Esc
Application Configuration Hardening
Definition
Modifying an application's configuration to reduce its attack surface.
How it works
Application configuration settings can be configured to limit the permissions on an application or disable certain vulnerable application features.
Hardening an application's configuration involves analyzing not only the application but also the environment in which the application is run in for potential vulnerabilities.
loading...
Technique Subclasses
There are 2 techniques in this category, Application Configuration Hardening.
Name | ID | Definition | Synonyms |
---|---|---|---|
Application Configuration Hardening | D3-ACH | Modifying an application's configuration to reduce its attack surface. | |
- Disable Remote Access | D3-DRA | Limiting access to a computing device which is not required through or from a non-organization-controlled network. |
loading...
References
All
Guideline
The following references were used to develop the Application Configuration Hardening knowledge-base article.
(Note: the consideration of references does not imply specific functionality exists in an offering.)
Red Hat Enterprise Linux 8 Security Technical Implementation Guide
Reference Type: Guideline
Windows 10 Security Technical Implementation Guide
Reference Type: Guideline