Hardening Targets - CompTIA Security+ SY0-701 - 4.1
Hardening Operating Systems and Devices
Importance of Security Hardening
- The default configuration of an operating system is often insecure, necessitating additional configurations to enhance security.
- Manufacturers typically provide hardening guides for their systems; if unavailable, users can seek help from manufacturers or online communities.
Mobile Device Security
- Mobile devices require hardening, with manufacturers offering guidelines and patches that address vulnerabilities.
- Data segmentation on mobile devices separates personal and company data, reducing the risk of unauthorized access.
Workstation and Network Infrastructure Hardening
- Workstations running various operating systems also need regular updates for security patches and bug fixes.
- Removing unused software minimizes potential vulnerabilities in workstations.
Best Practices for Network Devices
- Network infrastructure devices run specialized embedded operating systems; changing default credentials is a critical security measure.
- Regularly check with manufacturers for rare but important patches specific to network appliances.
Cloud Management and Server Security
- Centralized cloud management workstations must be secure as they have extensive access to cloud-based systems.
Security Measures for Industrial and Embedded Systems
Device Communication and Security Policies
- Organizations should implement server-side policies or firewall rules to restrict access to specific devices, enhancing security.
- Essential security technologies like EDR (Endpoint Detection and Response), antivirus, and anti-malware should be deployed on servers.
Understanding SCADA and ICS
- SCADA (Supervisory Control and Data Acquisition) systems are crucial for managing industrial equipment, often referred to as Industrial Control Systems (ICS).
- These systems utilize distributed control mechanisms to provide real-time monitoring of large-scale industrial processes.
Isolation of SCADA Systems
- SCADA systems are typically secured within isolated networks, often separated from the main organizational network by an air gap.
- Access to these critical systems is highly restricted, with no direct internet connectivity.
Challenges with Embedded Systems
- Embedded systems present unique challenges due to their specialized operating systems found in devices like smartwatches and appliances.
- Upgrading embedded devices can be difficult; timely installation of security patches is crucial when available.
Network Segmentation for Enhanced Security
- It is advisable to segment embedded devices onto separate networks with additional firewalls for enhanced protection.
- Real-Time Operating Systems (RTOS), used in critical applications like military equipment, require isolation from other network activities.
Importance of Timely Updates for IoT Devices
- IoT devices controlling automation functions must have a higher priority placed on deploying security patches promptly.