New system hardening techniques

5 pts.
Tags:
Antimalware
Security
I am a student at the University of Advancing Technology in Tempe, AZ. My class is learning more about the Plan-Do-Check-Act Implementation framework. The Harden/Secure step lists several steps that an administrator can take to ensure that a system is strengthened against known attacks, by eliminating vulnerabilities and other weaknesses commonly used by intruders. Of note, I found this step particularly interesting, as it lays the ground work for the system to be able to withstand many of the current attacks. Some of the stated actions to be taken in this step are removing unnecessary services, patch management, eliminating default passwords and installing anti-malware tools. However, I would like to know if there are any recent system hardening procedures that the security community is just starting to adopt?

Software/Hardware used:
N/A

Answer Wiki

Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Discuss This Question: 2  Replies

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • TomLiotta
    In general, no. The items you listed are the practical limit. . In "the real world", thoughts are that going back to school could be how to get caught up on new ways of doing things. Simply keeping up with all of the details implicit in your list can take up the work days. Patch management can be especialy time consuming as an environment becomes more complex and homogenous. . True innovation in "the real world" has a couple major sources. First, there is cooperation with academic institutions. Results are often public for anyone who follows the research. Second, there is private development of tools and procedures. But these are often have proprietary aspects. Innovators are less likely to disclose their methods publicly. . But vendors of the platforms and the hardware that you want to harden will be the most certain sources. Their businesses survive on it. Their patches will tend to be ahead of alternatives, though that's not perfect. If not perfect, patches then tend to overtake alternatives anyway, and they're likely to integrate fully and to withstand future patches or upgrades. . Tom
    125,585 pointsBadges:
    report
  • Kevin Beaver
    The Center for Internet Security has some good material on system hardening at www.cisecurity.org.
    17,630 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following