device hardening

 the methods used to eradicate means of attack, this can be:

  • Disabling unused network ports
  • strict password management
  • using multi-FA
  • updating computer systems to patch out bugs
  • removing non essential programs
  • setting time limits
  • staff training 
  • rotating generated passwords

Network hardening best practices

  • Ensure your firewall is properly configured and that all rules are regularly audited and updated as needed
  • Secure remote access points and remote users
  • Block any unnecessary network ports
  • Disable and remove unused or extraneous protocols and services
  • Encrypt network traffic

Server hardening best practices

  • All servers should be established in a secure data center
  • Harden servers before connecting them to the internet or external networks
  • Avoid installing unnecessary software on a server
  • Compartmentalize servers with security in mind
  • Use the principle of least privilege when setting up superuser and administrative roles

Application hardening best practices

  • Remove unnecessary components or functions
  • Restrict access to applications based on user roles and context
  • Remove or reset default passwords
  • Audit software integrations and remove unnecessary integrations or privileges

Database hardening best practices

  • Use access control and permissions to limit what users can do in a database
  • Remove unused accounts
  • Turn on node checking for user verification
  • Encrypt data in transit and at rest
  • Enforce secure passwords

Operating system hardening best practices

  • Use a patch management tool to apply OS updates and patches automatically
  • Remove unnecessary drivers, software, and services
  • Encrypt local storage
  • Limit registry and other systems permissions
  • Log appropriate activity, errors, and warnings

source: NinjaOne

Comments

Popular posts from this blog

ESP overview

Stakeholder roadmap

hw 12/5