# Security hardning

# temp

things to review

1. On-path attack
2. Distributed denial of service attack (DDoS)
3. Denial of service attack (DoS)
4. SYN flood attack
5. IP spoofing
6. Packet sniffing

# Introduction to security hardening

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-i-want-to-take-a-mom"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from I want to take a moment to congratulate you on your progress so far." class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I want to take a moment to congratulate you on your progress so far. </span></div><div aria-label="toggle video from First, you learned about network operations." class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">First, you learned about network operations. </span></div><div aria-label="toggle video from Then, you learned about the tools and" class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Then, you learned about the tools and </span></div><div aria-label="toggle video from protocols that help network systems function." class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">protocols that help network systems function. </span></div><div aria-label="toggle video from Next, you learned how vulnerabilities in" class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Next, you learned how vulnerabilities in </span></div><div aria-label="toggle video from networks expose them to various security intrusions." class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">networks expose them to various security intrusions. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-now%2C-we%27ll-discuss-s"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Now, we'll discuss security hardening." class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Now, we'll discuss security hardening. </span></div><div aria-label="toggle video from Then, we'll learn about OS hardening, explore network hardening practices, and" class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Then, we'll learn about OS hardening, explore network hardening practices, and </span></div><div aria-label="toggle video from discuss cloud hardening practices." class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">discuss cloud hardening practices. </span></div><div aria-label="toggle video from Security hardening can be implemented in devices, networks," class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Security hardening can be implemented in devices, networks, </span></div><div aria-label="toggle video from applications, and cloud infrastructure." class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">applications, and cloud infrastructure. </span></div><div aria-label="toggle video from Security analysts may perform tasks, such as patch updates and" class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Security analysts may perform tasks, such as patch updates and </span></div><div aria-label="toggle video from current lecture segment: backups, as part of security hardening." class="rc-Phrase active css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">backups, as part of security hardening. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--1"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-we%27ll-discuss-these-"><div aria-label="toggle video from We'll discuss these tasks as you progress through the course." class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">We'll discuss these tasks as you progress through the course. </span></div><div aria-label="toggle video from As a security analyst, hardening will play a major role in your day-to-day tasks," class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">As a security analyst, hardening will play a major role in your day-to-day tasks, </span></div><div aria-label="toggle video from which is why it's important for you to understand how it works." class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">which is why it's important for you to understand how it works. </span></div><div aria-label="toggle video from I'm excited to accompany you on this journey." class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I'm excited to accompany you on this journey. </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">  
</span></div></div># Security hardening

<div class="phrases" id="bkmrk-security-analysts-an"><div aria-label="toggle video from Meet you in the next video." class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Security analysts and the organizations they work with have to be" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Security analysts and the organizations they work with have to be </span></div><div aria-label="toggle video from proactive about protecting systems from attack." class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">proactive about protecting systems from attack. </span></div><div aria-label="toggle video from This is where security hardening comes in." class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This is where security hardening comes in. </span></div><div aria-label="toggle video from Security hardening is the process of strengthening a system to reduce its" class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Security hardening is the process of strengthening a system to reduce its </span></div><div aria-label="toggle video from vulnerability and attack surface." class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">vulnerability and attack surface. </span></div><div aria-label="toggle video from All the potential vulnerabilities that a threat actor could exploit" class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">All the potential vulnerabilities that a threat actor could exploit </span></div><div aria-label="toggle video from are referred to as a system's attack surface." class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">are referred to as a system's attack surface. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Let's use an example that compares a network to a house." class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's use an example that compares a network to a house. </span></div><div aria-label="toggle video from The attack surface would be all the doors and" class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The attack surface would be all the doors and </span></div><div aria-label="toggle video from windows that a robber could use to gain access to that house." class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">windows that a robber could use to gain access to that house. </span></div><div aria-label="toggle video from Just like putting locks on all the doors and windows in the house," class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Just like putting locks on all the doors and windows in the house, </span></div><div aria-label="toggle video from security hardening involves minimizing the attack surface or" class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">security hardening involves minimizing the attack surface or </span></div><div aria-label="toggle video from potential vulnerabilities and keeping a network as secure as possible." class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">potential vulnerabilities and keeping a network as secure as possible. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from current lecture segment: As part of security hardening, security analysts perform regular maintenance" class="rc-Phrase active css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">As part of security hardening, security analysts perform regular maintenance </span></div><div aria-label="toggle video from procedures to keep network devices and systems functioning securely and" class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">procedures to keep network devices and systems functioning securely and </span></div><div aria-label="toggle video from optimally." class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">optimally. </span></div><div aria-label="toggle video from Security hardening can be conducted on any device or" class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Security hardening can be conducted on any device or </span></div><div aria-label="toggle video from system that can be compromised, such as hardware, operating systems," class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">system that can be compromised, such as hardware, operating systems, </span></div><div aria-label="toggle video from applications, computer networks, and databases." class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">applications, computer networks, and databases. </span></div><div aria-label="toggle video from Physical security is also a part of security hardening." class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Physical security is also a part of security hardening. </span></div><div aria-label="toggle video from This may include securing a physical space with security cameras and security guards." class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This may include securing a physical space with security cameras and security guards. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Some common types of hardening procedures include software updates," class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Some common types of hardening procedures include software updates, </span></div><div aria-label="toggle video from also called patches, and device application configuration changes." class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">also called patches, and device application configuration changes. </span></div><div aria-label="toggle video from These updates and changes are done to increase security and" class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">These updates and changes are done to increase security and </span></div><div aria-label="toggle video from fix security vulnerabilities on a network." class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">fix security vulnerabilities on a network. </span></div><div aria-label="toggle video from An example of a security configuration change would be requiring longer" class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">An example of a security configuration change would be requiring longer </span></div><div aria-label="toggle video from passwords or more frequent password changes." class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">passwords or more frequent password changes. </span></div><div aria-label="toggle video from This makes it harder for a malicious actor to gain login credentials." class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This makes it harder for a malicious actor to gain login credentials. </span></div><div aria-label="toggle video from An example of a configuration check is updating the encryption standards for" class="rc-Phrase css-ugczj4" data-cue="29" data-cue-index="28" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">An example of a configuration check is updating the encryption standards for </span></div><div aria-label="toggle video from data that is stored in a database." class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">data that is stored in a database. </span></div><div aria-label="toggle video from Keeping encryption up to date makes it harder for" class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Keeping encryption up to date makes it harder for </span></div><div aria-label="toggle video from malicious actors to access the database." class="rc-Phrase css-ugczj4" data-cue="32" data-cue-index="31" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">malicious actors to access the database. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Other examples of security hardening include removing or" class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Other examples of security hardening include removing or </span></div><div aria-label="toggle video from disabling unused applications and services, disabling unused ports, and" class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">disabling unused applications and services, disabling unused ports, and </span></div><div aria-label="toggle video from reducing access permissions across devices and network." class="rc-Phrase css-ugczj4" data-cue="35" data-cue-index="34" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">reducing access permissions across devices and network. </span></div><div aria-label="toggle video from Minimizing the number of applications, devices, ports, and access permissions" class="rc-Phrase css-ugczj4" data-cue="36" data-cue-index="35" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Minimizing the number of applications, devices, ports, and access permissions </span></div><div aria-label="toggle video from makes network and device monitoring more efficient and reduces the overall attack" class="rc-Phrase css-ugczj4" data-cue="37" data-cue-index="36" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">makes network and device monitoring more efficient and reduces the overall attack </span></div><div aria-label="toggle video from surface, which is one of the best ways to secure an organization." class="rc-Phrase css-ugczj4" data-cue="38" data-cue-index="37" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">surface, which is one of the best ways to secure an organization. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Another important strategy for" class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Another important strategy for </span></div><div aria-label="toggle video from security hardening is to conduct regular penetration testing." class="rc-Phrase css-ugczj4" data-cue="40" data-cue-index="39" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">security hardening is to conduct regular penetration testing. </span></div><div aria-label="toggle video from A penetration test, also called a pen test, is a simulated attack that helps identify" class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A penetration test, also called a pen test, is a simulated attack that helps identify </span></div><div aria-label="toggle video from vulnerabilities in a system, network, website, application, and process." class="rc-Phrase css-ugczj4" data-cue="42" data-cue-index="41" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">vulnerabilities in a system, network, website, application, and process. </span></div><div aria-label="toggle video from Penetration testers document their findings in a report." class="rc-Phrase css-ugczj4" data-cue="43" data-cue-index="42" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Penetration testers document their findings in a report. </span></div><div aria-label="toggle video from Depending on where the test fails, security teams can determine the type of" class="rc-Phrase css-ugczj4" data-cue="44" data-cue-index="43" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Depending on where the test fails, security teams can determine the type of </span></div><div aria-label="toggle video from security vulnerabilities that require fixing." class="rc-Phrase css-ugczj4" data-cue="45" data-cue-index="44" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">security vulnerabilities that require fixing. </span></div><div aria-label="toggle video from Organizations can then review these vulnerabilities and" class="rc-Phrase css-ugczj4" data-cue="46" data-cue-index="45" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Organizations can then review these vulnerabilities and </span></div><div aria-label="toggle video from come up with a plan to fix them." class="rc-Phrase css-ugczj4" data-cue="47" data-cue-index="46" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">come up with a plan to fix them. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="phrases"><div aria-label="toggle video from Coming up, you'll learn more about how security hardening is an essential aspect" class="rc-Phrase css-ugczj4" data-cue="48" data-cue-index="47" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Coming up, you'll learn more about how security hardening is an essential aspect </span></div><div aria-label="toggle video from of securing networks." class="rc-Phrase css-ugczj4" data-cue="49" data-cue-index="48" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">of securing networks. </span></div><div aria-label="toggle video from It's a foundational part of network security that strengthens" class="rc-Phrase css-ugczj4" data-cue="50" data-cue-index="49" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">It's a foundational part of network security that strengthens </span></div><div aria-label="toggle video from the network in order to reduce the number of successful attacks." class="rc-Phrase css-ugczj4" data-cue="51" data-cue-index="50" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the network in order to reduce the number of successful attacks. </span></div></div></div></div>

