From the course: Ethical Hacking: Introduction to Ethical Hacking

Unlock the full course today

Join today to access over 23,200 courses taught by industry experts.

Solution: Hardening guide

Solution: Hardening guide

- [Instructor] Okay, now let's check our work. Now, there were a lot of guidelines in that document, but here are the six guidelines that will help protect network assets and reduce the risk of a successful cyber attack. First of all, it stresses to conduct a security review to determine if there's a security concern or compromise and then implement the appropriate mitigation and detection tools for this and other cyber activity. You need to manage your supply chains as they're part of your organization. Implement strong operational controls, manage architectural risks, manage authentication, authorization and accounting procedures and review contractual relationships with all service providers. Make sure that contracts include security controls, monitoring, logging along with notification of confirmed or suspected security events and incidents. I hope you enjoyed this challenge.

Contents