Hardening Techniques - 2.5
Examples of Hardening Techniques
- Changing Default Passwords: Always change default passwords to strong, unique passwords to reduce the risk of unauthorized access.
- Removing Unused Software / Hardware: Unused software or hardware can become a vulnerability. Removing these reduces the attack surface.
- Keeping System OS / Apps Up to Date: Regularly update operating systems and applications with the latest software patches to address vulnerabilities.
- Host-Based Firewall: Monitors and controls inbound and outbound network traffic at the host level, enhancing security by filtering traffic based on defined rules.
- EX: NextGen Firewall (NGFW)
- Host-Based Intrusion Prevention System (HIPS): A system that monitors and responds to malicious activity in real time to prevent unauthorized actions.
- Endpoint Detection and Response (EDR) Monitoring: Monitors devices such as phones, laptops, and PCs to detect and respond to security threats.
- Disabling Unused Ports or Protocols: Close any unused or unnecessary ports or protocols to prevent attackers from exploiting them.
Notes:
- Host: host is an example of an endpoint but is not limited to end-users only. it can also be servers, virtual machines, or other network devices