Security Hardening Notes
Security Hardening Notes
Security Hardening Notes
Security Hardening
Target Audience for this guidance
Technology Service Providers (TSPs): IT managers responsible for TSP policies, standards and processes Project and programme managers and teams System designers and software development teams IT Operations teams Information Security Functions (ISFs) Contract owners / contract managers who contract services, which include IT services, to third parties Business owners who commission or own any IT systems
Management of a hardening programme References and additional guidance If you need more information
Procedural Guidelines Section 5 Communications and Operations Security, specifically 5.1.4c Section 6 Access Control, specifically 6.5.3g Section 7 Systems Acquisition, Development and Maintenance
Version 1.0
Page 1 of 6
Security Hardening
Security hardening is the process of configuring a computer system in a secure way so that it is hardened and resistant against attack. The purpose is to eliminate as many security vulnerabilities as possible, so reducing the opportunities for attack. Most Out of the Box computer software and systems have a very weak security configuration and default settings to make them easy to use. Before they can be deployed into production they must be security hardened. Security hardening provides an additional layer of protection for services based on the security principle of defence-in-depth. Hardening can make a system less vulnerable to compromise in an attack. It can also limit the amount of damage an attacker can do, and be the last line of defence in the event of a security compromise. For example, if a malicious user is able to penetrate the Groups perimeter defences, a hardened server can provide the final layer of security for information assets on internal systems. It is important to note that hardening is not a panacea for security. It is just another layer in a good security model. Any system that is accessible on a network and running services can potentially be attacked. It then only takes a single vulnerability to successfully breach the security and compromise the information. Security hardening should be a key component in securing IT systems.
hardening guides to support all systems within their environments. The hardening guides should be updated as new information is received about new vulnerabilities and threats (please see GS&F IS Guidance on Vulnerability Management for more information).
Access switch Web server, Database server Mail server DNS server File server FTP server DHCP server Application server or other limited purpose servers, for example: web application server, like Websphere SAP/R3 server
Developing System hardening guides by roles adds specific hardening based on the service/s the system is running. It removes unnecessary services and vulnerabilities by only allowing the services that are necessary for the system based on function and role. Security hardening will also depend enormously on the type, make and version of the operating system and other software. For example, specific hardening guides will be required for each type and version of the Windows operating system. Similarly, each type, variety and version of Unix will require a specific guide. There are many areas that should normally be addressed when hardening a system. These include the following: Disabling unused software and services System utilities that are capable of overriding or changing system and application controls must be removed if not required (5.1.4c and 6.5.3g). Utilities can range from stand-alone software to services that are included and are shipped with operating systems, middleware and applications. If they are considered to be required then their use must be reviewed on an annual basis by an Information Security Function and: access must be logically controlled allocated to a role, with usage auditable controlled by a process that restricts the usage of such utilities to the minimum required number of users subject to individual user identification, authentication, and authorisation. Unnecessary services, protocols & daemons should be removed or disabled. Features not required in services should be turned off. Only the essential applications, applets and scripts necessary for the system functionality should be installed. Installation of software patches and hotfixes Please see GS&F IS guidance on Vulnerability Management. Authentication and Access control. Authentication techniques and configuration, such as password policies and enforcing strong passwords Configuration of logon banners User rights assignment (least privileged access) and role based access Configuring permissions and access to files and data volumes Segregation of duties Disabling and/or renaming of default and unused system accounts
Version 1.0 Page 4 of 6
Restricting powerful accounts Set registry permissions Configuring access to the system via local group and user accounts Install and configure any network access control required including any local firewalls, and network port settings Please see GS&F IS Guidance on Access Control for details. Installation and configuration of anti-virus and anti-malware software Please see GS&F IS Guidance on Malicious Code and Mobile Code Protection. Installation and configuration of any encryption required Key management settings e.g Kerberos policies Disk encryption VPNs Please see GS&F IS Guidance on Cryptography Configuring audit logging, monitoring and alerting What to log and monitor Log settings Implementation of real-time exception reporting Install and configure any intrusion detection and/or prevention software Please see GS&F IS Guidance on Auditing and Monitoring.
Version 1.0
GS&F IS Guidance on Auditing and Monitoring GS&F IS Guidance on Information Security in the System Development Lifecycle GS&F IS Vulnerability Scanning Framework.
Many product vendors, security organisations and some government agencies have committed resources to developing standards for security hardening. It is strongly recommended that those charged with managing security hardening programmes use these as references for developing specific guides for use within the Group. The following Websites provide examples and are recommended: US, National Security Agency (NSA) has the most extensive library on Hardening Standards. http://www.nsa.gov/snac/ US, National Institute of Standards and technology (NIST) Security Configuration. http://csrc.nist.gov/checklists/repository/vendor.html DISA Security Technical Implementation Guides (STIGS). http://iase.disa.mil/stigs/index.html
Version 1.0
Page 6 of 6