
Re-organized topic hierarchy Tiny edit to restart review workflow. Squashed with Resolved index.rst conflict commit Change-Id: I13472792cb19d1e9975ac76c6954d38054d606c5 Signed-off-by: Keane Lim <keane.lim@windriver.com> Signed-off-by: MCamp859 <maryx.camp@intel.com>
38 lines
1.1 KiB
ReStructuredText
38 lines
1.1 KiB
ReStructuredText
|
|
.. wav1595963716973
|
|
.. _security-hardening-intro:
|
|
|
|
===============================
|
|
Security Hardening Introduction
|
|
===============================
|
|
|
|
Platform infrastructure hardening is an obligatory task for achieving
|
|
resilience to infrastructure attacks and complying with regulatory
|
|
requirements.
|
|
|
|
Hackers attack on an ongoing basis using various cyber-attack techniques
|
|
that are called attack vectors.
|
|
|
|
|prod| nodes must be hardened to reduce the increasing amounts of
|
|
dynamically emerging cyber-attacks.
|
|
|
|
|
|
|prod| provides a broad number of features related to system security. The
|
|
scope of this document is to provide information about these security
|
|
features to support best practice security hardening along with knowledge
|
|
about the features' various impacts on operation and performance.
|
|
|
|
The security hardening features can be classified into the following layers:
|
|
|
|
.. _security-hardening-intro-ul-gqs-xtf-mmb:
|
|
|
|
- Operating System hardening
|
|
|
|
- Platform hardening
|
|
|
|
- Application hardening
|
|
|
|
This appendix covers the security features hardening the operating system
|
|
and platform. Application hardening is not in the scope of this document.
|
|
|