Episode 58 — A.8.9–8.10 — Configuration management; Information deletion
A.8.9 requires establishing secure configuration baselines and maintaining them through change discipline, making it a frequent exam target for questions about drift control and evidence. Candidates should explain baseline sources (vendor hardening guides, CIS benchmarks), enforcement methods (IaC templates, GPOs/MDM, golden images), and monitoring for deviation via configuration assessment tools. The control demands segregation of environments, approved change pathways, and rollback plans, with documentation that ties configuration items to assets, owners, and versions. Common weaknesses include snowflake servers, manual post-install tweaks, and exceptions that never expire. Strong programs codify baselines as code, perform peer-reviewed changes, measure compliance percentages, and treat drift alerts as incidents until reconciled. Configuration management underpins many other controls by ensuring predictable behavior, simplifying forensics, and preventing the “it works on my machine” risk from leaking into production.
A.8.10 governs information deletion throughout the data lifecycle so that retention policies, privacy obligations, and business needs are all satisfied. For the exam, emphasize defined triggers (contract end, account closure, retention expiry), methods proportional to media and classification (secure delete APIs, crypto-shredding, overwriting, tombstoning within distributed stores), and verification that deletions succeeded end-to-end, including replicas and backups when applicable. Programs must document where deletion is delayed for legal hold, how users’ requests are honored, and how systems avoid re-hydrating deleted data via caches or search indices. Pitfalls include “soft delete” without purge, orphaned snapshots, and third-party processors not synchronized with deletion instructions. Effective implementations provide auditable logs, periodic sampling, and automation to minimize human error, while balancing resilience—backup immutability—with privacy and contractual requirements. Candidates should connect configuration discipline with correct deletion: if you do not know exactly how systems are built and replicated, you cannot prove that data is truly gone when policy says it must be. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.