Mobile device hardening: Implementing security measures on mobile devices, including configuring strong passwords, enabling encryption, ensuring regular software updates, and installing MDM software
Workstation hardening: Implementing security measures on workstations, such as configuring firewalls, using antivirus software, managing user access controls, and applying security patches regularly.
Switch/router/server hardening: Implementing security measures on network switches, including changing default credentials and ensuring regular firmware updates.
Cloud infrastructure hardening: Ensuring security in cloud environments by utilizing strong access controls (least privilege), encrypting sensitive data, logging user activity, and regularly auditing configurations and compliance with security standards.
ICS/SCADA hardening: Isolating control systems from the rest of the network, and the internet (air-gapped systems).
RTOS hardening: Implementing secure coding practices, minimizing the attack surface by disabling unused features, and applying timely updates and patches to mitigate vulnerabilities.
IoT Devices hardening: Ensuring strong authentication protocols, encrypting data in transit and at rest, regularly updating firmware, and employing network segmentation to limit exposure to threats.
Mobile device manager (MDM): Software used for managing devices owned by a company or that contain corporate data.
Bring your own device (BYOD): A policy that allows employees to use their personal devices for work purposes, enabling greater flexibility and potentially increasing employee satisfaction. Some security risk with data from personal devices may include loss or theft, which can lead to unauthorized access to sensitive corporate information.
Corporate-owned, personally enabled: A model where the organization provides devices to employees, but allows them to personalize and customize those devices. This approach strikes a balance between maintaining company control over the hardware and giving employees the freedom to configure devices to better suit their work preferences.
Choose your own device (CYOD): A model that allows employees to select a device from a predefined organization list - the device is corporate-owned, but users can choose what device they receive.
Wi-Fi security: Ensure all network connections are encrypted and utilize strong passwords to prevent unauthorized access. Regularly update firmware and security settings to safeguard against vulnerabilities.
Bluetooth security: Ensure all devices use a formal pairing process to establish secure connections, and avoid pairing to unverified devices.
Wi-Fi Protected Access 3 (WPA3): Wi-Fi standard/protocol designed to enhance security compared to WPA2. Includes improved encryption methods, a more robust authentication process (SAE/dragonfly handshake), and protections against brute-force attacks (GCMP).
AAA/RADIUS: A networking protocol that enables centralized authentication, authorization, and accounting for users who connect to a network, providing a more secure method for access control and user management.
Cryptographic protocols: These are protocols that provide secure communication through encryption, ensuring data integrity and confidentiality during transmission. Examples include GCMP for WPA3.
Authentication protocols: These protocols verify the identity of users or systems before granting access or privileges, enhancing the security of the network. Examples include RADIUS and Kerberos.
Authentication (AAA server): The process of verifying that an entity/system is who they claim to be (e.g., through a username/password).
Application security:
Input validation: Analysis of user input to see if it matches what’s expected by the application - this injection security vulnerabilities.