Hardening

Recommendations to optimize cybersecurity in a protected environment:

  • Harden environments according to your company’s policies and standards.
  • Apply least functionality to prohibit and restrict the use of unnecessary functions, ports, protocols or services.
  • Implement cybersecurity configuration procedures. See Configuring cybersecurity for detailed configuration information.