Secure configuration guidelines include operating systems, servers, communication protocols, software, web services, databases, virtualization, and so on. It's highly recommended to refer to the CIS benchmarks (www.cisecurity.org) as a baseline:
|
Common software components |
Database |
MySQL, SQL Server, Oracle |
Web Service |
Apache Tomcat, NginX |
Virtualization |
VMWare, Docker |
Operating |
Linux (Sent, REdHat, Suse, Ubuntu), Windows Server |