Reducing the Attack Surface
System hardening involves configuring an operating system or application securely, reducing potential vulnerabilities, and shrinking the attack surface.
The Principle of Least Privilege (PoLP)
This principle dictates that a user, process, or system component should only have the minimum permissions necessary to perform its job and nothing more.
- Example 1 (Users): A standard user account should not have administrative rights unless performing an administrative task.
- Example 2 (Services): A web server process (like Apache) should not run as the
rootuser. If compromised, the attacker only gains the web server's limited permissions, not full system control.
Hardening Checklist
- Disable all unnecessary services (e.g., FTP, Telnet).
- Remove or disable default user accounts and guest accounts.
- Enforce strong password policies.
- Restrict physical access to servers.
- Apply security configuration baselines (e.g., CIS Benchmarks).