentially configuring your laptops, servers, cloud assets, and network devices according to specific controls. For example, all users must have a 14-character password. The parameters include at least one special character, a number, and upper- and lower-case characters. The strongest passwords to use are covered in Chapter 2. Password complexity and length are considered configurations. What makes a security baseline is when a new laptop, server, or cloud asset is built to have a base image with the specific controls already configured. In this way, every new Windows laptop and Macbook are built the same, with the same controls enforced for every new laptop issued by your company. Every type of asset your company has should have an associated security baseline. You should start with your network devices, user laptops, and critical servers. Another example is that your firewalls need to be configured with deny/all by default, which means...