Device Hardening and Continuous Compliance Monitoring CONTINUOUS COMPLIANCE

Device Hardening & Continuous Compliance Monitoring

NNT Change Trackeraddresses all your device hardening requirements.

Trusted by hundreds of organizations around the world, NNT Change Tracker™ will automatically audit your entire estate – Servers, Database systems, Firewalls and network devices – against auditor-verified hardening checklists. Within just a few minutes you can have a full assessment of how secure your IT estate is, what needs to be done to address any vulnerabilities and how security can be improved further.

Where NNT Change Tracker™ provides a significant advantage over traditional scanning solutions is that configuration changes are monitored in real-time and on a continuous basis. This means that not only is the initial hardening process greatly simplified, but the on-going maintenance of a hardened build standard is now straightforward too. Scheduled, automated reports as well as real-time alerts will identify any weakening of security, but also show how newly introduced vulnerabilities can be mitigated.

Simple to deploy, any compliance report run via Change Tracker - even those imported from SCAP or OVAL content - will also generate a non-stop, continuous monitoring template to give real-time protection to all devices, so much more secure than the monthly snapshot approach provided by a vulnerability scanner.

Better still, Change Tracker provides a further significant advantage over scanning solutions: Systems are also protected with a real-time, host intrusion detection system (HIDS) function, so that even if the worst case scenario arises and your systems are breached, you can take immediate action.


NNT are now a CIS Certified Software Vendor

Change Tracker Enterprise V6.5 has been awarded CIS Security Software Certification for CIS Security Benchmarks

Importance of Configuration Hardening

Using a server, database or network device with default settings in place is an open door to automated computer attack programs. It is vital therefore that a comprehensive security hardening checklist be applied to all devices in your estate.

The good news is that there are numerous reference sources for such checklists – The SANS Institute, NIST, the Center for Internet Security, Microsoft and Oracle all publish hardening best practise checklists, and there are numerous other guides and forums across the internet to help.

The problem is that the checklists are long, complex to understand and time-consuming to implement, even for one server, let alone a whole estate. A typical checklist for an operating system like Windows or Linux will run into hundreds of tests and settings.

Even then, once a hardened build standard has been implemented, the need to regularly – ideally continuously – verify that the server, database or device is being maintained within compliance of your hardened build standard is vital if security is to be enforced.

NNT Change Tracker™ combines unique device configuration and vulnerability auditing with ongoing real-time change detection. Any changes that affect the secure and compliant state of IT systems are tracked and alerted immediately. Better still, with NNT Change Tracker™, an intelligent Change Management operation makes it easy to separate planned from unplanned changes to minimize false positives.

NNT Change Tracker™ allows you to define your own Hardened Build Standard for all devices, combining best practise in security configuration with your organizations’ specific application and operational requirements.

The solution provides:

  • Out of the box PCI DSS, NIST 800-53, ISO 27000, SOX, NERC CIP, HIPAA compliance reports
  • SCAP and OVAL support provides access to hundreds of additional compliance checklists such as DISA STIGs, USGCB and FDCC Configuration Baselines
  • The ability to create your own hardening template and apply it easily across your estate
  • Continuous automated vulnerability auditing
  • Easy to read assessment reports, on-demand or as part of a scheduled emailed report
  • Compliance score sheet per device or for groups of devices, with drill-down option to see exactly where vulnerabilities exist
  • The facility to track any changes to the state of IT systems with planned versus unplanned change reporting
  • Compliance reports combined with extended templates to monitor the health, performance, set up, file and registry integrity along with local security policies, installed software and user accounts
  • The capability to schedule planned changes with the reassurance of a ‘closed loop change management system’ that reports on ‘what actually changed’ and who made the changes


NNT covers all popular platforms such as:

  • Windows, all versions
  • Linux, all versions, including Ubuntu, SUSE, CentOS, RedHat
  • Unix, all versions including Solaris, HPUX, AIX
  • VMWare, all versions including ESXi
  • Database Systems, including Oracle, SQL Server, DB2, PostgreSQL, My SQL
  • Network Devices and Appliances, all types and manufacturers, including routers, switches and firewalls, from Cisco, Nortel, Juniper and Checkpoint

Security Standards and Corporate Governance

All security standards and Corporate Governance Compliance Policies such as PCI DSS, GCSx CoCo, SOX (Sarbanes Oxley), NERC CIP, HIPAA, HITECH, ISO27000 and FISMA require Windows and Unix servers, workstations, firewalls, routers and switches to be secure and configured properly in order to protect and secure confidential data. NNT Change Tracker™ ensures that systems remain in a secure state at all times with an evolving baseline linked to each properly executed planned change.

A hardened system is one that is fundamentally secure and rendered hack-proof. Hardening a device requires known security ‘vulnerabilities’ to be eliminated or mitigated. A ‘vulnerability’ is any weakness or flaw in the software design, implementation or administration and configuration of a system, which provides a mechanism for a threat to exploit the weakness of a system or process.

Security best practise (as an example, the PCI DSS), determines that all ‘within scope’ sites are scanned for vulnerabilities every quarter. This gets expensive in a large scale, multi-site estate, as well as being a time-consuming management overhead. Perhaps the biggest issue is that the results of any scan are only accurate at that point in time – any configuration changes made after the scan could render devices vulnerable and in a worst case scenario, devices could be left vulnerable to attack for a 3 month period.

Fortunately the solution is readily available – NNT Change Tracker™ will continuously track configuration changes, which is the only real way to guarantee the security of your IT estate is maintained. At any time you can see the Compliance Score of any server, database or network device and also, which settings need to be changed to re-harden the configuration. Any changes made will be reported, including Planned Changes, which are handled using NNT Change Tracker™ unique ‘Closed Loop Change Management’ process.

For ultimate peace of mind NNT Change Tracker™ will also govern File Integrity – see here for more details on File Integrity Monitoring

PowerchordWe needed a security management solution that was powerful enough for PCI DSS requirements but something we wouldn’t become slaves too – budget was a concern as always. NNT made the whole process, from proving the concept through to implementation really straightforward
Mark Petit, Director of IT, Powerchord Systems


This product packs quite a bit of features and functionality for a low cost.
SC Magazine
Change Tracker Enterprise ™
Date published: 06/04/2014
5 / 5 stars

Share this page