1 21a-OSHardening


Previous: 20-PasswordUserGroup.html

21a-OSHardening/vulnerabilities.jpg

1.1 Screencasts

1.2 Reading

https://doc.opensuse.org/documentation/leap/security/html/book.security/index.html
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html-single/security_guide/
https://debian-handbook.info/browse/stable/security.html
21a-OSHardening/10b-LinuxSecurity.pdf (reading, not slides)
https://en.wikipedia.org/wiki/Unix_security
http://etutorials.org/Linux+systems/linux+security/

1.3 Introduction

What is OS hardening?

Hardening process that includes planning, installation, configuration, update, and maintenance of the operating system and the key applications in use.

OS architecture:
21a-OSHardening/f1-crop.png

1.3.1 Planning

1.3.1.1 Things to consider during enterprise hardening

1.4 System hardening

Hardware is the most important layer (in some ultimate context, maybe not a practical one), but a compromise at any layer is sufficient to break any of the CIA triad.

1.4.1 Operating system hardening

Overview:

1.4.2 Installation

1.4.2.1 Secure installation procedures

1.4.2.2 Minimize base install

Minimizing attack surface

1.4.3 Users, Groups, Authentication

1.4.4 Configure resource controls

1.4.5 Extras

Install or configure extra security-related software

Ask: how does this compare to a black-list?

1.4.6 Test your install

1.5 Application security

1.5.1 Selection: Which software to install?

1.5.2 Configure applications

1.5.3 File and network encryption

Application level encryption

1.6 Maintenance, logging, backup

1.6.1 Logging

1.6.2 Backup and archive

1.7 Linux/Unix

Most servers will be Linux/Unix.
Extensive documentation base for hardening.

1.7.1 Patching: System updates

1.7.2 Application and service configuration

1.7.3 Users, Groups, Permissions

Set permissions on:

1.7.4 Remote access

Setup remote access controls

1.8 Re-writes of API-compatible major OS’s

Next: 21b-Virtualization.html