![5810aa4f 3b43 4b34 a2aa dfd1d4328485 hacker valley thumb 1](/assets/imager/images/32424/5810aa4f-3b43-4b34-a2aa-dfd1d4328485-hacker-valley-thumb_1_3f81fc6303236aeedf0885f73bd747c3.png 200w, /assets/imager/images/32424/5810aa4f-3b43-4b34-a2aa-dfd1d4328485-hacker-valley-thumb_1_2a1fd2b9f08921476dd482120a4627cc.png 400w, /assets/imager/images/32424/5810aa4f-3b43-4b34-a2aa-dfd1d4328485-hacker-valley-thumb_1_ab829ea53212f9b25775984a19e3b3e7.png 600w, /assets/imager/images/32424/5810aa4f-3b43-4b34-a2aa-dfd1d4328485-hacker-valley-thumb_1_3716995d9d06fee3d3978a9e9740aa24.png 613w)
Video
System Baseline Hardening Deployment
December 12, 2017
![Resources New Videos System Hardening 1](/assets/imager/images/31896/Resources-New-Videos-System-Hardening_1_98edf1443e0d9b3e52b3d719c6b1d6f9.jpg 300w, /assets/imager/images/31896/Resources-New-Videos-System-Hardening_1_165059becc3e0edd115b9e109c59d8ec.jpg 600w, /assets/imager/images/31896/Resources-New-Videos-System-Hardening_1_4be728a53ab8953813124ff77c2a3e8c.jpg 814w)
Many compliance programs, such as PCI DSS, HIPAA, FISMA and CGIS require a hardened baseline to be implemented within an organization’s information systems. Kyle Snavely explains how to build a hardened baseline, examine some of the tools to assist in a phased approach to deployment, demo Ansible and Microsoft compliance manager and discuss some common issues.
Fill out the form below to contact Coalfire: