Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

March 2023

SQL Server hardening

To safeguard the SQL layer against common SQL-based attacks, including Denial of Service, Brute Force, and SQL injections, and to prevent privilege escalations, hardening the SQL server is of utmost importance. Achieving compliance and satisfying auditors also necessitates SQL hardening. By implementing SQL hardening measures at both the application and operating system levels, the organization can significantly reduce its attack surface and eliminate critical vulnerabilities.

Network security LAN Manager Authentication Level

The LAN Manager (LM) is a group of early Microsoft client/server software products that enable users to connect personal computers on a single network. Its features include transparent file and printer sharing, user security features, and network administration tools. In Active Directory domains, the default authentication protocol is the Kerberos protocol. However, if Kerberos is not available for any reason, LM, NTLM, or NTLMv2 can be used as an alternative.

sysctl configuration hardening

Sysctl is a command-line utility in Unix-like operating systems that allows users to view and modify kernel parameters at runtime. These parameters, also known as “tunable” or “kernel” parameters, control various aspects of the operating system’s behavior, such as network settings, memory management, file system behavior, and more. Each of these operating systems has their own implementation of sysctl, with slightly different options and syntax.