Hardening Procedures

Software vendors provide solutions with a basic configuration that focuses on ease of implementation rather than secure implementation. Most vendors publish a security appendix for their products to help the system owner implement product security.

Hardening procedures are documents that are based on common security practices and security best practices regarding a specific system or application. These procedures are designed to reduce the system’s attack surface and mitigate potential vulnerabilities that might be exploited in various circumstances.

Description of our Service

Hardening procedures are documents containing topics relevant to hardening with regard to key settings in information security. These can include permissions, access control, password and account management policies, disabling of unneeded services and features, activating security mechanisms, etc.

Comsec’s hardening procedures are based on vendors’ official recommendations and validated with in-depth research on specific topics, testing of those hardening topics in Comsec’s cyber security labs while considering common security practices and security best practices. Our hardening procedures take into consideration the compensating controls that might be implemented in a client’s environment and provide a secure platform for application deployment.

Why Comsec

The Comsec team has a valuable knowledgebase and experience, with members from the IT and security fields, and has demonstrated experience with the products in question.

Comsec monitors the cyber security world and updates its procedures based on the changing risk factors and new attack vectors.

Consumer Problems

“A chain is only as strong as its weakest link”

Systems, as delivered by vendors with their default (vanilla) configuration, are designed for ease of configuration and implementation rather than for resilience against cyber-attacks.

Default configuration or custom configuration performed by a person with weak knowledge and experience in security might expose the system to unnecessary risk that could be mitigated by implementing proper hardening procedures.

Close Menu