〈   Technology and Protection
Solutions and technologies geared to SMEs

Chapter 1.9

Hardening


Hardening aims to reduce the attack surface of IT systems by retaining only the objects and configurations required for the operation of servers, workstations or applications.

Hardening can thus include limiting privileges, restrictions on authorised programs, the disabling of obsolete or unnecessary services and local firewalling, among others.

There are a number of hardening guides providing higher or lower levels of security depending on the applications and standards.

Examples of hardening guides:

Security Technical Implementation Guides

NSA Security Configuration Guidance

hardening guide PCI-DSS

ACSC – Hardening Microsoft Windows 10, version 21H1, Workstations

APPLE IOS HARDENING CHECKLIST

GOOGLE ANDROID HARDENING CHECKLIST

2023 © Trust Valley. All rights reserved.