Skip to main content
Question

CIS Benchmark guides?


Forum|alt.badge.img

Hi all - we are starting to align more closely with Security around our EPM solution.  Is there a hardening guide around EMPfW/M? CIS benchmarks often do this around various products (Windows, mac, ubuntu, Browers etc); is there a guide that exists around EPM?  This would help us document our defined Technical Controls more easily than going through setting by setting and also ensure we are following security best practices around EMP.  

Did this topic help you find an answer to your question?

Forum|alt.badge.img+3

Forum|alt.badge.img
  • Rising Star
  • March 11, 2025

Hi Jens!  Long time no talk.  This is not what we are after, what you have provided is for the endpoint application performance impact.  

Things we are looking for are, do you allow your environment to be accessed publicly or is it restricted to managed devices within your environment, what admin controls are around who can can access what features of the solution (reporting, policy editing etc.) 


Forum|alt.badge.img+3

Likewise.
The SCIM API can provide some of the information about Users, Roles and Permissions.
Use the Swagger below.

Authentication Provided Settings will limit who can sign in and from where.
Controlled by one of these supported providers, OKTA, MS, Ping Identity or Google.

https://instance-services.pm.beyondtrustcloud.com/management-api/swagger/index.html?urls.primaryName=v2


Paul
BeyondTrust Employee
  • BeyondTrust Employee
  • March 13, 2025
MichaelD wrote:

Hi all - we are starting to align more closely with Security around our EPM solution.  Is there a hardening guide around EMPfW/M? CIS benchmarks often do this around various products (Windows, mac, ubuntu, Browers etc); is there a guide that exists around EPM?  This would help us document our defined Technical Controls more easily than going through setting by setting and also ensure we are following security best practices around EMP.  

Hey MichaelD, 

Just so I make sure I’ve correctly understood your ask here - are looking for BeyondTrust guidance on how to configure EPM securely, or how you might configure EPM in support of hardening an endpoint via EPM policy?

If it’s the former, are you looking at guidance related to configuration/hardening of the agent and related components, or are you looking for good practice or even prescriptive configuration for the policy side of EPM, or perhaps both? 

Cheers,
Paul


Reply


Cookies

By clicking “Accept Cookies”, you agree to the storing of cookies on your device to enhance and personalize your experience. Learn more about our cookies.

 
Cookie settings