Security hardening can be described as the process of ensuring that system hardware or software is configured and implemented in a way that minimizes potential security vulnerabilities. It involves applying a set of security best practices to improve the overall security of a system or software. An example of physical hardening is to seal or monitor ports on a server. Similarly, hardening software can be done by disabling unused or unnecessary ports and services (for example, disabling SSH or RDP when not in use).
The following are some of the security configuration settings that are validated across all NativeEdge solutions:
- Identification and authentication of users and integration with central authentication servers (for example, Active Directory)
- Authorization for users based on Role-Based Access Control (RBAC)
- Logging and auditing settings
- Using secure versions of protocols (for example, MQTT with TLS for encryption or using HTTPS instead of HTTP)