# OS hardening practices

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-hi-there.-in-this-vi"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Hi there. In this video," class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Hi there. In this video, </span></div><div aria-label="toggle video from we'll discuss operating system, or" class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">we'll discuss operating system, or </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">OS, hardening and why it's </span></div><div aria-label="toggle video from essential to keep the entire network secure." class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">essential to keep the entire network secure. </span></div><div aria-label="toggle video from The operating system is" class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The operating system is </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the interface between computer hardware and the user. </span></div><div aria-label="toggle video from The OS is the first program" class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The OS is the first program </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">loaded when a computer turns on. </span></div><div aria-label="toggle video from The OS acts as an intermediary" class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The OS acts as an intermediary </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">between software applications and the computer hardware. </span></div><div aria-label="toggle video from It's important to secure the OS in each system" class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">It's important to secure the OS in each system </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">because one insecure OS can </span></div><div aria-label="toggle video from lead to a whole network being compromised." class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">lead to a whole network being compromised. </span></div><div aria-label="toggle video from There are many types of operating systems, and they" class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">There are many types of operating systems, and they </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">all share similar security hardening practices. </span></div><div aria-label="toggle video from Let's talk about some of" class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's talk about some of </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">those security hardening practices that </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">are recommended to secure an OS. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-some-os-hardening-ta"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Some OS hardening tasks" class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Some OS hardening tasks </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">are performed at regular intervals, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">like updates, backups, and keeping </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">an up-to-date list of devices and authorized users. </span></div><div aria-label="toggle video from Other tasks are performed only" class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Other tasks are performed only </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">once as part of preliminary safety measures. </span></div><div aria-label="toggle video from Other tasks are performed only" class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">One example would be configuring </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a device setting to fit a secure encryption standard. </span></div><div aria-label="toggle video from Let's begin with OS hardening tasks" class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's begin with OS hardening tasks </span></div><div aria-label="toggle video from that are performed at a regular interval," class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that are performed at a regular interval, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">such as patch installation, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">also known as patch updates. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--1"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-a-patch-update-is-a-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from A patch update is a software and operating system, or" class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A patch update is a software and operating system, or </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">OS, update that addresses </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">security vulnerabilities within a program or product. </span></div><div aria-label="toggle video from Now we'll discuss patch updates provided" class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Now we'll discuss patch updates provided </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">to the company by the OS software vendor. </span></div><div aria-label="toggle video from Now we'll discuss patch updates provided" class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">With patch updates, the OS should </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">be upgraded to its latest software version. </span></div><div aria-label="toggle video from Now we'll discuss patch updates provided" class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Sometimes patches are released </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">to fix a security vulnerability in the software. </span></div><div aria-label="toggle video from As soon as OS vendors publish" class="rc-Phrase css-ugczj4" data-cue="40" data-cue-index="39" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">As soon as OS vendors publish </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a patch and the vulnerability fix, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">malicious actors know exactly where </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the vulnerability is in systems </span></div><div aria-label="toggle video from running the out-of-date OS." class="rc-Phrase css-ugczj4" data-cue="44" data-cue-index="43" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">running the out-of-date OS. </span></div><div aria-label="toggle video from This is why it's important for organizations to run" class="rc-Phrase css-ugczj4" data-cue="45" data-cue-index="44" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This is why it's important for organizations to run </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">patch updates as soon as they are released. </span></div><div aria-label="toggle video from For example, my team" class="rc-Phrase css-ugczj4" data-cue="47" data-cue-index="46" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">For example, my team </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">had to perform an emergency patch to </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">address a recent vulnerability </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">found in a commonly used programming library. </span></div><div aria-label="toggle video from The library is used almost everywhere," class="rc-Phrase css-ugczj4" data-cue="51" data-cue-index="50" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The library is used almost everywhere, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">so we had to quickly patch most of our servers and </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">applications to fix the vulnerability. </span></div><div aria-label="toggle video from The newly updated OS should be" class="rc-Phrase css-ugczj4" data-cue="54" data-cue-index="53" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The newly updated OS should be </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">added to the baseline configuration, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">also called the baseline image. </span></div><div aria-label="toggle video from A baseline configuration is a documented set of" class="rc-Phrase css-ugczj4" data-cue="57" data-cue-index="56" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A baseline configuration is a documented set of </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">specifications within a system </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that is used as a basis for future builds,</span></div><div aria-label="toggle video from releases, and updates." class="rc-Phrase css-ugczj4" data-cue="60" data-cue-index="59" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">releases, and updates. </span></div><div aria-label="toggle video from For example, a baseline may contain" class="rc-Phrase css-ugczj4" data-cue="61" data-cue-index="60" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">For example, a baseline may contain </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a firewall rule with a list of </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">allowed and disallowed network ports. </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">If a security team suspects </span></div><div aria-label="toggle video from unusual activity affecting the OS," class="rc-Phrase css-ugczj4" data-cue="65" data-cue-index="64" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">unusual activity affecting the OS, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">they can compare the current configuration to </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the baseline and make sure that nothing has been changed. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-another-hardening-ta"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Another hardening task performed regularly is" class="rc-Phrase css-ugczj4" data-cue="68" data-cue-index="67" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Another hardening task performed regularly is </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">hardware and software disposal. </span></div><div aria-label="toggle video from Another hardening task performed regularly is" class="rc-Phrase css-ugczj4" data-cue="68" data-cue-index="67" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This ensures that all old hardware </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">is properly wiped and disposed of. </span></div><div aria-label="toggle video from Another hardening task performed regularly is" class="rc-Phrase css-ugczj4" data-cue="68" data-cue-index="67" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">It's also a good idea to delete </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">any unused software applications since </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">some popular programming languages </span></div><div aria-label="toggle video from have known vulnerabilities." class="rc-Phrase css-ugczj4" data-cue="75" data-cue-index="74" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">have known vulnerabilities. </span></div><div aria-label="toggle video from Removing unused software makes sure that there aren't" class="rc-Phrase css-ugczj4" data-cue="76" data-cue-index="75" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Removing unused software makes sure that there aren't </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">any unnecessary vulnerabilities connected </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">with the programs that the software uses. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--3"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-the-final-os-hardeni"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from The final OS hardening technique that we'll" class="rc-Phrase css-ugczj4" data-cue="79" data-cue-index="78" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The final OS hardening technique that we'll </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">discuss is implementing a strong password policy. </span></div><div aria-label="toggle video from Strong password policies require" class="rc-Phrase css-ugczj4" data-cue="81" data-cue-index="80" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Strong password policies require </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that passwords follow specific rules. </span></div><div aria-label="toggle video from For example, an organization may set" class="rc-Phrase css-ugczj4" data-cue="83" data-cue-index="82" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">For example, an organization may set </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a password policy that requires </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a minimum of eight characters, </span></div><div aria-label="toggle video from a capital letter, a number, and a symbol." class="rc-Phrase css-ugczj4" data-cue="86" data-cue-index="85" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a capital letter, a number, and a symbol. </span></div><div aria-label="toggle video from To discourage malicious actors," class="rc-Phrase css-ugczj4" data-cue="87" data-cue-index="86" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">To discourage malicious actors, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a password policy usually </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">states that a user will lose access to </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the network after entering </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the wrong password a certain number of times in a row. </span></div><div aria-label="toggle video from Some systems also require" class="rc-Phrase css-ugczj4" data-cue="92" data-cue-index="91" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Some systems also require </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">multi-factor authentication, or MFA. </span></div><div aria-label="toggle video from Some systems also require" class="rc-Phrase css-ugczj4" data-cue="92" data-cue-index="91" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">MFA is a security measure </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">which requires a user to verify their identity in </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">two or more ways to access a system or network. </span></div><div aria-label="toggle video from Ways of identifying yourself include" class="rc-Phrase css-ugczj4" data-cue="97" data-cue-index="96" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Ways of identifying yourself include </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">something you know, like a password, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">something you have like an ID card, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">or something unique about you, like your fingerprint. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--4"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-to-review%2C-os-harden"><div aria-label="toggle video from To review, OS hardening is a set of procedures that" class="rc-Phrase css-ugczj4" data-cue="101" data-cue-index="100" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">To review, OS hardening is a set of procedures that </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">maintains OS security and improves it. </span></div><div aria-label="toggle video from To review, OS hardening is a set of procedures that" class="rc-Phrase css-ugczj4" data-cue="101" data-cue-index="100" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Security measures like </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">access privileges and password policies </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">frequently undergo regular security checks </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">as part of OS hardening. </span></div><div aria-label="toggle video from Coming up, we'll discuss network hardening practices." class="rc-Phrase css-ugczj4" data-cue="107" data-cue-index="106" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Coming up, we'll discuss network hardening practices. </span></div></div>

# Brute force attacks and OS hardening

In this reading, you’ll learn about brute force attacks. You’ll consider how vulnerabilities can be assessed using virtual machines and sandboxes, and learn ways to prevent brute force attacks using a combination of authentication measures. Implementing various OS hardening tasks can help prevent brute force attacks. An attacker can use a brute force attack to gain access and compromise a network.

Usernames and passwords are among the most common and important security controls in place today. They are used and enforced on everything that stores or accesses sensitive or private information, like personal phones, computers, and restricted applications within an organization. However, a major issue with relying on login credentials as a critical line of defense is that they’re vulnerable to being stolen and guessed by malicious actors.

## Brute force attacks

A **brute force attack** is a trial-and-error process of discovering private information. There are different types of brute force attacks that malicious actors use to guess passwords, including:

<div class="css-jgflq0" id="bkmrk-simple-brute-force-a"><div><div class="rc-CML" dir="auto"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer">- *Simple brute force attacks.* When attackers try to guess a user's login credentials, it’s considered a simple brute force attack. They might do this by entering any combination of usernames and passwords that they can think of until they find the one that works.
- *Dictionary attacks* use a similar technique. In dictionary attacks, attackers use a list of commonly used passwords and stolen credentials from previous breaches to access a system. These are called “dictionary” attacks because attackers originally used a list of words from the dictionary to guess the passwords, before complex password rules became a common security practice.

</div></div></div></div></div></div></div>Using brute force to access a system can be a tedious and time consuming process, especially when it’s done manually. There are a range of tools attackers use to conduct their attacks.

## Assessing vulnerabilities

Before a brute force attack or other cybersecurity incident occurs, companies can run a series of tests on their network or web applications to assess vulnerabilities. Analysts can use virtual machines and sandboxes to test suspicious files, check for vulnerabilities before an event occurs, or to simulate a cybersecurity incident.

### **Virtual machines (VMs)**

Virtual machines (VMs) are software versions of physical computers. VMs provide an additional layer of security for an organization because they can be used to run code in an isolated environment, preventing malicious code from affecting the rest of the computer or system. VMs can also be deleted and replaced by a pristine image after testing malware.

VMs are useful when investigating potentially infected machines or running malware in a constrained environment. Using a VM may prevent damage to your system in the event its tools are used improperly. VMs also give you the ability to revert to a previous state. However, there are still some risks involved with VMs. There’s still a small risk that a malicious program can escape virtualization and access the host machine.

You can test and explore applications easily with VMs, and it’s easy to switch between different VMs from your computer. This can also help in streamlining many security tasks.

### **Sandbox environments**

A sandbox is a type of testing environment that allows you to execute software or programs separate from your network. They are commonly used for testing patches, identifying and addressing bugs, or detecting cybersecurity vulnerabilities. Sandboxes can also be used to evaluate suspicious software, evaluate files containing malicious code, and simulate attack scenarios.

Sandboxes can be stand-alone physical computers that are not connected to a network; however, it is often more time- and cost-effective to use software or cloud-based virtual machines as sandbox environments. Note that some malware authors know how to write code to detect if the malware is executed in a VM or sandbox environment. Attackers can program their malware to behave as harmless software when run inside these types of testing environments.

## Prevention measures

Some common measures organizations use to prevent brute force attacks and similar attacks from occurring include:

<div class="css-jgflq0" id="bkmrk-salting-and-hashing%3A"><div><div class="rc-CML" dir="auto"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer">- **Salting and hashing:** Hashing converts information into a unique value that can then be used to determine its integrity. It is a one-way function, meaning it is impossible to decrypt and obtain the original text. Salting adds random characters to hashed passwords. This increases the length and complexity of hash values, making them more secure.
- **Multi-factor authentication (MFA) and two-factor authentication (2FA):** MFA is a security measure which requires a user to verify their identity in two or more ways to access a system or network. This verification happens using a combination of authentication factors: a username and password, fingerprints, facial recognition, or a one-time password (OTP) sent to a phone number or email. 2FA is similar to MFA, except it uses only two forms of verification.
- **CAPTCHA and reCAPTCHA:** CAPTCHA stands for Completely Automated Public Turing test to tell Computers and Humans Apart. It asks users to complete a simple test that proves they are human. This helps prevent software from trying to brute force a password. reCAPTCHA is a free CAPTCHA service from Google that helps protect websites from bots and malicious software.
- **Password policies:** Organizations use password policies to standardize good password practices throughout the business. Policies can include guidelines on how complex a password should be, how often users need to update passwords, and if there are limits to how many times a user can attempt to log in before their account is suspended.

