DIN EN ISO 27001:2022 defines numerous aspects of information security. One important aspect required in the new version is secure system configuration – also known as system hardening. Here’s what you need to know about it.
Nobody is perfect – especially no operating system! Therefore, system hardening for Linux is also recommended. However, the implementation can be complex in corporate environments. This is what you should consider.
IT security specialists in so-called SOCs, CDCs or CSIRTs usually have a lot on their plate because they have to deal with numerous events and incidents. System hardening can significantly reduce the flood of (false) reports and at the same time improve the security of IT systems.
There is a fresh update for the AuditTAP! You can now check even better whether your systems are securely configured (“hardened”) to the state of the art. Additionally, current project requirements are implemented.
In the default configuration, the new Microsoft operating system reads some telemetry data without being asked and sends it to several servers for evaluation. There is an established measure to prevent this – and it has other positive “side effects”.
Insurers are raising the prices of their cyber insurance policies. This can be changed, for example, with professional system hardening.
Don’t make it too easy for the “cyber gangsters”! Secure programs such as Chrome, Edge and Firefox properly with Browser Hardening. Here’s what you need to bear in mind.
How can high requirements of a information security certification be met? Especially when preventive measures like system hardening are a must have. This is how ESRB mastered that with our powerful hardening tool.
IT forensics and system hardening are only seemingly two completely different areas of information security. In practice, many important overlaps become apparent.
Don’t become an easy victim of cyber attacks! Read here why “cyber security” and the hardening of IT systems must be at the top of the list of priorities in 2023.