Configuration & Build Management
CNS’ build validation service is designed to help businesses comply with their regulatory mandates without overstretching their IT function and resources. The service us built on CNS' proprietary VALIDATIONengine technology.
The service provides automated & scheduled build & configuration checks against bespoke baseline templates for WINDOWS, UNIX, LINUX and more.
Whether you require PCI-DSS build compliance or compliance against a host of Government build regulations (such as HMS IS2 Baseline Control Set), CNS’ VALIDATIONengine will give you the ability to choose your own compliance validation template. Build validation templates can be scheduled to automatically scan and validate your IT estate ranging from network devices and servers to applications and databases, on a regular and cyclic basis and as part of your company’s compliance life-cycle strategy.
Agent-less deployments give a fully flexible, customizable and secure service whilst TCO is lowered by dramatically reducing internal administration overhead, improving efficiency of IT Operations and being better prepared for meeting the required audit & regulation standards. Validation testing, reporting and prioritised maintenance scheduling can all be delivered thereby allowing internal staff to concentrate on their primary ‘day job’ activities.
CNS’ configuration management service (based on our proprietary CONFIGengine) deals with the automatic identification, controlled storage, change control, status reporting and review of target network component configurations throughout the enterprise estate.
Compliance and regulatory mandate has forced many organisations into taking accountability for the traceability and integrity of data in transit across their IT estate; CNS’ CONFIGengine makes a significant contribution to helping their customers achieve this through providing a mechanism for assuring the integrity and availability of their data network.
CONFIGengine tackles the following primary objectives of configuration management;
What are the components of the network?
What is the configuration of a network device?
Configuration Change Control;
Identify and maintain device configuration baselines
Identify and control device access and applied changes
Configuration Status Accounting;
Maintain record of configuration changes
Report configuration status change
Regular review of device configuration against best practice
Regular review of status accounting information
A primary exponent to securing a network is the need to identify, control and report on the configuration of a networks components at any given time. As a result, configuration management is now considered an integral process within the compliance life-cycle.