The goal of cybersecurity has traditionally been to find threats and mitigate them. While that sounds logical, heroic even, it leaves teams in a constant cycle of reaction—always chasing the latest attack, alert, or vulnerability. The result? Exhausted teams, complex, hasty efforts, and a security posture that's never quite, well, secure. 

There is a better way: Working from a trusted baseline

 


Quick Summary

A trusted baseline in cybersecurity is an authoritative list of approved files, users, processes, and configurations that defines what is allowed in an environment. Instead of relying on denylists to block known threats, security teams enforce the baseline and manage exceptions. 

Implementing proactive cybersecurity, like System Integrity Assurance, prevents ransomware, stops unauthorized changes, and simplifies compliance with frameworks like CIS Benchmarks, DISA STIGs, and NIST guidelines. By focusing on what's trusted rather than chasing every possible threat, organizations gain stronger protection, faster detection, and more reliable security outcomes. 


 

ITIL and Change Management

It’s easy to forget how young the cybersecurity industry is. Although many of us have been working hard for a couple of decades to protect our organizations from cyber threats, our industry is still in its infancy compared to the more established field of IT operations.

In our recent blog, What Can Cybersecurity Teams Learn from IT?, we examined the differences in how cybersecurity and IT operations teams set and achieve their objectives.

In particular, we focused on the ITIL framework, which is used by IT departments worldwide to help them meet business expectations and SLAs. ITIL emphasizes the importance of getting the basics right, and one of its core components is change management.

Change management follows a very simple process:

  1. Establish a trusted baseline of what’s allowed in our environment.
  2. Track and manage changes from that baseline.

Bring this concept into cybersecurity, and its benefits are clear. If we can establish a trusted baseline of what is allowed—files, users, processes, and so on—and then block everything else, we’ll be a long way towards maintaining the availability, integrity, and privacy of our systems, assets, and data.

However, before we get to that, we need to learn from another much older industry than our own.

 

Applying Physical Security Principles to Cybersecurity

One of the strangest things about cybersecurity compared to other disciplines is the focus on finding bad things and preventing them.

If that sounds strange, think about it like this. If you managed physical security for a building (e.g., a government office), how would you stop the wrong people from getting in?

Most likely, you wouldn’t try to track every single person who isn’t supposed to be in the building. That would quickly exhaust your resources and achieve essentially nothing. Instead, you’d build and maintain a list (baseline) of everybody who should be there and use a control system (probably ID cards and security guards) to ensure only those people are allowed in.

Of course, this system isn’t perfect. Sometimes, someone who was supposed to have access isn’t allowed in. This is easy to manage. The blocked individual simply tells the guard why they should be allowed in, and it’s quickly verified (or not). This process is called ‘managing by exception.’

Alternatively, some people will try to force their way in. Again, this is easy to manage by exception. The security guard will see the problem and apprehend them. This approach runs contrary to most public discussions of cybersecurity principles.

Most cybersecurity controls use denylists to try to identify all possible ‘bad things’ and prevent them. Instead of maintaining a small database of things that are allowed, cybersecurity teams maintain a monstrous database of things that aren’t allowed and constantly monitor for them.

This approach is reactive, slow, and misses threats simply because they haven’t been seen before.

Related Read: 4 Critical Proactive Cybersecurity Measures You Need in 2025

 

Trusted Baselines: What They Include and Why They Matter

A trusted baseline is an authoritative list of approved assets, file hashes, configuration settings, etc., allowed to exist in an environment. In addition to information determined by the organization, a baseline also includes best practices from authoritative sources like CIS Benchmarks and DISA STIGs.

Collectively, this information forms an organization’s trusted baseline. Once the baseline is set, the organization can monitor changes to ensure they comply with the baseline. If they don’t, they can either be blocked at the source, quickly remediated, or—if it turns out that the change is safe—accepted and added to the baseline.

 

5 Steps to Better Security Outcomes

Imagine how life would be for cybersecurity teams if we followed in the footsteps of traditional IT operations and service management. Consider this ITIL-inspired, basic approach to cybersecurity:

  1. Service strategy: Determine objectives for the security function
  2. Service design: Set a trusted, authoritative baseline of what you have (software, hardware, services, etc.) and what is allowed to be and happen in your environment.
  3. Service transition: Enforce the baseline by monitoring changes in the environment and blocking anything that isn’t explicitly allowed.
  4. Service operation: Carry out normal security operations to identify any threats or issues to make it past baseline enforcement.
  5. Continuous service improvement: Learn from mistakes and make changes to the baseline.

This approach is achievable—and with far better results than most security teams have come to expect.

 

System Integrity Assurance: A Proactive Cybersecurity Approach

System Integrity Assurance (SIA) is a completely different approach to cybersecurity that focuses on the fundamentals. Instead of trying to identify and categorize all bad things, it identifies everything that is allowed in an environment—and blocks everything else.

Some level of management by exception is needed, of course. But fundamentally, SIA gives organizations complete control over what happens in their environment.

This begs another question:

What happens if you know every time something is added, removed, or changed in your environment, and you stop anything that isn’t authorized… and you expand this capability across all asset classes?

  • Ransomware and other malware can’t run in the environment.
  • Attackers can’t traverse the network or exfiltrate data.
  • Nobody can change files or configurations to make them dangerous or non-compliant.
  • Users can’t accidentally run malicious attachments.
  • Nobody (even privileged administrators) can alter critical system files.

This approach takes away a massive proportion of the threats that can arise in an IT environment with minimal human involvement.

To learn how trusted baselines and System Integrity Assurance can stop ransomware, prevent misconfigurations, and simplify compliance, download the Authoritative Guide to System Integrity Assurance.

system integrity assurance

Lauren Yacono
Post by Lauren Yacono
August 26, 2025
Lauren is a Chicagoland-based marketing specialist at Cimcor. Holding a B.S. in Business Administration with a concentration in marketing from Indiana University, Lauren is passionate about safeguarding digital landscapes and crafting compelling strategies to elevate cybersecurity awareness.

About Cimcor

Cimcor’s File Integrity Monitoring solution, CimTrak, helps enterprise IT and security teams secure critical assets and simplify compliance. Easily identify, prohibit, and remediate unknown or unauthorized changes in real-time