A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Desired State Configuration (DSC): Dream Tool or Nightmare for Security Baseline and Configuration Management - Zack Wojton Wayne Pruitt zbirdflipper Bsides Cleveland 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)

Desired State Configuration (DSC): Dream Tool or Nightmare for Security Baseline and Configuration Management
Zack Wojton Wayne Pruitt zbirdflipper

There are many particle use cases for Desired State Configuration (DSC), but can it add to a deployable secure enterprise? We will explore managing registry settings (and why you would use DSC), Drift of configuration and how to fix it, controlling services and processes as well as if we can break it! As well as chat about just how costly it is to deploy in a mature environment. We will explore just how flexible deploying DSC is as well as if secure baselines can be deployed and managed from Jump Street! (Covering both Windows and Linux deployments) Let’s secure machines from the start!

Wayne Pruitt is the Lead Trainer and Managing Partner of the Hardbit Solutions team and totes a heavy duffle of IT certifications, lately his "IT love" is Secure Programming. Over the years Wayne has held many jobs supporting a variety of roles; ranging from helpdesk, security administrator, to IT manager. Zack Wojton is the Chief Operations Officer of Hardbit Solutions, loves exploring technologies and long walks in parks during sunset. Zack believes that with sharing information on new technologies can lead to good things!


Back to Bsides Cleveland 2015 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast