Asset & Data Management · AD-Q04

Question: Are secure configuration baselines defined and applied to servers, endpoints, databases, and cloud services?

Objective — Why This Matters

Default settings are attacker-friendly. Baselines harden systems consistently, reduce noise for monitoring, and cut the window for misconfigurations.

Maturity Levels (0–5)

0 — Unaware
No hardening; defaults everywhere.
1 — Ad Hoc
Individual admins apply tweaks without documentation or review.
2 — Defined
Baseline documents for key platforms; variance process established.
3 — Managed
Automated configuration management enforces baselines; drift is tracked.
4 — Integrated
Baselines tied to vulnerability scans and change control; exceptions time-bound.
5 — Optimized
Continuous compliance dashboards and periodic baseline refresh from threat intel.

How to Level Up

From → To Actions
0 → 1 Choose one baseline per platform (e.g., CIS); document top 10 settings.
1 → 2 Publish baseline guides for servers, endpoints, DB, and cloud; add variance form.
2 → 3 Use config management (or MDM) to enforce; monitor drift weekly.
3 → 4 Link exceptions to risk register with expiry and compensating controls.
4 → 5 Review baselines semiannually against new threats and audit results.

People / Process / Technology Enablers

Evidence Required

Metrics / KPIs

Low-Cost / Open-Source Options (MSME)

Purpose Tool Notes
Servers Ansible + CIS roles Start with parameterized hardening roles.
Endpoints Intune basic / Open-source MDM Enforce core lockdowns and updates.
Cloud Terraform + policy checks Validate configurations against guardrails.

Common Pitfalls

Compliance Mapping

Standard Clauses / Notes
ISO/IEC 27001 A.8.9 (configuration management).
NIST CSF 2.0 PR.IP-1/3, PR.AC-4.
NIRMATA Scoring AD-Q04 Level ≥3 requires enforcement + drift metrics.