🔒

Essential Strategies for Security Hardening

May 26, 2025

Lecture Notes: Security Hardening and Best Practices

Introduction

  • Default configurations of operating systems are often insecure.
  • Additional configurations are necessary to enhance security.
  • Manufacturers often provide hardening guides specific to applications or operating systems.
  • Third-party guides may also be available online.

Mobile Device Hardening

  • Manufacturers provide hardening guides for mobile devices.
  • Security updates and patches are released to close vulnerabilities.
  • Data segmentation on mobile devices:
    • Separate company data from user data.
    • Limits access if one segment is compromised.
  • Use of Mobile Device Manager (MDM) for monitoring and updates.

Workstation Hardening

  • Necessary for all operating systems (Windows, MacOS, Linux).
  • Regular updates include bug fixes and security patches.
  • Centralized update releases simplify testing and deployment.
  • Removal of unused software to reduce vulnerabilities.

Network Infrastructure Security

  • Switches, routers, firewalls need security hardening.
  • Embedded OSes in network devices have limited access.
  • Best practices:
    • Change default credentials.
    • Configure authentication (local or centralized).
    • Regularly check for patches from manufacturers.

Cloud Management Security

  • Securing devices with complete access to cloud systems is essential.
  • Use of least privilege principle for applications and cloud resources.
  • EDR installation for monitoring attacks and updates.
  • Regular backups, preferably to a separate cloud provider.

Server Hardening

  • Applies to servers running on Windows, Linux, etc.
  • Importance of installing security patches.
  • Strengthening authentication processes:
    • Minimum password lengths.
    • Account privilege management.
  • Limiting device access using server or firewall policies.

Industrial Control Systems (ICS)

  • Also known as SCADA systems.
  • Used in industries like power generation and manufacturing.
  • Often isolated by an air gap for security.
  • Centralized control and monitoring.

Embedded Systems Security

  • Found in smart devices and purpose-built appliances.
  • Challenging to upgrade due to OS limitations.
  • Importance of prompt security patch installation.
  • Network segmentation for additional security.

Real-Time Operating Systems (RTOS)

  • Used in industrial and military equipment, automobiles.
  • Deterministic processes with strict time frames.
  • Isolation from other networks to ensure reliability.
  • Minimum necessary services should be running.

IoT Device Security

  • Includes devices like lighting, heating, cooling systems.
  • Manufacturers may lack security expertise, requiring extra measures.
  • Prioritize security patches for IoT devices.
  • Segment IoT devices to limit exploit scope if compromised.

Conclusion

  • Security hardening involves multiple strategies across various devices and systems.
  • Regular updates, segmentation, and proper configuration are key to maintaining security.