Operating Security Hardening
Install and patch the operating system
• Harden and configure the operating system to adequately address the identified security needs of the system by:
▪ Removing unnecessary services, applications, and protocols
▪ Configuring users, groups, and permissions
▪ Configuring resource controls
• Install and configure additional security controls, such as anti-virus, host-based firewalls, and intrusion detection system (IDS)
• Test the security of the basic operating system to ensure that the steps taken adequately address its security needs