![]() Print the checklist and check off each item you complete to ensure that you cover the critical steps for securing your server. The Information Security Office has distilled the CIS lists down to the most critical steps for your systems, with a particular focus on configuration issues that are unique to the computing environment at The University of Texas at Austin. ![]() The hardening checklists are based on the comprehensive checklists produced by CIS.
0 Comments
Leave a Reply. |