Device Hardening Flashcards

(11 cards)

1
Q

Device Hardening

A

■ Refers to ensuring that a device has had any unnecessary application or port disabled or removed from the host
■ Process of securing a host system by reducing its attack surface
■ Key Practices
● Run only necessary services
● Install monitoring software for malware protection
● Establish a maintenance schedule for system patching
■ Applies to endpoint devices, servers, network infrastructure, and mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Endpoint Security Software

A

■ Install anti-malware, antivirus, spam filters, host-based firewalls, and log collection agents
■ Enhances security posture and threat detection capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Specialized Hardware

A

■ Manufacturers add secure hardware like UEFI, TPM, and HSM
■ Aids in securing devices, especially as networks become more de-perimeterized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Host Hardening Practices

A

■ Ensure all software is patched and up-to-date
■ Ensure that device is properly configured
■ Remove unnecessary applications.
■ Block unnecessary ports and services
■ Control external storage devices tightly
■ Disable unneeded accounts
■ Rename default accounts
■ Change default passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Balancing Security and Usability

A

■ Open the least amount of ports
■ Run the least amount of services needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network Interfaces

A

■ Disable unneeded network connections
■ Consider wired, wireless, and management LAN interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Services

A

■ Disable unused services (e.g., CUPS daemon for print server)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ports

A

■ Close ports not needed for services
■ Use host-based firewalls for further hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Disk Encryption

A

■ Enable full disk encryption or use self-encrypting drives
■ Protects data at rest from unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Account Review

A

■ Disable or delete unused accounts
■ Follow the rule of thumb
● Disable, delete, or block anything unused or unneeded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Consideration of Device Lifecycle

A

■ End of Life (EOL)
● Date when a manufacturer will no longer sell a given product
■ End of Support (EOS)
● Last date that a manufacturer will support a given product
■ Ensure devices are always using supported and up-to-date software to prevent vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly