Up One Level


Operating System Hardening

 

Hardening of operating systems is the first step towards safeguarding systems from intrusion. Workstations and servers typically arrive from the vendor, installed with a multitude of development tools and utilities, which, although beneficial to the new user, also provide potential back-door access to an organisation's systems.

Hardening of an operating system involves the removal of all non essential tools, utilities and other systems administration options, any of which could be used to ease a hacker's path to your systems. Following this, the hardening process will ensure that all appropriate security features are activated and configured correctly. Again, 'out of the box' systems will likely be set up for ease of access with access to 'root' / Administrator account. Some vendors have now recognised that a market exists for pre-hardened systems; see Trusted Operating Systems.


*** The Information Security Glossary ***
Previous PageTop of this pageNext Page



Buy Now:

 

This Glossary forms part of the RUsecure Security Policy Suite... visit RUsecure Security Policy World
Use of the guidance contained within RUsecure™ is subject to the End User Licence Agreement
This site created with EasyHTMLHelp(tm) for MS Word
 Risk Associates: Resources for Security Risk Analysis, ISO 17799 / BS7799, Security Policies and Security Audit