Device Hardening

Device hardening involves implementing proven methods of securing the device and protecting its administrative access. Some of these methods involve maintaining passwords, configuring enhanced remote login features, and implementing secure login with SSH. Defining administrative roles in terms of access is another important aspect of securing infrastructure devices because not all information technology personnel should have the same level of access to the infrastructure devices.

Depending on the Linux distribution, many services are enabled by default. Some of these features are enabled for historical reasons but are no longer required. Stopping such services and ensuring they do not automatically start at boot time is another device hardening technique.

OS updates are also extremely important to maintaining a hardened device. New vulnerabilities are discovered every day. OS developers create and issue fixes and patches regularly. An up-to-date computer is less likely to be compromised.

The following are basic best practices for device hardening.

  1. Ensure physical security
  2. Minimize installed packages
  3. Disable unused services
  4. Use SSH and disable the root account login over SSH
  5. Keep the system updated
  6. Disable USB auto-detection
  7. Enforce strong passwords
  8. Force periodic password changes
  9. Keep users from re-using old passwords

Many other steps exist and are often service or application-dependent.

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.