Interior Page Icon

Device Hardening

Making It Harder for Components to Be Compromised



Overview

Implementing Device Hardening in a comprehensive, coordinated manner throughout the enterprise makes it more difficult for an attacker to leverage resources and enhances an enterprise's ability to withstand a persistent attack. This document describes how to apply Privilege Restriction and Coordinated Defense resiliency techniques.

Applying Privilege Restriction to Keep the Adversary from Leveraging Resources

Privilege Restriction - restricting privileges required to use cyber resources, and privileges assigned to users and cyber entities, based on the type(s) and degree(s) of criticality and trust respectively, can minimize the potential consequences of adversary activities.

Priorities for Immediate Action with Privilege Restriction

Applying Coordinated Defense to Share Situational Awareness and Collaborate

Coordinated Defense - managing multiple, distinct mechanisms adaptively and in a coordinated way - can defend critical resources against adversary activities. This requires coordination across organizations regarding privileges identities and roles - both their consistent use and in the event of a compromise. There are two major implementation approaches to coordinated defense.

Priorities for Immediate Action with Coordinated Defense

The top priorities for Coordinated Defense are:

Technique Interactions

Privilege restriction works in conjunction with Coordinated Defense. Specifically the Coordinated Defense Coordination and Consistency Analysis method (described above) provides consistency to restricting privilege across the enterprise while minimizing interference with the mission. As one moves deeper into the organization's infrastructure to enclaves containing more sensitive information, only those users and applications that have appropriate privileges are allowed access to these enclaves, and only a very limited number of such users and applications are granted those privileges.

Preparing for the Future

There are various technological, social and business trends that will have impact on the ability to harden devices. "Bring Your Own Device" policies, the increased use of portable/mobile devices and Internet of Things are, to various degrees, disrupting the assumption that an enterprise can mandate and implement configurations, such as privilege restriction, on systems to harden those components.

In order to consistently and effectively harden systems in this changing environment one needs to

See Key Concepts and Terms for definitions

Previous Activity Back to Menu Next Activity