Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Server Hardening

CalCom

CIS Baseline Hardening and Security Configuration Guide

The CIS Controls v8 has been revised and released by the Center for Internet Security (CIS). The CIS Controls are a collection of industry-recognized best practices for businesses dealing with data security risks. Such measures were created to make things easier and keep the IT operations and security teams attention on the crucial tasks. In v8, CIS changes a little the perspective around baseline security and system hardening.

netwrix

What is Database Hardening and Why Is It Critical?

Hardening the various systems across your network helps you improve your cybersecurity posture level and block attacks. Hardening includes regular patching of known software vulnerabilities and turning off nonessential services on each system to reduce the number of processes that can be exploited. Hardening your database servers is a vital part of this information security strategy.

Spectral

The Developer's Guide to Security Hardening

If developers one day considered security a mere ‘good-to-have,’ that day is firmly in the past. As digital transformation accelerates, employee workstations become liabilities for enterprise assets and data, placing cybersecurity in the spotlight. On average, organizations face 130 security breaches annually, and every data breach costs a company around $4.24 million. For better or worse, remote work culture and corrupted credential are the top reasons for security breaches.

Spectral

The Developer's Checklist to Security Hardening [XLS Download]

The coming of the internet was a beautiful thing, bringing about accessibility to reach everyone across the globe. But this reach is a double-edged sword. If everyone is just a click away, so are bad actors who can reach back to attack the organization at its weakest spot, trying to access information that it strives very hard to protect.

Spectral

What is OS Hardening and How Can Developers Implement it

As cyber threats become increasingly advanced and complex, organizations are forced to adopt a military attitude of ‘war footing’ to secure their systems and servers. Although the use of new technologies has increased to manage complex workloads and operations, the vulnerability of data stored on devices continues to be a worry. Accenture research revealed that cyberattacks have soared by a shocking 125% yearly.

CalCom

CIS Microsoft Windows Server 2022 Benchmark v1.0.0

In February 2022, CIS (Center for Internet Security) released the Microsoft Windows Server 2022 Benchmark v1.0.0 that includes 50+ new features, GPOs (Group Policy Objects), capabilities and services. The document offers a comparison between Server 2019 vs. Server 2022 for similarities and differences as well as similarities and differences of Windows 11 vs Windows 10.

CalCom

Why to harden PowerShell and not remove it completely

The National Security Agency (NSA) and partner cybersecurity authorities recently released an information sheet recommending proper configuration and monitoring of PowerShell, as opposed to removing or disabling PowerShell entirely. PowerShell is a built-in scripting language and a command-line executor developed by Microsoft to provide a better interface for system administrators to simplify and automate administrative tasks.

CalCom

10 Windows Hardening stages for cyber resilience

Best practices are changing depending on the environment and server functionality. CIS baselines cover most of the relevant scenarios by addressing the first stage of your hardening project. Microsoft has been doing some work related to default security configuration, but there is still a big gap between security best practices (i.e. common benchmarks) and the default Windows configuration.