Objective 4.1High14 min

Hardening Targets

Security hardening techniques for mobile devices, workstations, switches, routers, cloud infrastructure, servers, ICS/SCADA, embedded systems, RTOS, and IoT devices.

Understanding Hardening Targets

Different systems require different hardening approaches based on their function, exposure, and constraints. Hardening reduces the attack surface by disabling unnecessary features, applying security configurations, and implementing protective controls.

Hardening target categories:Endpoints — Workstations, mobile devices • Servers — Web, database, application servers • Network devices — Switches, routers, firewalls • Specialized systems — ICS/SCADA, IoT, embedded • Cloud infrastructure — VMs, containers, serverless

The 2021 Oldsmar water treatment attack exploited weak remote access security on an ICS system. Attackers briefly increased sodium hydroxide levels to dangerous amounts. Proper hardening—including removing unused remote access and implementing MFA—could have prevented the intrusion.

Every device type has unique hardening requirements based on its role and risks.

Why This Matters for the Exam

Hardening targets are heavily tested on SY0-701 because different systems need different security approaches. Questions cover device-specific hardening and recognizing appropriate controls.

Understanding hardening helps with security architecture, vulnerability management, and compliance. One-size-fits-all hardening doesn't work—each system type has unique considerations.

The exam tests recognition of appropriate hardening techniques for various device types.

Deep Dive

How Do You Harden Workstations?

Workstations are primary attack targets due to user interaction and email/web exposure.

Workstation Hardening:

CategoryActions
OSRemove unused features, disable unnecessary services
SoftwareAllow-list applications, remove bloatware
AccountsNo local admin for users, strong passwords
NetworkEnable firewall, disable unnecessary protocols
DataEnable encryption (BitLocker/FileVault)
UpdatesAutomatic patching, current antivirus

Workstation Checklist:

□ Full disk encryption enabled
□ Host firewall enabled
□ EDR/antivirus installed and current
□ Automatic updates configured
□ Local admin rights removed from users
□ Screen lock timeout configured
□ USB restrictions applied
□ Browser security settings applied
□ Unnecessary software removed

How Do You Harden Servers?

Servers require stricter hardening due to their critical functions and potential exposure.

Server Hardening:

CategoryActions
ServicesDisable unused services, minimal installation
AccountsRemove/rename default accounts, service accounts
PermissionsPrinciple of least privilege
LoggingComprehensive audit logging
NetworkRestrict to required ports only
UpdatesTested patching process

Server Types:

Server TypeSpecific Hardening
Web serverDisable directory listing, remove default pages
DatabaseEncrypt data, restrict network access
File serverPermission auditing, disable inheritance
Domain controllerPhysical security, strict access

How Do You Harden Network Devices?

Switches, routers, and firewalls require specialized hardening.

Switch Hardening:

ControlPurpose
Port securityLimit MAC addresses per port
DHCP snoopingPrevent rogue DHCP servers
Dynamic ARP inspectionPrevent ARP spoofing
Disable unused portsReduce attack surface
VLAN segmentationNetwork isolation
Spanning tree protectionPrevent topology attacks

Router Hardening:

ControlPurpose
Disable unnecessary servicesReduce attack surface
Access control listsFilter traffic
Secure managementSSH only, no Telnet
Routing protocol authPrevent route injection
LoggingTrack configuration changes

Network Device Checklist:

□ Change default credentials
□ Disable Telnet, use SSH
□ Enable logging
□ Disable unused ports/services
□ Implement access control lists
□ Enable port security (switches)
□ Configure management VLAN
□ Implement authentication for routing protocols

How Do You Harden Cloud Infrastructure?

Cloud hardening spans VMs, containers, and cloud-native services.

Cloud Hardening:

LayerActions
IdentityMFA, least privilege, no root keys
NetworkSecurity groups, NACLs, private subnets
ComputeHardened images, auto-patching
StorageEncryption, access policies
LoggingCloudTrail/activity logs enabled

Cloud-Specific Considerations:

IaaS:
- Harden VMs like on-premises servers
- Use cloud-native security groups
- Enable cloud provider security tools

PaaS:
- Secure application configuration
- Use managed encryption
- Review default settings

Serverless:
- Least privilege function permissions
- Secure environment variables
- Monitor function behavior

How Do You Harden ICS/SCADA Systems?

Industrial Control Systems require unique hardening due to operational constraints.

ICS/SCADA Challenges:

ChallengeImplication
Legacy systemsMay not support modern security
AvailabilityDowntime not acceptable
PatchingRequires vendor approval
Real-time requirementsCan't add latency
Long lifecycle15-20 year systems

ICS Hardening Approach:

Network segmentation:
- Air-gap or firewall from corporate
- DMZ for data exchange
- No direct internet access

Access control:
- Physical access restrictions
- Multi-factor authentication
- Remove unnecessary remote access

Monitoring:
- Network anomaly detection
- Protocol-aware monitoring
- Change detection

Compensating controls:
- When patching isn't possible
- Network isolation
- Additional monitoring

How Do You Harden IoT and Embedded Devices?

IoT devices have limited security capabilities but significant exposure.

IoT Hardening:

ControlImplementation
CredentialsChange defaults, strong passwords
FirmwareKeep updated when possible
NetworkIsolate on separate VLAN
EncryptionEnable if available
Unnecessary featuresDisable unused services

IoT Network Architecture:

[Corporate Network]
       |
   [Firewall]
       |
[IoT VLAN] ←── Isolated
       |
[IoT Devices]

No direct corporate access
Monitored traffic only
Internet access restricted

Embedded/RTOS Considerations:

Challenges:
- Limited memory for security software
- Proprietary operating systems
- No patching mechanism
- Physical access possible

Compensating controls:
- Network isolation
- Physical security
- Monitoring
- Firmware validation

How CompTIA Tests This

Example Analysis

Scenario: A manufacturing company has Windows workstations, Windows servers, Cisco switches, AWS cloud infrastructure, and legacy PLCs (Programmable Logic Controllers) on the factory floor. Develop a hardening strategy for each.

Analysis - Multi-Environment Hardening:

Windows Workstations:

Hardening approach: CIS Benchmark Level 1

Key controls:
✓ BitLocker full disk encryption
✓ Windows Firewall enabled
✓ EDR agent installed
✓ Automatic Windows Update
✓ Local admin rights removed
✓ AppLocker for application control
✓ USB device restrictions
✓ 15-minute screen lock timeout

Windows Servers:

Hardening approach: CIS Benchmark + custom controls

Key controls:
✓ Server Core where possible (minimal UI)
✓ Only required roles installed
✓ Rename/disable default Administrator
✓ Comprehensive audit logging
✓ Host firewall with explicit rules
✓ Remove unused services
✓ Scheduled patching with testing
✓ No direct internet access

Cisco Switches:

Hardening approach: Cisco security guide + CIS

Key controls:
✓ Change default credentials
✓ Disable Telnet, SSH only
✓ Port security (MAC limiting)
✓ DHCP snooping enabled
✓ Dynamic ARP inspection
✓ Disable unused ports
✓ Management VLAN separation
✓ Spanning tree protection (BPDU guard)
✓ AAA authentication (RADIUS)

AWS Cloud Infrastructure:

Hardening approach: CIS AWS Benchmark

Key controls:
✓ MFA on all IAM accounts
✓ No root access keys
✓ Security groups deny by default
✓ CloudTrail enabled all regions
✓ S3 bucket encryption default
✓ VPC flow logs enabled
✓ GuardDuty threat detection
✓ Hardened AMIs for EC2
✓ Secrets Manager for credentials

Legacy PLCs (ICS):

Hardening approach: Compensating controls

Key controls:
✓ Network segmentation (separate VLAN)
✓ Firewall between IT and OT
✓ No direct internet access
✓ Remove unused remote access (TeamViewer, etc.)
✓ Physical access controls
✓ Network monitoring/anomaly detection
✓ Documented exception for patching
✓ Vendor engagement for updates
✓ Backup of PLC configurations

Key insight: Each environment requires tailored hardening. Workstations focus on user-facing risks, servers on service security, network devices on infrastructure protection, cloud on identity and configuration, and ICS on isolation and compensating controls where traditional hardening isn't possible.

Key Terms

hardening targetsserver hardeningnetwork hardeningcloud hardeningIoT securityICS SCADA securityendpoint hardening

Common Mistakes

Same hardening for all systems—different system types have different security requirements and constraints.
Forgetting to change default credentials—this remains a top attack vector, especially on network devices and IoT.
Ignoring ICS/OT constraints—patching and security software may not be possible; use compensating controls.
Cloud = someone else's problem—cloud shared responsibility means you must harden your configurations.

Exam Tips

Workstation hardening: EDR, encryption, no local admin, automatic updates, host firewall.
Server hardening: Minimal services, no defaults, least privilege, comprehensive logging.
Switch hardening: Port security, DHCP snooping, disable unused ports, secure management.
Router hardening: ACLs, SSH only (no Telnet), routing protocol authentication.
ICS/SCADA: Network isolation is primary control when patching isn't possible.
IoT: Isolate on separate VLAN, change defaults, update firmware, disable unused features.

Memory Trick

Hardening by Device - "WSNCI":

  • Workstations = User-facing (EDR, encryption, no admin)
  • Servers = Services (minimal, locked down)
  • Network = Infrastructure (port security, SSH)
  • Cloud = Configuration (IAM, security groups)
  • ICS/IoT = Isolation (segment, monitor)
  • Universal Hardening Steps - "CRUD-L":
  • Change defaults (credentials, settings)
  • Remove unnecessary (services, software)
  • Update/patch systems
  • Disable unused features
  • Log everything

ICS Special Rule: "When you CAN'T patch, you CAN isolate" Network segmentation is the primary ICS control

Network Device Memory: "Switches: Stop at the port" (port security) "Routers: Route only what's allowed" (ACLs)

IoT Rule: "Default credentials = Default breach" Always change IoT defaults

Test Your Knowledge

Q1.Which hardening control is MOST important for IoT devices that cannot be easily updated?

Q2.Which switch security feature prevents rogue DHCP servers on the network?

Q3.A legacy manufacturing system cannot be patched due to vendor constraints. What is the PRIMARY compensating control?

Want more practice with instant AI feedback?

Continue Learning

Ready for the Exam?

See exactly where you stand on this concept and 182 others.

99% pass rate · Pass guarantee