System Hardening

Overview

System hardening reduces the attack surface by disabling unnecessary services, applying secure configurations, enforcing least privilege, and enabling security controls. Hardening should be applied at every layer — operating systems, applications, network infrastructure, and directory services.

Topics

  • Linux Hardening — kernel parameters, service management, filesystem permissions, AppArmor, auditd, and SSH hardening
  • Windows Hardening — Group Policy, Windows Defender settings, credential protection, audit policies, and attack surface reduction
  • Active Directory Hardening — tiered administration, privileged access management, Kerberos hardening, and GPO security
  • Network Hardening — firewall configuration, network segmentation, TLS enforcement, DNS security, and wireless hardening

Hardening Principles

1. Minimize attack surface  → Remove unused software, disable unused services
2. Least privilege          → Users and services run with minimum permissions
3. Defense in depth         → Multiple overlapping controls at every layer
4. Secure defaults          → Change default passwords, disable default accounts
5. Audit and monitor        → Log security events, detect configuration drift
6. Patch management         → Apply security updates promptly