Kevin Mitnick, in his book The Art of Intrusion, offers sound and succinct advice:
Ensuring proper configuration management is a critical process that should not be ignored. Even if you properly configure all hardware and software at the time of installation and you keep up-to-date on all essential security patches, improperly configuring just a single item can create a crack in the wall.[1]
So what defines a "best practice"?
Processes and activities that have been shown in practice to be the most effective.[2]
[Read More]

