Hardening Targets

Sep 16, 2024

Key Points from the Lecture on Operating System Hardening

Introduction to System Hardening

  • Default configurations of operating systems are not secure.
  • Additional configurations are often required to enhance security.

Hardening Guides

  • Manufacturers often provide hardening guides specific to their applications or operating systems.
  • If a hardening guide is unavailable, it may be useful to:
    • Contact the manufacturer.
    • Explore online message boards for third-party security hardening guides.

Mobile Device Hardening

  • Mobile devices must be hardened to ensure security.
  • Manufacturers provide guides and patches for security updates and bug fixes.
  • Segmenting data on mobile devices is a common technique:
    • Separate company data from user data.
    • Limits access if one segment is compromised.
  • Mobile Device Management (MDM) tools can monitor devices and push security updates.

Workstation Hardening

  • Workstations running Windows, Mac OS, Linux, etc., require hardening.
  • Periodic updates include bug fixes and security patches.
  • Remove unused software to eliminate vulnerability risks.

Network Infrastructure Hardening

  • Network devices like switches, routers, and firewalls require security hardening.
  • Default credentials should be changed, and authentication should be configured.
  • Check with manufacturers for available patches.

Cloud Management and Security

  • Centralized Cloud management workstations have complete access to cloud systems:
    • Must be securely hardened.
    • Least privilege principle should be applied.
    • Install Endpoint Detection and Response (EDR) for monitoring attacks.
    • Regular backups, preferably with a separate cloud provider.

Server Hardening

  • Servers running Windows, Linux, etc., must be updated with security patches.
  • Implement strong authentication processes and least privilege access.
  • Restrict server access to necessary devices only.

Industrial Control Systems (ICS) and SCADA

  • ICS/SCADA systems control industrial equipment and require high security.
  • Often air-gapped from the main network for isolation.

Embedded Systems and IoT

  • Embedded systems in devices like TVs and appliances can be difficult to update.
  • Important to install security patches when available.
  • Consider network segmentation and firewall protection.
  • IoT devices should prioritize security patches and may need network segmentation to limit vulnerabilities.