Hardening of systems
We will prepare tailored hardening policies and suggest how to implement them in practice while effectively (and automatically) monitoring compliance.
Solution description
What is the process of hardening?
The process of ensuring a high level of security for applications and operating systems is continuous. The following phases must be addressed when hardening systems:
- Analysis - in the initial phase, the systems that will be subject to hardening are fully identified. These systems are usually selected according to their criticality and importance within the company's information system. This may include the selection of a suitable tool for automated configuration control.
- Establishing hardening security policies - these are technical and procedural rules that specify what the configuration of applications and systems should be, including implementation checks to verify compliance with reality. At this stage, we rely on existing and proven standards such as CIS Benchmarks, NIST and others. Hardening security policies are designed in such a way that they can be evaluated not only manually as part of internal audits, but crucially in an automated manner, which saves internal resources required for performing checks.
- Building processes - Hardening includes not only documents and regulations to ensure a high level of configuration, but also processes for maintaining and updating policies, managing, reviewing, enforcing and the further opportunity of updating them.
- Technical control and deployment - the processes and technical regulations developed need to be deployed into practice. This step usually includes the implementation of a tool that can verify the deployment of the hardening policy to the devices and identify non-compliance against approved policies.
Which systems can be hardened?
- servers and their applications (operating system, database, web servers, application servers, and others),
- hardware devices (e.g. SCADA, hardware firewalls, Wi-Fi access points),
- BYOD and MDM devices,
- workstations and AD GPOs (Group Policy), web browser settings, Java and .NET framework behaviour, etc.
What products are suitable for automated inspection?
- Option to set "zero-configuration", i.e. to set a configuration benchmark for the system.
- Performing "agent-less" control.
- Modification and creation of custom security policies.
- Evaluation of compliance and non-compliance, exception management.
- Connecting to SIEM and the ticketing system.
- Reporting and alerting.
Case study
We created standards for security settings (called hardening) to meet the high level of security required. These methodologies now help the company guide its vendors in modifying applications. After successfully completing the project, we were tasked with developing new standards for 40 other platforms.
Due to the vast amount of technology under management, we designed the deployment of a vulnerability management tool (VMS) that automated the compliance checking of the developed security standards and began to deliver clear and concise reporting. As a direct result, the customer saved additional human resources time and expenditure.
Benefits
- An effective vulnerability management and policy compliance tool saves internal resources.
- Policies and processes are tailored to the customer's environment and systems.
- Configuration standard definition for the systems used. Compliance with standards can then be required of external vendors.
- Complete overview of individual system settings, including identification of non-conformances against policies.
- Systems are secured to a high level according to international standards and best practice.
- Risks arising from existing vulnerabilities, configuration mismatches or ICT operations are identified and managed.
DO NOT HESITATE TO
CONTACT US
Are you interested in more information or an offer for your specific situation?