</div></div></div></div></div></div></div>## Key takeaways

Brute force attacks are a trial-and-error process of guessing passwords. Attacks can be launched manually or through software tools. Methods include simple brute force attacks and dictionary attacks. To protect against brute force attacks, cybersecurity analysts can use sandboxes to test suspicious files, check for vulnerabilities, or to simulate real attacks and virtual machines to conduct vulnerability tests. Some common measures to prevent brute force attacks include: hashing and salting, MFA and/or 2FA, CAPTCHA and reCAPTCHA, and password policies.

# Network hardening practices

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-earlier%2C-you-learned"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Earlier, you learned that OS hardening focuses" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Earlier, you learned that OS hardening focuses </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">on device safety and uses patch updates, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">secure configuration, and account access policies. </span></div><div aria-label="toggle video from Now we'll focus on network hardening." class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Now we'll focus on network hardening. </span></div><div aria-label="toggle video from Network hardening focuses" class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Network hardening focuses </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">on network-related security hardening, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">like port filtering, network access privileges, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and encryption over networks. </span></div><div aria-label="toggle video from Certain network hardening tasks are performed regularly," class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Certain network hardening tasks are performed regularly, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">while others are performed </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">once and then updated as needed. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-some-tasks-that-are-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Some tasks that are regularly" class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Some tasks that are regularly </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">performed are firewall rules maintenance, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">network log analysis, patch updates, and server backups. </span></div><div aria-label="toggle video from Earlier, you learned that a log is a record of" class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Earlier, you learned that a log is a record of </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">events that occurs within an organization's systems. </span></div><div aria-label="toggle video from Network log analysis is the process of" class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Network log analysis is the process of </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">examining network logs to identify events of interest. </span></div><div aria-label="toggle video from Security teams use a log analyzer tool" class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Security teams use a log analyzer tool </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">or a security information and event management tool, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">also known as a SIEM, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">to conduct network log analysis. </span></div><div aria-label="toggle video from A SIEM tool is an application that collects and analyzes" class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A SIEM tool is an application that collects and analyzes </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">log data to monitor </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">critical activities in an organization. </span></div><div aria-label="toggle video from It gathers security data from a network and" class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">It gathers security data from a network and </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">presents that data on a single dashboard. </span></div><div aria-label="toggle video from It gathers security data from a network and" class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The dashboard interface is sometimes </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">called a single pane of glass. </span></div><div aria-label="toggle video from A SIEM helps analysts to inspect, analyze," class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A SIEM helps analysts to inspect, analyze, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and react to security events </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">across the network based on their priority. </span></div><div aria-label="toggle video from Reports from the SIEM provide a list of" class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Reports from the SIEM provide a list of </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">new or ongoing network vulnerabilities </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and list them on a scale </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">of priority from high to </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">low, where high priority vulnerabilities </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">have a much shorter deadline for mitigation. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--1"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-now-that-we%27ve-cover"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Now that we've covered tasks" class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Now that we've covered tasks </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that are performed regularly, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">let's examine tasks that are performed once. </span></div><div aria-label="toggle video from These tasks include port filtering on firewalls," class="rc-Phrase css-ugczj4" data-cue="42" data-cue-index="41" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">These tasks include port filtering on firewalls, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">network access privileges, and </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">encryption for communication, among many things. </span></div><div aria-label="toggle video from Let's start with port filtering." class="rc-Phrase css-ugczj4" data-cue="45" data-cue-index="44" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's start with port filtering. </span></div><div aria-label="toggle video from Port filtering can be formed over the network." class="rc-Phrase css-ugczj4" data-cue="46" data-cue-index="45" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Port filtering can be formed over the network. </span></div><div aria-label="toggle video from Port filtering is a firewall function that blocks or" class="rc-Phrase css-ugczj4" data-cue="47" data-cue-index="46" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Port filtering is a firewall function that blocks or </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">allows certain port numbers </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">to limit unwanted communication. </span></div><div aria-label="toggle video from A basic principle is that" class="rc-Phrase css-ugczj4" data-cue="50" data-cue-index="49" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A basic principle is that </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the only ports that are </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">needed are the ones that are allowed. </span></div><div aria-label="toggle video from A basic principle is that" class="rc-Phrase css-ugczj4" data-cue="50" data-cue-index="49" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Any port that isn't being used by </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the normal network operations should be disallowed. </span></div><div aria-label="toggle video from This protects against port vulnerabilities." class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This protects against port vulnerabilities. </span></div><div aria-label="toggle video from Networks should be set up with" class="rc-Phrase css-ugczj4" data-cue="56" data-cue-index="55" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Networks should be set up with </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the most up-to-date wireless protocols </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">available and </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">older wireless protocols should be disabled. </span></div><div aria-label="toggle video from Security analysts also use" class="rc-Phrase css-ugczj4" data-cue="60" data-cue-index="59" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Security analysts also use </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">network segmentation to create </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">isolated subnets for </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">different departments in an organization. </span></div><div aria-label="toggle video from For example, they might make one for" class="rc-Phrase css-ugczj4" data-cue="64" data-cue-index="63" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">For example, they might make one for </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the marketing department and </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">one for the finance department. </span></div><div aria-label="toggle video from This is done so the issues in" class="rc-Phrase css-ugczj4" data-cue="67" data-cue-index="66" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This is done so the issues in </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">each subnet don't spread across the whole company and </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">only specified users are given access to </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the part of the network that they require for their role. </span></div><div aria-label="toggle video from Network segmentation may also be used" class="rc-Phrase css-ugczj4" data-cue="71" data-cue-index="70" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Network segmentation may also be used </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">to separate different security zones. </span></div><div aria-label="toggle video from Any restricted zone on a network containing" class="rc-Phrase css-ugczj4" data-cue="73" data-cue-index="72" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Any restricted zone on a network containing </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">highly classified or confidential data </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">should be separate from the rest of the network. </span></div><div aria-label="toggle video from Any restricted zone on a network containing" class="rc-Phrase css-ugczj4" data-cue="73" data-cue-index="72" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Lastly, all network communication should be </span></div><div aria-label="toggle video from encrypted using the latest encryption standards." class="rc-Phrase css-ugczj4" data-cue="77" data-cue-index="76" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">encrypted using the latest encryption standards. </span></div><div aria-label="toggle video from Encryption standards are rules or methods used to" class="rc-Phrase css-ugczj4" data-cue="78" data-cue-index="77" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Encryption standards are rules or methods used to </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">conceal outgoing data and </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">uncover or decrypt incoming data. </span></div><div aria-label="toggle video from Data in restricted zones should" class="rc-Phrase css-ugczj4" data-cue="81" data-cue-index="80" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Data in restricted zones should </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">have much higher encryption standards, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">which makes them more difficult to access. </span></div><div aria-label="toggle video from which makes them more difficult to access." class="rc-Phrase css-ugczj4" data-cue="83" data-cue-index="82" role="button" tabindex="0"></div></div></div></div><div class="phrases" id="bkmrk-you%27ve-learned-about"><div aria-label="toggle video from You've learned about the most common hardening practices." class="rc-Phrase css-ugczj4" data-cue="84" data-cue-index="83" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">You've learned about the most common hardening practices. </span></div><div aria-label="toggle video from This knowledge will be useful as you complete" class="rc-Phrase css-ugczj4" data-cue="85" data-cue-index="84" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This knowledge will be useful as you complete </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the certificate program and it's </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">essential to your career as a security analyst. </span></div></div>

# Network security applications

This section of the course covers the topic of network hardening and monitoring. Each device, tool, or security strategy put in place by security analysts further protects—or hardens—the network until the network owner is satisfied with the level of security. This approach of adding layers of security to a network is referred to as defense in depth.

