Hardening Computing Resources (Part 2) (Domain 4)
Continuing our discussion on hardening, this episode shifts focus to cloud infrastructure, servers, and industrial systems—each of which requires a tailored approach based on operational roles, architecture, and threat exposure. For cloud systems, hardening includes enforcing role-based access control, disabling unused services, encrypting storage, and monitoring resource usage across accounts and regions. On traditional servers, it involves managing local and domain policies, securing SSH or RDP sessions, and removing legacy protocols or unneeded software. For ICS and SCADA environments, hardening means restricting remote access, isolating control networks, and enforcing strict change management, all while preserving uptime and availability. We also address cloud-specific tools like CSPM (Cloud Security Posture Management) that automate configuration assessments and flag high-risk settings. Each platform brings its own complexity, but the goal remains the same—reduce exposure, control access, and defend at the configuration level.
