Contents

Google CS Network Security Hardening

Website Visitors:
Contents
  • Security Hardening: Security hardening is the process of configuring and implementing measures to reduce the vulnerability of a system, network, or application to potential attacks or breaches. This involves removing or disabling unnecessary features, patching known vulnerabilities, and configuring settings to minimize exposure to threats.

  • OS Hardening: The process of securing an operating system by reducing its attack surface, disabling unnecessary services and features, and configuring it to follow best practices for security.

  • Patch Management: The process of identifying, acquiring, installing, and verifying patches for software vulnerabilities to prevent exploitation by attackers.

  • Baseline Configuration: A standardized and secure configuration for a system or device, used as a starting point for all similar systems or devices, to ensure consistency and security across the organization.

  • MFA (Multi-Factor Authentication): A security process that requires a user to provide two or more authentication factors to access a system, network, or application. These factors can include something you know (password, PIN), something you have (smart card, token), or something you are (biometric data, such as a fingerprint or face scan).

  • 2FA (Two-Factor Authentication): A specific type of MFA that requires a user to provide exactly two authentication factors to access a system, network, or application. 2FA is often used interchangeably with MFA, but technically, 2FA is a subset of MFA that requires only two factors, whereas MFA can require more than two.

  • Salting and hashing: Hashing converts information into a unique value that can then be used to determine its integrity. It is a one-way function, meaning it is impossible to decrypt and obtain the original text. Salting adds random characters to hashed passwords. This increases the length and complexity of hash values, making them more secure.
  • Cloud computing is a model for allowing convenient and on-demand network access to a shared pool of configurable computing resources. These resources can be configured and released with minimal management effort or interaction with the service provider.
  • Penetration testing (pen test): A simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes
Devices / Tools Advantages Disadvantages
Firewall A firewall allows or blocks traffic based on a set of rules. A firewall is only able to filter packets based on information provided in the header of the packets.
Intrusion Detection System (IDS) An IDS detects and alerts admins about possible intrusions, attacks, and other malicious traffic. An IDS can only scan for known attacks or obvious anomalies; new and sophisticated attacks might not be caught. It doesn’t actually stop the incoming traffic.
Intrusion Prevention System (IPS) An IPS monitors system activity for intrusions and anomalies and takes action to stop them. An IPS is an inline appliance. If it fails, the connection between the private network and the internet breaks. It might detect false positives and block legitimate traffic.
Security Information and Event Management (SIEM) A SIEM tool collects and analyzes log data from multiple network machines. It aggregates security events for monitoring in a central dashboard. A SIEM tool only reports on possible security issues. It does not take any actions to stop or prevent suspicious events.

Your inbox needs more DevOps articles.

Subscribe to get our latest content by email.