Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

OS Security Outside the Box

September 8, 2003
Today’s operating systems are more sophisticated and feature-rich than ever before, which makes them substantially more useful to the enterprise.

But these elements also add to security vulnerability, unless the operating systems are configured, administered and monitored correctly.

Contrary to popular belief, this can be accomplished with a minimum of fuss and bother. The magic bullet is to centralize and automate operating system security across the enterprise, rather than do it manually for each box.

In fact, the cost and risk of not centralizing and automating operating system security is enormous. Over half of the security break-ins are due to operating systems that were never configured properly, or were not verified and monitored on a regular basis. The operating systems were provisioned out-of-the-box at the default security settings, which made them highly vulnerable to attack.

Steps to Take

There are three things that need to happen to enhance operating system security across the enterprise network.

1. Provisioning servers on the network should be done once in one place, involving the roughly tens of separate configurations most organizations require. This image, or set of images, can then be downloaded across the network, with the help of software that automates this process and eliminates the pain of doing it manually for each server. Moreover, even if you had an instruction sheet for these key configurations, you wouldn’t want local administrators to access these key configurations for each server. That’s dangerous. The best way to do it is once and for all.

Once the network has been provisioned, administrators need to be able to verify policy compliance, which defines user access rights and ensures that all configurations are correct. An agent can be running on the network or remotely that monitors each server continuously, and doesn’t interfere with normal operations.

2. Account management needs to be centralized to control access to the network and to ensure that users have appropriate access to enterprise resources. Policies, rules and intelligence should be located in one place – not on each box – and should be pushed out from there to provision user systems with correct IDs and permissions. An ID lifecycle manager can be used to automate this process and reduce the pain of doing this manually.

3. The operating system should be configured so that it can be used to monitor activity on the network easily and efficiently – revealing who is and isn’t making connections, as well as pointing out potential security events coming out of the operating system. Administrators can use a central “dashboard” that monitors these events in real-time, and alerts them to serious problems based on preset correlations and filtering. Just as important, this monitoring system should be set up so that administrators are not overwhelmed by routine events that do not jeopardize network security and normal business operations.

Perhaps most important, the best security in the world doesn’t have to be a budget buster or interfere with normal business operations.

As organizations move from manual to automated security processes, there are significant cost savings to be had. Manual processes are not only expensive and inflexible; they contribute significantly to breakdowns that add to costs. In fact, properly configured operating system security is a business enabler that will save money as it keeps the bad guys inside and out where they belong – on the defensive.

There also is concern over security of e-business over the Web.

In the course of deploying new applications, security has probably been implemented on an application-by-application basis. With disparate applications that require different security approaches, it is almost impossible to administer, manage and maintain a coherent, cohesive security policy efficiently.

In a white paper, “IBM Tivoli Access Manager for e-business,” there are positive suggestions on how software can enhance the efficiency and efficacy of security throughout an operational environment. Such a powerful solution extends authentication and authorization beyond software to other applications, and provides unified robust administration, more secure Web single-sign-on, enhanced performance, availability and scalability.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Person holding phone to smart lock

Why it’s Time to Move on From Legacy Access Control Systems

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

2026

What Security Leaders Could Expect in 2026

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Wooden library shelves full of books

    Protect the entire campus: Security incidents outside of the classroom

    See More
  • Thinking Out of the Box for Stronger Security

    See More
  • Beyond the Box: Security That Works

    See More

Related Products

See More Products
  • The Complete Guide to Physical Security

  • 150 things.jpg

    The Handbook for School Safety and Security

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing