We can help you improve the security of your IT systems, prevent information leaks, and ensure your information systems uptime. The creation of a security baseline (Hardening) helps IT System and applications withstand know and unknown potential cyber attacks that leverage day zero vulnerabilities.
Here are a few examples of some types of security baselines, as defined by different organizations:
- User Security Baseline: Protection of corporate user Windows workstation configuration to prevent terminal cyber attacks and manipulations.
- VIP User Security Baseline: For privileged user according to their role in the company. These users have different security, privacy and confidentiality requirements according to the type of information they are allowed access.
- Server Security Baseline: System hardening depending on each system role (active directory, web server, database server, etc.).
During the security baseline definition process for the hardening process, the software running on the target system is assessed, both internally and externally, and the user profile is analyzed to adjust the protection to the system usage. These security measures will also affect the permissions for authorized tasks on office suites such as Microsoft Office.
These security baselines for the hardening process are defined using the main security standards established by the NIST, manufacturers such as Microsoft, and the expertise of the Tarlogic Ethical Hacking Team.
Contact us to learn more about the creation of customized hardening guidelines to protect your company’s IT systems from cyber attacks.