1/9
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Hardening Targets
No system is secure with the default configurations
- You need guidelines to keep everything safe
Hardening guides are specific to the software or platform
- Get feedback from the manufacturer or Internet interest group
- They'll have the best details
Other general-purpose guides are available online
Mobile Devices
Always connected mobile technologies
- Phones, tablets, etc
- hardening checklists are available from manufacturers
Updates are critical
- Bug fixes and security patches
- Prevent any known vulnerabilities
Segmentation can protect data
- Company and user data are separated
Control with an MDM
Workstations
• User desktops and laptops - Windows, macOS, Linux, etc.
• Constant monitoring and updates
- Operating systems, applications, firmware, etc.
• Automate the monthly patches
- There's likely an existing process
• Connect to a policy management system
- Active Directory group policy
• Remove unnecessary software - Limit the threats
Network Infrastructure Devices
• Switches, routers, etc.
- You never see them, but they're always there
• Purpose-built devices
- Embedded OS, limited OS access
• Configure authentication
- Don't use the defaults
• Check with the manufacturer
- Security updates
- Not usually updated frequently
- Updates are usually important
Cloud infrastructure
• Secure the cloud management workstation
- The keys to the kingdom
• Least privilege
- All services, network settings, application rights
and permissions
• Configure Endpoint Detection and Response (EDR)
- All devices accessing the cloud should be secure
• Always have backups
- Cloud to Cloud (C2C)
Servers
Many and varied
- Windows, Linux, etc.
Updates
- Operating system updates/service packs, security patches
User accounts
- Minumum password lengths and complexity
- Account limitations
Network access and security
SCADA/ICS
Supervisory Control and Data Acquisition System
- Large-scale, multi-site Industrial Control Systems (ICS)
• PC manages equipment
- Power generation, refining, manufacturing equipment
- Facilities, industrial, energy, logistics
Distributed control systems
- Real-time information
- System control
Requires extensive segmentation
- No access from the outside
Embedded Systems
Hardware and software designed for a specific function
- Or to operate as part of a larger system
Can be difficult to upgrade
- Watches and television ares relatively easy
- Other devices may not be easily modified
Correct vulnerabilities
- Security patches remove potential threats
Segment and firewall
- Prevent access from unauthorized users
RTOS (real time operating system)
An operating system with a deterministic processing schedule
- No time to wait for other processes
- Industrial equiptment, automobiles, military environments
Isolate the system
- Prevent access from other areas
Run with minimum services
- Prevent the potential for exploit
Use secure communication
- Protect with a host-based firewall
IoT devices
Heating and cooling, lighting, home automation, wearable technology, etc
Weak defaults
- IOT manufacturuers are not security professionals
- Change these passwords
Deploy updates quickly
- Can be a significant security concern
Segmentation
- Put IOT devices on their own WAN