device hardening
the methods used to eradicate means of attack, this can be: Disabling unused network ports strict password management using multi-FA updating computer systems to patch out bugs removing non essential programs setting time limits staff training rotating generated passwords Network hardening best practices Ensure your firewall is properly configured and that all rules are regularly audited and updated as needed Secure remote access points and remote users Block any unnecessary network ports Disable and remove unused or extraneous protocols and services Encrypt network traffic Server hardening best practices All servers should be established in a secure data center Harden servers before connecting them to the internet or external networks Avoid installing unnecessary software on a server Compartmentalize servers with security in mind Use the principle of least privilege when setting up superuser and administrative roles Application hardening best practices Remove unnecessary co...