In this reading, you are going to learn about the role of four devices used to secure a network—firewalls, intrusion detection systems, intrusion prevention systems, and security incident and event management tools. Network security professionals have the choice to use any or all of these devices and tools depending on the level of security that they hope to achieve.

This reading will discuss the benefits of layered security. Each tool mentioned is an additional layer of defense that can incrementally harden a network, starting with the minimum level of security (provided by just a firewall), to the highest level of security (provided by combining a firewall, an intrusion detection and prevention device, and security event monitoring).

<div class="rc-CML" dir="auto" id="bkmrk-"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer"><div><figure contenteditable="false" role="figure">![An image showing the differences between a firewall, IPS, and IDS.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/4ENRXSswQSOsOrKt9KyG6A_06fe04a8d10846ba811fe89a969642f1_CS_R-055_Firewall-IDS-and-IPS.png?expiry=1688515200000&hmac=KZ9paHnlkEH_mrCOrvOnaG3JY3NECOgfDT6mRKV35NI)</figure></div></div></div></div></div></div>Take note of where each tool is located on the network. Each tool has its own place in the network’s architecture. Security analysts are required to understand the network topologies shown in the diagrams throughout this reading.

## Firewall

So far in this course, you learned about stateless firewalls, stateful firewalls, and next-generation firewalls (NGFWs), and the security advantages of each of them.

Most firewalls are similar in their basic functions. Firewalls allow or block traffic based on a set of rules. As data packets enter a network, the packet header is inspected and allowed or denied based on its port number. NGFWs are also able to inspect packet payloads. Each system should have its own firewall, regardless of the network firewall.

<div class="rc-CML" dir="auto" id="bkmrk--1"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer"><div><figure contenteditable="false" role="figure">![A firewall circled by dashes, protecting the internal network from internet traffic that comes in through the mode.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/dSLcIcXBSw-kw-9kzEwhAw_284c8540dab14a9e911296471c71d2f1_CS_R-055_Firewall.png?expiry=1688515200000&hmac=xL2jtZzaVbs_85VeYYEsfqEb3FSr8-LKOztKwacu2gY)</figure></div></div></div></div></div></div>## Intrusion Detection System

An **intrusion detection system** (IDS) is an application that monitors system activity and alerts on possible intrusions. An IDS alerts administrators based on the signature of malicious traffic.

The IDS is configured to detect known attacks. IDS systems often sniff data packets as they move across the network and analyze them for the characteristics of known attacks. Some IDS systems review not only for signatures of known attacks, but also for anomalies that could be the sign of malicious activity. When the IDS discovers an anomaly, it sends an alert to the network administrator who can then investigate further.

The limitations to IDS systems are that they can only scan for known attacks or obvious anomalies. New and sophisticated attacks might not be caught. The other limitation is that the IDS doesn’t actually stop the incoming traffic if it detects something awry. It’s up to the network administrator to catch the malicious activity before it does anything damaging to the network.

<div class="rc-CML" dir="auto" id="bkmrk--2"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer"><div><figure contenteditable="false" role="figure">![An IDS circled above an image of a switch, which rests between a firewall and the network.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/5hPelJ74TwaKusUY4ZEkkQ_bcd56306ce904397a352cfe37e28b6f1_CS_R-055_IDS.png?expiry=1688515200000&hmac=hLXiCBKbq4PntTA-Z5YyH8rOsFKGqlX7yfpznLlTfB8)</figure></div></div></div></div></div></div>When combined with a firewall, an IDS adds another layer of defense. The IDS is placed behind the firewall and before entering the LAN, which allows the IDS to analyze data streams after network traffic that is disallowed by the firewall has been filtered out. This is done to reduce noise in IDS alerts, also referred to as false positives.

## Intrusion Prevention System

An **intrusion prevention system (IPS)** is an application that monitors system activity for intrusive activity and takes action to stop the activity. It offers even more protection than an IDS because it actively stops anomalies when they are detected, unlike the IDS that simply reports the anomaly to a network administrator.

An IPS searches for signatures of known attacks and data anomalies. An IPS reports the anomaly to security analysts and blocks a specific sender or drops network packets that seem suspect.

<div class="rc-CML" dir="auto" id="bkmrk--3"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer"><div><figure contenteditable="false" role="figure">![An IPS is situated between a firewall and the internal network.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/sp1NiS2HR3KoLCBP36lq3g_f612a9b5e6cc47b2a9341208200b3ff1_CS_R-055_IPS.png?expiry=1688515200000&hmac=QJLIFnhC4mXDWcmPES8VjFeg_ufO39Ixa8gwdtKyr_g)</figure></div></div></div></div></div></div>The IPS (like an IDS) sits behind the firewall in the network architecture. This offers a high level of security because risky data streams are disrupted before they even reach sensitive parts of the network. However, one potential limitation is that it is inline: If it breaks, the connection between the private network and the internet breaks. Another limitation of IPS is the possibility of false positives, which can result in legitimate traffic getting dropped.

## Full packet capture devices

Full packet capture devices can be incredibly useful for network administrators and security professionals. These devices allow you to record and analyze all of the data that is transmitted over your network. They also aid in investigating alerts created by an IDS.

## Security Information and Event Management

A **security information and event management system (SIEM)** is an application that collects and analyzes log data to monitor critical activities in an organization. SIEM tools work in real time to report suspicious activity in a centralized dashboard. SIEM tools additionally analyze network log data sourced from IDSs, IPSs, firewalls, VPNs, proxies, and DNS logs. SIEM tools are a way to aggregate security event data so that it all appears in one place for security analysts to analyze. This is referred to as a single pane of glass.

Below, you can review an example of a dashboard from Google Cloud’s SIEM tool, Chronicle. **Chronicle** is a cloud-native tool designed to retain, analyze, and search data.

<div class="rc-CML" dir="auto" id="bkmrk--4"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer"><div><figure contenteditable="false" role="figure">![Image of the Chronicle dashboard](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/sTtz1jL8QzCTVyhfvICu1A_ee623d56206843d6823598a8f0e70ef1_eyi2ksdTfw4mJcwZ6NvBKQBg-7CVFr-2tq8qNBLlVbloMUlJsvGdPwkSGEk-5VnBU3eXxe9dF7mGPjvyN2T3nWNKtXtu19K2Ycnbt_rEE5FAE4rbNvixbF_oeU82PyiZWpEVVoTqMf6eQJWl7uRMQyvIWA94vNp88ew46W52Kh7QkFeihWUfB8cQkB5dI5c?expiry=1688515200000&hmac=o0OzpCnZFRM68zzYEnI0Zoz1V2DGejD8dH7BimbXHa4)</figure></div></div></div></div></div></div>**Splunk** is another common SIEM tool. Splunk offers different SIEM tool options: Splunk Enterprise and Splunk Cloud. Both options include detailed dashboards which help security professionals to review and analyze an organization's data. There are also other similar SIEM tools available, and it's important for security professionals to research the different tools to determine which one is most beneficial to the organization.

