Gold Image and Baseline Configuration Standard - ICS and OT Security
Being the victim of a cyber-attack can be scary, expensive and potentially business-crippling. So how do you prevent a cyber-attack? Start with making security a priority for all IT operations, and the first place to start is by making systems as ‘hacker proof’ as possible: Gold Build Standard? Corporate Build / Hardened Build? Controlled Image? Baseline Configuration?