The remainder of this paper is organized as follows. Section
2 presents the related work. Section 3 discusses the
security settings adapted from the CIS documents and the
new ones proposed in this work. Section 4 describes the
security assessment tool and Section 5 presents the preliminary
evaluation. Finally, Section 6 concludes the paper and
puts forward ideas for future work.