A SIEM tool doesn’t replace the expertise of security analysts, or of the network- and system-hardening activities covered in this course, but they’re used in combination with other security methods. Security analysts often work in a Security Operations Center (SOC) where they can monitor the activity across the network. They can then use their expertise and experience to determine how to respond to the information on the dashboard and decide when the events meet the criteria to be escalated to oversight.

## Key takeaways

<div class="rc-CML" dir="auto" id="bkmrk-devices-%2F-tools-adva"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer"><div class="css-1yr0py9"><table><thead><tr><th scope="col">**Devices / Tools**

</th><th scope="col">**Advantages**

</th><th scope="col">**Disadvantages**

</th></tr></thead><tbody><tr><td>Firewall

</td><td>A firewall allows or blocks traffic based on a set of rules.

</td><td>A firewall is only able to filter packets based on information provided in the header of the packets.

</td></tr><tr><td>Intrusion Detection System (IDS)

</td><td>An IDS detects and alerts admins about possible intrusions, attacks, and other malicious traffic.

</td><td>An IDS can only scan for known attacks or obvious anomalies; new and sophisticated attacks might not be caught. It doesn’t actually stop the incoming traffic.

</td></tr><tr><td>Intrusion Prevention System (IPS)

</td><td>An IPS monitors system activity for intrusions and anomalies and takes action to stop them.

</td><td>An IPS is an inline appliance. If it fails, the connection between the private network and the internet breaks. It might detect false positives and block legitimate traffic.

</td></tr><tr><td>Security Information and Event Management (SIEM)

</td><td>A SIEM tool collects and analyzes log data from multiple network machines. It aggregates security events for monitoring in a central dashboard.

</td><td>A SIEM tool only reports on possible security issues. It does not take any actions to stop or prevent suspicious events.

</td></tr></tbody></table>

</div></div></div></div></div></div>Each of these devices or tools cost money to purchase, install, and maintain. An organization might need to hire additional personnel to monitor the security tools, as in the case of a SIEM. Decision-makers are tasked with selecting the appropriate level of security based on cost and risk to the organization. You will learn more about choosing levels of security later in the course.

# Kelsey: Cloud security explained

<div aria-label="toggle video from [MUSIC]" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" id="bkmrk-" role="button">  
</div><div aria-label="toggle video from I'm Kelsey, I'm a distinguished engineer at Google Cloud." class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" id="bkmrk-i%27m-kelsey%2C-i%27m-a-di" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I'm Kelsey, I'm a distinguished engineer at Google Cloud. </span></div><div aria-label="toggle video from current lecture segment: I work on compute platforms and security related topics." class="rc-Phrase active css-ugczj4" data-cue="3" data-cue-index="2" id="bkmrk-i-work-on-compute-pl" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I work on compute platforms and security related topics. </span></div><div aria-label="toggle video from When I was starting, the only jobs I had previous," class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" id="bkmrk-when-i-was-starting%2C" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">When I was starting, the only jobs I had previous, </span></div><div aria-label="toggle video from the only jobs I was confident were accessible to me were fast food jobs." class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" id="bkmrk-the-only-jobs-i-was-" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the only jobs I was confident were accessible to me were fast food jobs. </span></div><div aria-label="toggle video from I wanted a career, I wanted more than just a job." class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" id="bkmrk-i-wanted-a-career%2C-i" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I wanted a career, I wanted more than just a job. </span></div><div aria-label="toggle video from So when I zoomed out and asked myself, what were my career options?" class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" id="bkmrk-so-when-i-zoomed-out" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">So when I zoomed out and asked myself, what were my career options? </span></div><div aria-label="toggle video from I couldn't think of a better place in the year 1999 than going into the world" class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" id="bkmrk-i-couldn%27t-think-of-" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I couldn't think of a better place in the year 1999 than going into the world </span></div><div aria-label="toggle video from of technologies." class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" id="bkmrk-of-technologies." role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">of technologies. </span></div><div aria-label="toggle video from I mean, on the news people were lining up for the latest operating system." class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" id="bkmrk-i-mean%2C-on-the-news-" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I mean, on the news people were lining up for the latest operating system. </span></div><div aria-label="toggle video from All the tech people were the new rock stars." class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" id="bkmrk-all-the-tech-people-" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">All the tech people were the new rock stars. </span></div><div aria-label="toggle video from And I remember flipping through the opening jobs or" class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" id="bkmrk-and-i-remember-flipp" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">And I remember flipping through the opening jobs or </span></div><div aria-label="toggle video from the job openings in the classified section, and it said anyone that has one" class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" id="bkmrk-the-job-openings-in-" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the job openings in the classified section, and it said anyone that has one </span></div><div aria-label="toggle video from of these certifications let us know because we're hiring." class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" id="bkmrk-of-these-certificati" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">of these certifications let us know because we're hiring. </span></div><div aria-label="toggle video from The delta between getting started and" class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" id="bkmrk-the-delta-between-ge" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The delta between getting started and </span></div><div aria-label="toggle video from getting your first job into that career that I always wanted," class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" id="bkmrk-getting-your-first-j" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">getting your first job into that career that I always wanted, </span></div><div aria-label="toggle video from it was $35 away in a certification book." class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" id="bkmrk-it-was-%2435-away-in-a" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">it was $35 away in a certification book. </span></div><div aria-label="toggle video from So let's talk about Cloud." class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" id="bkmrk-so-let%27s-talk-about-" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">So let's talk about Cloud. </span></div><div aria-label="toggle video from So before the time of Cloud, most companies had their own data center." class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" id="bkmrk-so-before-the-time-o" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">So before the time of Cloud, most companies had their own data center. </span></div><div aria-label="toggle video from Imagine it's just you alone in your house, you can put anything wherever you want." class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" id="bkmrk-imagine-it%27s-just-yo" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Imagine it's just you alone in your house, you can put anything wherever you want. </span></div><div aria-label="toggle video from You may choose to never lock the doors on the inside, it's just you." class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" id="bkmrk-you-may-choose-to-ne" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">You may choose to never lock the doors on the inside, it's just you. </span></div><div aria-label="toggle video from And for a long time in our industry," class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" id="bkmrk-and-for-a-long-time-" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">And for a long time in our industry, </span></div><div aria-label="toggle video from that's the way people ran their data centers." class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" id="bkmrk-that%27s-the-way-peopl" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that's the way people ran their data centers. </span></div><div aria-label="toggle video from Now, we just call that private Cloud, it's just you there." class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" id="bkmrk-now%2C-we-just-call-th" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Now, we just call that private Cloud, it's just you there. </span></div><div aria-label="toggle video from But Cloud is public." class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" id="bkmrk-but-cloud-is-public." role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">But Cloud is public. </span></div><div aria-label="toggle video from And so the analogy would be, imagine getting roommates," class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" id="bkmrk-and-so-the-analogy-w" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">And so the analogy would be, imagine getting roommates, </span></div><div aria-label="toggle video from now you start to think differently about your stuff." class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" id="bkmrk-now-you-start-to-thi" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">now you start to think differently about your stuff. </span></div><div aria-label="toggle video from You start to lock things up even while you're inside of the house, and" class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" id="bkmrk-you-start-to-lock-th" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">You start to lock things up even while you're inside of the house, and </span></div><div aria-label="toggle video from your security discipline is going to be very different." class="rc-Phrase css-ugczj4" data-cue="29" data-cue-index="28" id="bkmrk-your-security-discip" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">your security discipline is going to be very different. </span></div><div aria-label="toggle video from As more and more companies move into Cloud." class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" id="bkmrk-as-more-and-more-com" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">As more and more companies move into Cloud. </span></div><div aria-label="toggle video from You may just be the person who can help one of those organizations finally make" class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" id="bkmrk-you-may-just-be-the-" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">You may just be the person who can help one of those organizations finally make </span></div><div aria-label="toggle video from that leap because they have a professional on their team." class="rc-Phrase css-ugczj4" data-cue="32" data-cue-index="31" id="bkmrk-that-leap-because-th" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that leap because they have a professional on their team. </span></div><div aria-label="toggle video from All right, so you've gotten the certification," class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" id="bkmrk-all-right%2C-so-you%27ve" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">All right, so you've gotten the certification, </span></div><div aria-label="toggle video from you've gotten the fundamental skills," class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" id="bkmrk-you%27ve-gotten-the-fu" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">you've gotten the fundamental skills, </span></div><div aria-label="toggle video from how do you make sure that you can actually use them in the Cloud?" class="rc-Phrase css-ugczj4" data-cue="35" data-cue-index="34" id="bkmrk-how-do-you-make-sure" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">how do you make sure that you can actually use them in the Cloud? </span></div><div aria-label="toggle video from I'm going to let you in a little secret." class="rc-Phrase css-ugczj4" data-cue="36" data-cue-index="35" id="bkmrk-i%27m-going-to-let-you" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I'm going to let you in a little secret. </span></div><div aria-label="toggle video from Go use the Cloud." class="rc-Phrase css-ugczj4" data-cue="37" data-cue-index="36" id="bkmrk-go-use-the-cloud." role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Go use the Cloud. </span></div><div aria-label="toggle video from Go take existing software, throw it in the Cloud, and" class="rc-Phrase css-ugczj4" data-cue="38" data-cue-index="37" id="bkmrk-go-take-existing-sof" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Go take existing software, throw it in the Cloud, and </span></div><div aria-label="toggle video from find all the tools that poke and prod at the thing you just got running and" class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" id="bkmrk-find-all-the-tools-t" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">find all the tools that poke and prod at the thing you just got running and </span></div><div aria-label="toggle video from it's going to tell you where you're weak." class="rc-Phrase css-ugczj4" data-cue="40" data-cue-index="39" id="bkmrk-it%27s-going-to-tell-y" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">it's going to tell you where you're weak. </span></div><div aria-label="toggle video from Learn those tools, because those are the tools that the professionals use." class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" id="bkmrk-learn-those-tools%2C-b" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Learn those tools, because those are the tools that the professionals use. </span></div><div aria-label="toggle video from Learning is a superpower." class="rc-Phrase css-ugczj4" data-cue="42" data-cue-index="41" id="bkmrk-learning-is-a-superp" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Learning is a superpower. </span></div><div aria-label="toggle video from It gives you the ability to not only get that job that you've been looking at," class="rc-Phrase css-ugczj4" data-cue="43" data-cue-index="42" id="bkmrk-it-gives-you-the-abi" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">It gives you the ability to not only get that job that you've been looking at, </span></div><div aria-label="toggle video from but it also gives you the ability to define the next one." class="rc-Phrase css-ugczj4" data-cue="44" data-cue-index="43" id="bkmrk-but-it-also-gives-yo" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">but it also gives you the ability to define the next one. </span></div>

