Balancing Security and Efficiency: CIS Benchmarks for Authentication and Power Management

Senteon
3 min readDec 16, 2023

--

In the fourth segment of the 28th episode of the CIS webinar series, the focus shifts to the CIS benchmarks, specifically discussing power management and user authentication settings. This segment offers a deeper understanding of how these benchmarks contribute to a robust cybersecurity strategy.

Understanding CIS Benchmarks

Rich, one of the panelists, provides a quick overview of the CIS benchmarks. These benchmarks are prescriptive guides for setting up baseline configurations correctly. They offer recommendations on proper configuration settings to mitigate common attack vectors in an environment. Following these benchmarks sets organizations up for success in cybersecurity.

Power Management and Security

The discussion then moves to specific settings related to power management. One key recommendation is to disable network connectivity during connected standby on battery. This setting is crucial because it reduces the attack surface when the device is in standby mode, not actively used, and running on battery power. The panelists emphasize that these settings not only enhance security but also extend battery life and conserve resources.

Importance of User Authentication

Another critical setting discussed is requiring a password when a computer wakes from sleep mode on battery. This setting adds an extra layer of security, ensuring that even if other session timeout settings are not configured correctly, unauthorized users cannot access the system without a password. This setting is part of the broader concept of defense in depth, where multiple layers of security measures are implemented to protect against various attack vectors.

The Role of Two-Factor Authentication

Addressing a query about two-factor authentication (TFA), the panelists agree that while TFA is crucial, it should be part of a layered security approach. Even with TFA, other settings like requiring a password on wake are still important to maintain robust security.

Cyber Hygiene and CIS Controls

The panelists conclude this segment by reiterating the importance of good cyber hygiene, emphasizing that implementing CIS controls should be the bare minimum for organizations. These controls and benchmarks are not just about preventing specific attacks but about creating a comprehensive security posture that makes it more challenging for attackers to succeed.

Conclusion

This segment of the CIS webinar series highlights the importance of detailed settings in power management and user authentication as part of a comprehensive cybersecurity strategy. By following the CIS benchmarks, organizations can significantly enhance their security posture, making it more difficult for attackers to exploit vulnerabilities. As we continue to explore the complexities of cybersecurity, these insights provide valuable guidance for organizations looking to strengthen their defenses against digital threats. Stay tuned for more insights from the upcoming segments of this informative webinar series.

Are you ready to transform your cybersecurity approach? Contact Senteon today for a comprehensive risk assessment, and don’t forget to watch the full webinar video for a deep dive into these strategies with Marty Godsey and other experts. Your journey to cybersecurity excellence starts here.

Full Webinar Episode: https://www.youtube.com/watch?v=me5OuiRrIPY

--

--

Senteon
Senteon

Written by Senteon

Automated system hardening at the press of a button. Check us out at: Senteon.co

No responses yet