{"id":943,"date":"2023-01-19T16:18:00","date_gmt":"2023-01-19T16:18:00","guid":{"rendered":"https:\/\/guide.trustvalley.swiss\/?post_type=chapter&#038;p=943"},"modified":"2023-07-07T13:09:04","modified_gmt":"2023-07-07T13:09:04","slug":"hardening","status":"publish","type":"chapter","link":"https:\/\/guide.trustvalley.swiss\/fr\/chapitre\/hardening\/","title":{"rendered":"Le \u00ab Hardening \u00bb"},"content":{"rendered":"\n<p>Le \u00ab hardening \u00bb vise \u00e0 r\u00e9duire la surface d\u2019attaque des syst\u00e8mes d\u2019information en conservant uniquement les objets et configurations n\u00e9cessaires au fonctionnement des serveurs, postes de travail ou applications.<\/p>\n\n\n\n<p>Le hardening peut ainsi comprendre la limitation des privil\u00e8ges, des restrictions sur les programmes autoris\u00e9s, la d\u00e9sactivation de services obsol\u00e8tes ou inutiles et le firewalling local, entre autres.<\/p>\n\n\n\n<p>Il existe un certain nombre de guides de \u00ab hardening \u00bb qui fournissent des niveaux de s\u00e9curit\u00e9 plus ou moins \u00e9lev\u00e9s en fonction des applications et standards.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Exemple de guides de <em>hardening<\/em><\/p>\n\n\n\n<p><em><a href=\"https:\/\/public.cyber.mil\/stigs\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security Technical Implementation Guides<\/a><\/em><\/p>\n\n\n\n<p><em><a href=\"https:\/\/www.nsa.gov\/Press-Room\/Cybersecurity-Advisories-Guidance\/\" target=\"_blank\" rel=\"noreferrer noopener\">NSA Security Configuration Guidance<\/a><\/em><\/p>\n\n\n\n<p><em><a href=\"https:\/\/www.pcidssguide.com\/system-hardening-standards-for-complying-with-pci-dss\/\" target=\"_blank\" rel=\"noreferrer noopener\">hardening guide PCI-DSS<\/a><\/em><\/p>\n\n\n\n<p><em><a href=\"https:\/\/www.cyber.gov.au\/acsc\/view-all-content\/publications\/hardening-microsoft-windows-10-version-21h1-workstations\" target=\"_blank\" rel=\"noreferrer noopener\">ACSC &#8211; Hardening Microsoft Windows 10, version 21H1, Workstations<\/a><\/em><\/p>\n\n\n\n<p><em><a href=\"https:\/\/security.utexas.edu\/handheld-hardening-checklists\/ios\" target=\"_blank\" rel=\"noreferrer noopener\">APPLE IOS HARDENING CHECKLIST<\/a><\/em><\/p>\n\n\n\n<p><em><a href=\"https:\/\/security.utexas.edu\/handheld-hardening-checklists\/android\" target=\"_blank\" rel=\"noreferrer noopener\">GOOGLE ANDROID HARDENING CHECKLIST<\/a><\/em><\/p>\n","protected":false},"featured_media":0,"template":"","categories":[],"searchablecategory":[],"class_list":["post-943","chapter","type-chapter","status-publish","hentry"],"taxonomy_info":[],"featured_image_src_large":false,"author_info":[],"comment_info":"","_links":{"self":[{"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/chapter\/943","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/chapter"}],"about":[{"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/types\/chapter"}],"wp:attachment":[{"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/media?parent=943"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/categories?post=943"},{"taxonomy":"searchablecategory","embeddable":true,"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/searchablecategory?post=943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}