Hardening Guidelines
Proactive System Hardening: Continuous Hardening’s Coming of Age
The first article in this series examined configuration hardening—essentially looking at ports, processes and services where security configuration management (SCM) is key. The second article looked at application and version hardening strategies ...
Configuration Hardening: Proactively Guarding Systems Against Intrusion
The concept of configuration hardening has nice imagery to it. When we use it to describe battle-hardened soldiers who have been tested in combat, a grim, determined image invariably leaps to mind ...