Perform System Configuration Gap Analysis
I conducted a live lab on gap analysis to assess the current security posture of an organisation and identify areas for improvement. The live lab involved a comprehensive review of existing policies, procedures, and technical controls in place to safeguard information systems.
During the session, I utilised a systematic approach to identify discrepancies between the organisation's current practices and industry best practices. This involved examining frameworks and looking at requirement comparisons. By analysing the findings, it became evident where deficiencies existed in Minimum Password Length, Lockout Bad Count amongst others.
The outcome of the live lab was a detailed report highlighting specific gaps, alongside prioritised recommendations for enhancements. This process not only assisted in developing a roadmap for strengthening cybersecurity measures but also facilitated a deeper understanding of the organisational risks and the necessary steps to mitigate them effectively. I also learnt that it is essential to tailor baselines and frameworks according to an organisations security requirements and business goals.
We can see from the gap analysis that PC10 is currently not compliant with the security baseline template and some enhancements need to be carried out. Here we established the differences between the intended or expected configuration of a system and its actual operating configuration.