 73e7f8ef4c
			
		
	
	73e7f8ef4c
	
	
	
		
			
			Epic: Security Planning shall support expectations presented in pre-sales presentations. Updated with review comments for Patch set 4 Updated with review comments for Patch set 3 Updated with review comments from Patch set 2 Updated with review comments from Patch set 1 Added summaries of items raised in pre-sales presentations Change-Id: Ic1e458dfd57ad7ab18923f3a1756007ad717efe1
		
			
				
	
	
		
			38 lines
		
	
	
		
			1.1 KiB
		
	
	
	
		
			ReStructuredText
		
	
	
	
	
	
			
		
		
	
	
			38 lines
		
	
	
		
			1.1 KiB
		
	
	
	
		
			ReStructuredText
		
	
	
	
	
	
| 
 | |
| .. wav1595963716973
 | |
| .. _security-hardening-intro:
 | |
| 
 | |
| ===============================
 | |
| Security Hardening Introduction
 | |
| ===============================
 | |
| 
 | |
| Platform infrastructure hardening is an obligatory task for achieving
 | |
| resilience to infrastructure attacks and complying with regulatory
 | |
| requirements.
 | |
| 
 | |
| Hackers attack on an ongoing basis using various cyber-attack techniques
 | |
| that are called attack vectors.
 | |
| 
 | |
| |prod| nodes must be hardened to reduce the increasing amounts of
 | |
| dynamically emerging cyber-attacks.
 | |
| 
 | |
| 
 | |
| |prod| provides a broad number of features related to system security. The
 | |
| scope of this document is to provide information about these security
 | |
| features to support best practice security hardening along with knowledge
 | |
| about the features' various impacts on operation and performance.
 | |
| 
 | |
| The security hardening features can be classified into the following layers:
 | |
| 
 | |
| .. _security-hardening-intro-ul-gqs-xtf-mmb:
 | |
| 
 | |
| -   Operating System hardening
 | |
| 
 | |
| -   Platform hardening
 | |
| 
 | |
| -   Application hardening
 | |
| 
 | |
| This appendix covers the security features hardening the operating system
 | |
| and platform. Application hardening is not in the scope of this document.
 | |
| 
 |