{"id":1462,"date":"2023-01-19T16:18:00","date_gmt":"2023-01-19T16:18:00","guid":{"rendered":"https:\/\/guide.trustvalley.swiss\/chapter\/hardening\/"},"modified":"2023-07-07T13:09:48","modified_gmt":"2023-07-07T13:09:48","slug":"hardening","status":"publish","type":"chapter","link":"https:\/\/guide.trustvalley.swiss\/de\/chapter\/hardening\/","title":{"rendered":"Hardening"},"content":{"rendered":"\n<p>\u00abHardening\u00bb zielt darauf ab, die Angriffsfl\u00e4che der Informationssysteme zu verringern, indem nur die f\u00fcr den Betrieb der Server, Workstations oder Anwendungen notwendigen Objekte und Konfigurationen beibehalten werden.<\/p>\n\n<p>Hardening kann daher unter anderem die Einschr\u00e4nkung von Privilegien, Beschr\u00e4nkungen bei den genehmigten Programmen, die Deaktivierung veralteter oder nicht mehr ben\u00f6tigter Dienste und lokales Firewalling umfassen.<\/p>\n\n<p>Es gibt eine Reihe von \u00abHardening-Leitf\u00e4den\u00bb, die je nach Anwendung und Standard ein mehr oder weniger hohes Sicherheitsniveau bieten.<\/p>\n\n<p><\/p>\n\n<p>Beispiele f\u00fcr <em>Hardening-Leitf\u00e4den<\/em><\/p>\n\n<p><em><a href=\"https:\/\/public.cyber.mil\/stigs\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security Technical Implementation Guides<\/a><\/em><\/p>\n\n<p><em><a href=\"https:\/\/www.nsa.gov\/Press-Room\/Cybersecurity-Advisories-Guidance\/\" target=\"_blank\" rel=\"noreferrer noopener\">NSA Security Configuration Guidance<\/a><\/em><\/p>\n\n<p><em><a href=\"https:\/\/www.pcidssguide.com\/system-hardening-standards-for-complying-with-pci-dss\/\" target=\"_blank\" rel=\"noreferrer noopener\">hardening guide PCI-DSS<\/a><\/em><\/p>\n\n<p><em><a href=\"https:\/\/www.cyber.gov.au\/acsc\/view-all-content\/publications\/hardening-microsoft-windows-10-version-21h1-workstations\" target=\"_blank\" rel=\"noreferrer noopener\">ACSC &#8211; Hardening Microsoft Windows 10, version 21H1, Workstations<\/a><\/em><\/p>\n\n<p><em><a href=\"https:\/\/security.utexas.edu\/handheld-hardening-checklists\/ios\" target=\"_blank\" rel=\"noreferrer noopener\">APPLE IOS HARDENING CHECKLIST<\/a><\/em><\/p>\n\n<p><em><a href=\"https:\/\/security.utexas.edu\/handheld-hardening-checklists\/android\" target=\"_blank\" rel=\"noreferrer noopener\">GOOGLE ANDROID HARDENING CHECKLIST<\/a><\/em><\/p>\n","protected":false},"featured_media":0,"template":"","categories":[],"searchablecategory":[],"class_list":["post-1462","chapter","type-chapter","status-publish","hentry"],"taxonomy_info":[],"featured_image_src_large":false,"author_info":[],"comment_info":"","_links":{"self":[{"href":"https:\/\/guide.trustvalley.swiss\/de\/wp-json\/wp\/v2\/chapter\/1462","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/guide.trustvalley.swiss\/de\/wp-json\/wp\/v2\/chapter"}],"about":[{"href":"https:\/\/guide.trustvalley.swiss\/de\/wp-json\/wp\/v2\/types\/chapter"}],"wp:attachment":[{"href":"https:\/\/guide.trustvalley.swiss\/de\/wp-json\/wp\/v2\/media?parent=1462"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/guide.trustvalley.swiss\/de\/wp-json\/wp\/v2\/categories?post=1462"},{"taxonomy":"searchablecategory","embeddable":true,"href":"https:\/\/guide.trustvalley.swiss\/de\/wp-json\/wp\/v2\/searchablecategory?post=1462"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}