“When the average computer user thinks about security, they
usually think about reactive measures like anti-virus programs or
security patches–responses to a specific threat. Such measures
play a role in securing a workstation or a network, but they are
often less than half the story. A more efficient approach is to
configure a system securely from the start. Yet the realities of
the software market and IT management, as well as efforts to
increase user convenience, often mean that security by
configuration is neglected, despite the straightforwardness of most
of the steps needed to obtain it.“Configuration-centered security is sometimes called security
architecture or proactive security. Under any name, the approach
means making the design and installation of a computer system part
of your security…”
Linux.com: Configuration: The Forgotten Side of Security
By
Bruce Byfield
Get the Free Newsletter!
Subscribe to Developer Insider for top news, trends, & analysis