Locking the Doors
Default configurations are designed for usability, not security. "Hardening" is the process of securing a system by reducing its surface of vulnerability.
1. Updates & Patch Management
The single most effective security control. Most attacks exploit vulnerabilities that have already been fixed by vendors.
- Action: Enable automatic updates for OS and Applications.
- Concept: "Zero-Day" vs "N-Day" vulnerabilities.
2. Service Reduction
If you don't need it, turn it off. Every running service is a potential entry point.
- Windows: Disable services like "Remote Registry" or "Print Spooler" (if not printing).
- Linux: Use
systemctl disable [service].
3. Host-Based Firewalls
A network firewall protects the perimeter; a host firewall protects the device itself.
- Windows: Windows Defender Firewall. Block incoming connections by default.
- Linux:
ufw(Uncomplicated Firewall) oriptables. Example:ufw allow sshthenufw enable.
🔬 Lab Exercise: CIS Benchmarks
Objective: Audit a system against industry standards.
- Search for "CIS Benchmark for Ubuntu" or "Windows 10".
- Download the PDF (or view a summary).
- Pick 5 recommendations (e.g., "Ensure password complexity is configured").
- Check if your VM meets these standards. If not, fix it!