Demo: Using Nessus Cloud for Configuration Audits
While many organizations rely on their vulnerability management program to find critical vulnerabilities like the highly-publicized Shellshock, Poodle and Ghost, it’s equally important to validate system build and configuration change management processes, as problems in these areas can also leave your systems and data at risk.
Nessus Cloud configuration audits are designed to help you avoid system misconfigurations. They utilize well-known configuration benchmarks such as Center for Internet Security (CIS) or DISA STIG to assess systems, databases and applications. In this webcast, we’ll share:
- The different types of configuration audits available
- How to setup Nessus Cloud compliance auditing with and without Nessus Agents
- How to use configuration audit results to avoid system misconfigurations that can leave your data at risk