Sei sulla pagina 1di 3

Name?

IS3220
[UNIT
8 DISCUSSION 1
Mr. ?
SYSTEM HARDENING]

System Hardening

Name?
IS3220
30 Jan 2014

The guidelines and standards that I am most familiar with are from dealing with and
learning about these organizations in class and they are; NIST, ISO, NSA, and COBIT. Just from
being in the Military I know that I have had to abide by these and have used some at times but at
the time I did not realize what they were because of lack of knowledge at the time. The steps
that I have taken before in order to harden a system are as follows; made system updates,
installed patches, properly configured workstations, configured and enforced Group Policies,
monitored User Accounts, Configured password complexity policies on workstations, and
enforced Acceptable Use Policy (AUP) Standards.
If any IT Administrator is half-way paying attention the first thing they should do is
change any and all default logon/passwords. When configuring the policies as part of their
security strategy they should configure the complexity settings required for passwords as well as
the number of logon attempts before lockout. The functions that updates and patches serve are
they fix bugs, vulnerabilities, and risks in systems that are in the operating software or any other
software used on a system. Any anonymous access settings should be disabled to keep any
unauthorized users from accessing the system. All unnecessary services should be removed or at
least disabled to limit the possibility of vulnerabilities. The separation of production and
development environments are essential to protecting an organizations assets, this can be done by
setting up a DMZ for shared Web, Email, and Database Servers that are isolated by firewalls.
Your Production and Development environment will be on the inside of the organizations
network instead of the DMZ and on a separate subnet than everything else with its own firewall.
All of these are strategies of hardening and they all add up to the Defense in Depth concept
(Lehtinen, Russell, & Gangemi Sr., 2011).

System Hardening

Name?
IS3220
30 Jan 2014
References
Works Cited

Lehtinen, R., Russell, D., & Gangemi Sr., G. T. (2011). Computer Security Basics. Sebastopol:
O'Reilly. Retrieved Feb 19, 2014
Stewart, J. M. (2011). Network Security, Firewalls, and VPNs. Sudbury: Jones & Bartlett
Learning. Retrieved Jan 30, 2013

Potrebbero piacerti anche