Digital systems have vulnerabilities. The many ways a server or application can be configured could result in an equal number of possible attack vectors. Hardening them makes them tougher to crack. The steps involved in hardening might involve configuring settings to values that restrict access. It could also be other best practices related to users, access management and policies.
We created a guide for people to learn more about the topic of hardening servers. It provides guidance for people who want an overview of the topic, There are many other in-depth guides on the topic by industry groups and professionals:
- NIST Special Publication 800-123
- Center for Internet Security Benchmarks