# Security hardening Wrap-up & Glossary terms from week 4

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-great-work-on-learni"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Great work on learning about security hardening!" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Great work on learning about security hardening! </span></div><div aria-label="toggle video from Let's take a few minutes to wrap up what you've learned." class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's take a few minutes to wrap up what you've learned. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-you-learned-about-se"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from You learned about security hardening and" class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">You learned about security hardening and </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">its importance to an organization's infrastructure. </span></div><div aria-label="toggle video from First, we discussed how" class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">First, we discussed how </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">security hardening strengthens systems and </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">networks to reduce the likelihood of an attack. </span></div><div aria-label="toggle video from current lecture segment: Next, we covered the importance of OS hardening," class="rc-Phrase active css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Next, we covered the importance of OS hardening, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">including patch updates, baseline configurations, </span></div><div aria-label="toggle video from and hardware and software disposal." class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and hardware and software disposal. </span></div><div aria-label="toggle video from Then we explored network hardening practices, such as" class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Then we explored network hardening practices, such as </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">network log analysis and firewall rule maintenance. </span></div><div aria-label="toggle video from Finally, we examined cloud" class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Finally, we examined cloud </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">network hardening and the responsibilities of </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">both organizations and </span></div><div aria-label="toggle video from cloud service providers in maintaining security." class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">cloud service providers in maintaining security. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--1"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-as-a-security-analys"><div aria-label="toggle video from As a security analyst," class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">As a security analyst, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">you'll be working with operating systems, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">on-premise networks, and cloud networks. </span></div><div aria-label="toggle video from As a security analyst," class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">You'll be using all the knowledge that we learned in </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">this section in your career as a security analyst.</span></div><div aria-label="toggle video from As a security analyst," class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0">  
</div></div>#   


## **Terms and definitions from Course 3, Week 4**

**Baseline configuration (baseline image):** A documented set of specifications within a system that is used as a basis for future builds, releases, and updates

**Hardware:** The physical components of a computer

**Multi-factor authentication (MFA):** A security measure which requires a user to verify their identity in two or more ways to access a system or network

**Network log analysis:** The process of examining network logs to identify events of interest

**Operating system (OS):** The interface between computer hardware and the user

**Patch update:** A software and operating system update that addresses security vulnerabilities within a program or product

**Penetration testing (pen test):** A simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes

**Principle of least privilege:** Access and authorization to information only last long enough to complete a task

**Security hardening:** The process of strengthening a system to reduce its vulnerabilities and attack surface

**Security information and event management (SIEM):** An application that collects and analyzes log data to monitors critical activities for an organization

