System Hardening, and Why it’s Harder Than it Looks
August 2, 2019
Infosecurity Magazine
The two key principles of system hardening are to remove unnecessary function and apply secure configuration settings. Unlike most security frameworks, the Center for Internet Security (CIS) provide prescriptive guidance for configuration settings and, in the CIS Benchmark guides, even provide the required remediation commands.
“System hardening is a process, not a one-off task, just as staying safe on the roads doesn’t mean driving a tank.”