Secure Operating Environments - OS Hardening Flashcards
what are the top four strategies to prevent cyber intrusions ?
- White-list approved applications
- Patch third-party applications and OS vulnerabilities
- Restrict administrative privileges
- Create a defense-in-depth system
What is a secure Base OS ?
- Installed and patched
- Hardened and correctly configured
- Test security of basic OS to ensure that steps taken adequately address its security needs
How can we harden an OS ?
- Removing unnecessary services, applications, protocols
- Configuring users, groups, and permissions
- Configuring resource controls
What are additional security controls that can be added to harden an OS ?
antivirus, host-based firewalls, and intrusion detection system (IDS)
Why do we need to configure our OS ?
Default configuration might not be secure:
- Default configuration set to maximize ease of use and
functionality rather than security
- Additional packages can later be installed if required
Why do we need an System planning process for our OS ?
System planning process should identify what is required for a given system. -> less Software on the machine -> less risk
How should we restrict elevated privileges ?
Elevated privileges should be restricted to those users that require them, and only when needed to perform a task
What should we consider in the System planning process concerning users, groups and permissions ?
- Categories of users on the system
- Privileges they have
- Types of information they can access
- How and where access control configuration is set