System
Use of isolation methods in running applications
Summary Applications should run isolated from other applications (using sandboxing, jails, containers, etc). Description These mechanisms provide controlled environments in which applications can operate, limiting their access to system resources and ...
Synchronize system clocks
Summary Critical systems must have synchronized clocks whose configuration is protected and comes from industry-accepted sources. Description Systems must properly record exceptional and security events in protected logs. This allows administrators ...
Define maximum number of connections
Summary Each port must have a maximum number of connections defined per source IP. Description Some attacks aim to exhaust a system's resources by establishing a large number of connections without intending to complete them. Setting connection ...
Restrict service root directory
Summary The service process must have a root directory with access only to the necessary files. Description By restricting the service process to a specific root directory, the system can prevent unauthorized access to critical system files or ...
Define a fixed security suite
Summary All the workstations in production must have an unalterable security suite (Anti-virus, Antispyware, Host Firewall, Host-IDS, Host-IPS). Description The type of suites, such as Host-IDS, Host-Firewall and IPS are designed to detect and ...
Use the principle of least privilege
Summary The principle of least privilege must be applied when creating new objects and roles, setting access permissions, and accessing other systems. Description Systems should have a set of roles with different levels of privilege to access ...