Specifying security baselines for server and client endpoints
The various endpoint devices are important when designing and building a strategy for zero-trust and defense in depth. Users utilize endpoint devices to access resources and server endpoints to make up critical infrastructure for applications. These devices are key to the company’s ability to function but are also an attack surface where vulnerabilities can be exploited if proper due care and due diligence are not taken seriously.
That due care and due diligence require recognizing and understanding where the vulnerabilities are within server and client endpoints. Creating a proper security baseline and strategies for how users, groups, and teams utilize and access endpoints will reduce the attack surface on these devices.
Microsoft attempts to design its Windows client and server operating systems to be secure out of the box. However, the secure nature of the operating systems does not last as bad actors attempt...