{"id":1760,"date":"2023-01-19T16:18:00","date_gmt":"2023-01-19T16:18:00","guid":{"rendered":"https:\/\/guide.trustvalley.swiss\/chapter\/hardening\/"},"modified":"2023-07-07T13:10:13","modified_gmt":"2023-07-07T13:10:13","slug":"hardening","status":"publish","type":"chapter","link":"https:\/\/guide.trustvalley.swiss\/it\/chapter\/hardening\/","title":{"rendered":"\u00abHardening\u00bb"},"content":{"rendered":"\n<p>L\u2019\u00abhardening\u00bb mira a ridurre la superficie di attacco dei sistemi informatici mantenendo solo gli oggetti e le configurazioni necessarie per il funzionamento dei server, delle postazioni di lavoro o delle applicazioni.<\/p>\n\n<p>Pu\u00f2 quindi includere ad esempio la limitazione delle autorizzazioni e dei programmi autorizzati, la disattivazione di servizi obsoleti o inutili e il firewalling locale.<\/p>\n\n<p>Esistono diverse guide all\u2019\u00abhardening\u00bb con livelli di sicurezza pi\u00f9 o meno elevati a seconda delle applicazioni e degli standard.<\/p>\n\n<p><\/p>\n\n<p>Esempi di guide all\u2019\u00ab<em>hardening\u00bb<\/em>:<\/p>\n\n<p><em><a href=\"https:\/\/public.cyber.mil\/stigs\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security Technical Implementation Guides<\/a><\/em><\/p>\n\n<p><em><a href=\"https:\/\/www.nsa.gov\/Press-Room\/Cybersecurity-Advisories-Guidance\/\" target=\"_blank\" rel=\"noreferrer noopener\">NSA Security Configuration Guidance<\/a><\/em><\/p>\n\n<p><em><a href=\"https:\/\/www.pcidssguide.com\/system-hardening-standards-for-complying-with-pci-dss\/\" target=\"_blank\" rel=\"noreferrer noopener\">hardening guide PCI-DSS<\/a><\/em><\/p>\n\n<p><em><a href=\"https:\/\/www.cyber.gov.au\/acsc\/view-all-content\/publications\/hardening-microsoft-windows-10-version-21h1-workstations\" target=\"_blank\" rel=\"noreferrer noopener\">ACSC &#8211; Hardening Microsoft Windows 10, version 21H1, Workstations<\/a><\/em><\/p>\n\n<p><em><a href=\"https:\/\/security.utexas.edu\/handheld-hardening-checklists\/ios\" target=\"_blank\" rel=\"noreferrer noopener\">APPLE IOS HARDENING CHECKLIST<\/a><\/em><\/p>\n\n<p><em><a href=\"https:\/\/security.utexas.edu\/handheld-hardening-checklists\/android\" target=\"_blank\" rel=\"noreferrer noopener\">GOOGLE ANDROID HARDENING CHECKLIST<\/a><\/em><\/p>\n","protected":false},"featured_media":0,"template":"","categories":[],"searchablecategory":[],"class_list":["post-1760","chapter","type-chapter","status-publish","hentry"],"taxonomy_info":[],"featured_image_src_large":false,"author_info":[],"comment_info":"","_links":{"self":[{"href":"https:\/\/guide.trustvalley.swiss\/it\/wp-json\/wp\/v2\/chapter\/1760","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/guide.trustvalley.swiss\/it\/wp-json\/wp\/v2\/chapter"}],"about":[{"href":"https:\/\/guide.trustvalley.swiss\/it\/wp-json\/wp\/v2\/types\/chapter"}],"wp:attachment":[{"href":"https:\/\/guide.trustvalley.swiss\/it\/wp-json\/wp\/v2\/media?parent=1760"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/guide.trustvalley.swiss\/it\/wp-json\/wp\/v2\/categories?post=1760"},{"taxonomy":"searchablecategory","embeddable":true,"href":"https:\/\/guide.trustvalley.swiss\/it\/wp-json\/wp\/v2\/searchablecategory?post=1760"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}