Hardening Techniques - 2.5

Examples of Hardening Techniques

  • Changing Default Passwords: Always change default passwords to strong, unique passwords to reduce the risk of unauthorized access.
  • Removing Unused Software / Hardware: Unused software or hardware can become a vulnerability. Removing these reduces the attack surface.
  • Keeping System OS / Apps Up to Date: Regularly update operating systems and applications with the latest software patches to address vulnerabilities.
  • Host-Based Firewall: Monitors and controls inbound and outbound network traffic at the host level, enhancing security by filtering traffic based on defined rules.
    • EX: NextGen Firewall (NGFW)
  • Host-Based Intrusion Prevention System (HIPS): A system that monitors and responds to malicious activity in real time to prevent unauthorized actions.
  • Endpoint Detection and Response (EDR) Monitoring: Monitors devices such as phones, laptops, and PCs to detect and respond to security threats.
  • Disabling Unused Ports or Protocols: Close any unused or unnecessary ports or protocols to prevent attackers from exploiting them.

Notes:

  • Host: host is an example of an endpoint but is not limited to end-users only. it can also be servers, virtual machines, or other network devices