The correct answer is 'Create and implement a documented security configuration baseline'. This is because before deploying new servers or any computing resources, it is essential to have a standard, documented configuration that aligns with organizational security policies. This security configuration baseline serves as a reference point to ensure all systems start from a secure state. Using industry best practices as a guide does not guarantee alignment with the specific organization's policies, which is why it is not the best initial step. Scanning the servers with a vulnerability scanner after deployment or conducting a security awareness training for IT staff are important practices, but they come after establishing a baseline for system configuration.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a security configuration baseline?
Open an interactive chat with Bash
Why is using industry best practices alone not enough for server configuration?
Open an interactive chat with Bash
How does scanning for vulnerabilities differ from implementing a security baseline?