Summary

No matter how secure your network infrastructure is and no matter what services your server runs, there are certain basic hardening techniques you must apply. In this chapter, we focused specifically on hardening steps that apply to any server. In particular, we discussed the physical security of server resources, followed by disk encryption techniques one can use for on-premises and cloud infrastructure. We have established that almost every server has some sort of internet-facing connectivity and has to be protected by antivirus and malware solutions. To complement these security solutions, we can also harden our servers and adjust local security polices and permissions. Finally, we discussed some server management techniques to ...

Get Practical Network Scanning now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.