Process of securing systems by reducing attack surface through configuration changes and removing unnecessary features.
Hardening reduces system attack surface by applying secure configurations, removing unnecessary services, closing unused ports, and eliminating default accounts. Hardening goes beyond patching—it's proactive security configuration rather than reactive vulnerability fixing. Hardening guides (like CIS Benchmarks) provide specific recommendations for operating systems, applications, and network devices. A hardened system has minimal services running, strong access controls, and security features enabled by default.
Why It Matters
The DSC Perspective:
Hardening reduces the opportunities attackers have to compromise systems. CIS Benchmarks provide detailed hardening guides. Hardened configurations should be your baseline—every system deployed should start secure, not become secure later.
