device hardening
the methods used to eradicate means of attack, this can be:
- Disabling unused network ports
- strict password management
- using multi-FA
- updating computer systems to patch out bugs
- removing non essential programs
- setting time limits
- staff training
- rotating generated passwords
Network hardening best practices
- Ensure your firewall is properly configured and that all rules are regularly audited and updated as needed
- Secure remote access points and remote users
- Block any unnecessary network ports
- Disable and remove unused or extraneous protocols and services
- Encrypt network traffic
Server hardening best practices
- All servers should be established in a secure data center
- Harden servers before connecting them to the internet or external networks
- Avoid installing unnecessary software on a server
- Compartmentalize servers with security in mind
- Use the principle of least privilege when setting up superuser and administrative roles
Application hardening best practices
- Remove unnecessary components or functions
- Restrict access to applications based on user roles and context
- Remove or reset default passwords
- Audit software integrations and remove unnecessary integrations or privileges
Database hardening best practices
- Use access control and permissions to limit what users can do in a database
- Remove unused accounts
- Turn on node checking for user verification
- Encrypt data in transit and at rest
- Enforce secure passwords
Operating system hardening best practices
- Use a patch management tool to apply OS updates and patches automatically
- Remove unnecessary drivers, software, and services
- Encrypt local storage
- Limit registry and other systems permissions
- Log appropriate activity, errors, and warnings
source: NinjaOne
Comments
Post a Comment