**World-writable file:** A file that can be altered by anyone in the world

# Cloud Hardening

## Network security in the cloud 

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-in-recent-years%2C-man"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from In recent years, many organizations are using network services in the cloud." class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">In recent years, many organizations are using network services in the cloud. </span></div><div aria-label="toggle video from So in addition to securing on-premises networks," class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">So in addition to securing on-premises networks, </span></div><div aria-label="toggle video from a security analyst will need to secure cloud networks." class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a security analyst will need to secure cloud networks. </span></div><div aria-label="toggle video from In a previous video, you learned that a cloud network is a collection of" class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">In a previous video, you learned that a cloud network is a collection of </span></div><div aria-label="toggle video from servers or computers that stores resources and" class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">servers or computers that stores resources and </span></div><div aria-label="toggle video from data in a remote data center that can be accessed via the internet." class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">data in a remote data center that can be accessed via the internet. </span></div><div aria-label="toggle video from They can host company data and applications using cloud computing to" class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">They can host company data and applications using cloud computing to </span></div><div aria-label="toggle video from provide on-demand storage, processing power, and data analytics." class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">provide on-demand storage, processing power, and data analytics. </span></div><div aria-label="toggle video from Just like regular web servers, cloud servers also require proper maintenance" class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Just like regular web servers, cloud servers also require proper maintenance </span></div><div aria-label="toggle video from done through various security hardening procedures." class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">done through various security hardening procedures. </span></div><div aria-label="toggle video from Although cloud servers are hosted by a cloud service provider," class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Although cloud servers are hosted by a cloud service provider, </span></div><div aria-label="toggle video from these providers cannot prevent intrusions in the" class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">these providers cannot prevent intrusions in the </span></div><div aria-label="toggle video from cloud—especially intrusions from malicious actors, both internal and" class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">cloud—especially intrusions from malicious actors, both internal and </span></div><div aria-label="toggle video from external to an organization." class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">external to an organization. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-one-distinction-betw"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from One distinction between cloud network hardening and" class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">One distinction between cloud network hardening and </span></div><div aria-label="toggle video from traditional network hardening is the use of a server baseline image for" class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">traditional network hardening is the use of a server baseline image for </span></div><div aria-label="toggle video from all server instances stored in the cloud." class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">all server instances stored in the cloud. </span></div><div aria-label="toggle video from This allows you to compare data in the cloud servers to the baseline image to" class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This allows you to compare data in the cloud servers to the baseline image to </span></div><div aria-label="toggle video from make sure there haven't been any unverified changes." class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">make sure there haven't been any unverified changes. </span></div><div aria-label="toggle video from An unverified change could come from an intrusion in the cloud network." class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">An unverified change could come from an intrusion in the cloud network. </span></div><div aria-label="toggle video from current lecture segment: Similar to OS hardening, data and applications on a cloud network are kept" class="rc-Phrase active css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Similar to OS hardening, data and applications on a cloud network are kept </span></div><div aria-label="toggle video from separate depending on their service category." class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">separate depending on their service category. </span></div><div aria-label="toggle video from For example, older applications should be kept separate from newer applications," class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">For example, older applications should be kept separate from newer applications, </span></div><div aria-label="toggle video from and software that deals with internal functions should be kept separate" class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and software that deals with internal functions should be kept separate </span></div><div aria-label="toggle video from from front-end applications seen by users." class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">from front-end applications seen by users. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--1"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-even-though-the-clou"><div aria-label="toggle video from Even though the cloud service provider has a shared responsibility with" class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Even though the cloud service provider has a shared responsibility with </span></div><div aria-label="toggle video from the organization using their services, there are still security measures that" class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the organization using their services, there are still security measures that </span></div><div aria-label="toggle video from need to be taken by the organization to make sure their cloud network is safe." class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">need to be taken by the organization to make sure their cloud network is safe. </span></div><div aria-label="toggle video from Just like traditional networks, operations in the cloud need to be secured." class="rc-Phrase css-ugczj4" data-cue="29" data-cue-index="28" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Just like traditional networks, operations in the cloud need to be secured. </span></div><div aria-label="toggle video from You're doing great! Meet you in the next video." class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">You're doing great! Meet you in the next video. </span></div></div>## secure the cloud  


Earlier in this course, you were introduced to [cloud computing<svg aria-labelledby="cds-react-aria-1484-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--2" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/lecture/BGlnq/cloud-networks)

**Cloud computing** is a model for allowing convenient and on-demand network access to a shared pool of configurable computing resources. These resources can be configured and released with minimal management effort or interaction with the service provider.

Just like any other IT infrastructure, a cloud infrastructure needs to be secured. This reading will address some main security considerations that are unique to the cloud and introduce you to the shared responsibility model used for security in the cloud. Many organizations that use cloud resources and infrastructure express concerns about the privacy of their data and resources. This concern is addressed through cryptography and other additional security measures, which will be discussed later in this course.

## Cloud security considerations

Many organizations choose to use cloud services because of the ease of deployment, speed of deployment, cost savings, and scalability of these options. Cloud computing presents unique security challenges that cybersecurity analysts need to be aware of.

### Identity access management

**Identity access management (IAM)** is a collection of processes and technologies that helps organizations manage digital identities in their environment. This service also authorizes how users can use different cloud resources. A common problem that organizations face when using the cloud is the loose configuration of cloud user roles. An improperly configured user role increases risk by allowing unauthorized users to have access to critical cloud operations.

### Configuration

The number of available cloud services adds complexity to the network. Each service must be carefully configured to meet security and compliance requirements. This presents a particular challenge when organizations perform an initial migration into the cloud. When this change occurs on their network, they must ensure that every process moved into the cloud has been configured correctly. If network administrators and architects are not meticulous in correctly configuring the organization’s cloud services, they could leave the network open to compromise. Misconfigured cloud services are a common source of cloud security issues.

### Attack surface 

Cloud service providers (CSPs) offer numerous applications and services for organizations at a low cost.

Every service or application on a network carries its own set of risks and vulnerabilities and increases an organization’s overall attack surface. An increased attack surface must be compensated for with increased security measures.

Cloud networks that utilize many services introduce lots of entry points into an organization’s network. However, if the network is designed correctly, utilizing several services does not introduce more entry points into an organization’s network design. These entry points can be used to introduce malware onto the network and pose other security vulnerabilities. It is important to note that CSPs often defer to more secure options, and have undergone more scrutiny than a traditional on-premises network.

### Zero-day attacks

Zero-day attacks are an important security consideration for organizations using cloud or traditional on-premise network solutions. A **zero day** attack is an exploit that was previously unknown. CSPs are more likely to know about a zero day attack occurring before a traditional IT organization does. CSPs have ways of patching hypervisors and migrating workloads to other virtual machines. These methods ensure the customers are not impacted by the attack. There are also several tools available for patching at the operating system level that organizations can use.

### Visibility and tracking 

Network administrators have access to every data packet crossing the network with both on-premise and cloud networks. They can sniff and inspect data packets to learn about network performance or to check for possible threats and attacks.

This kind of visibility is also offered in the cloud through flow logs and tools, such as packet mirroring. CSPs take responsibility for security in the cloud, but they do not allow the organizations that use their infrastructure to monitor traffic on the CSP’s servers. Many CSPs offer strong security measures to protect their infrastructure. Still, this situation might be a concern for organizations that are accustomed to having full access to their network and operations. CSPs pay for third-party audits to verify how secure a cloud network is and identify potential vulnerabilities. The audits can help organizations identify whether any vulnerabilities originate from on-premise infrastructure and if there are any compliance lapses from their CSP.

### Things change fast in the cloud

CSPs are large organizations that work hard to stay up-to-date with technology advancements. For organizations that are used to being in control of any adjustments made to their network, this can be a potential challenge to keep up with. Cloud service updates can affect security considerations for the organizations using them. For example, connection configurations might need to be changed based on the CSP’s updates.

Organizations that use CSPs usually have to update their IT processes. It is possible for organizations to continue following established best practices for changes, configurations, and other security considerations. However, an organization might have to adopt a different approach in a way that aligns with changes made by the CSP.

Cloud networking offers various options that might appear attractive to a small company—options that they could never afford to build on their own premises. However, it is important to consider that each service adds complexity to the security profile of the organization, and they will need security personnel to monitor all of the cloud services.

## Shared responsibility model

A commonly accepted cloud security principle is the shared responsibility model. The **shared responsibility model** states that the CSP must take responsibility for security involving the cloud infrastructure, including physical data centers, hypervisors, and host operating systems. The company using the cloud service is responsible for the assets and processes that they store or operate in the cloud.

The shared responsibility model ensures that both the CSP and the users agree about where their responsibility for security begins and ends. A problem occurs when organizations assume that the CSP is taking care of security that they have not taken responsibility for. One example of this is cloud applications and configurations. The CSP takes responsibility for securing the cloud, but it is the organization’s responsibility to ensure that services are configured properly according to the security requirements of their organization.

## Key takeaways

It is essential to know the security considerations that are unique to the cloud and understanding the shared responsibility model for cloud security. Organizations are responsible for correctly configuring and maintaining best security practices for their cloud services. The shared responsibility model ensures that both the CSP and users agree about what the organization is responsible for and what the CSP is responsible for when securing the cloud infrastructure.