1 21a-OSHardening


OSHardening/vulnerabilities.jpg

1.1 Screencasts

1.2 Reading

https://doc.opensuse.org/documentation/leap/security/html/book.security/index.html
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html-single/security_guide/
https://debian-handbook.info/browse/stable/security.html
OSHardening/10b-LinuxSecurity.pdf (reading, not slides)
https://en.wikipedia.org/wiki/Unix_security
http://etutorials.org/Linux+systems/linux+security/

1.3 Introduction

What is OS hardening?

Hardening process that includes planning, installation, configuration, update, and maintenance of the operating system and the key applications in use.

OS architecture:
OSHardening/f1-crop.png

Each of these layers of code needs appropriate hardening measures in place to provide appropriate security services.
And each layer is vulnerable to attack from below, should the lower layers not also be secured appropriately.
Is the same true from above?

1.3.1 Planning

1.3.1.1 Things to consider during enterprise hardening

1.4 System hardening

Hardware is the most important layer (in some ultimate context, maybe not a practical one), but a compromise at any layer is sufficient to break any of the CIA triad.

1.4.1 Operating system hardening

Overview:

1.4.2 Installation

1.4.2.1 Secure installation procedures

1.4.2.2 Minimize base install

Minimizing attack surface

1.4.3 Users, Groups, Authentication

1.4.4 Configure resource controls

1.4.5 Extras

Install or configure extra security-related software

Ask: how does this compare to a black-list?

1.4.6 Test your install

1.5 Application security

1.5.1 Selection: Which software to install?

1.5.2 Configure applications

1.5.3 File and network encryption

Application level encryption

1.6 Maintenance, logging, backup

1.6.1 Logging

1.6.2 Backup and archive

1.7 Linux/Unix

Most servers will be Linux/Unix.
Extensive documentation base for hardening.

1.7.1 Patching: System updates

1.7.2 Application and service configuration

1.7.3 Users, Groups, Permissions

Set permissions on:

1.7.4 Remote access

Setup remote access controls

1.8 Re-writes of API-compatible major OS’s