Secure configuration baseline

Secure configuration guidelines include operating systems, servers, communication protocols, software, web services, databases, virtualization, and so on. It's highly recommended to refer to the CIS benchmarks (www.cisecurity.org) as a baseline:

Common software components

Database

MySQL, SQL Server, Oracle

Web Service

Apache Tomcat, NginX

Virtualization

VMWare, Docker

Operating

Linux (Sent, REdHat, Suse, Ubuntu), Windows Server

Get Hands-On Security in DevOps now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.