jan-karel.com
Home / Security Measures / Reference & Architecture / Hardening Checklists

Hardening Checklists

Hardening Checklists

Hardening Checklists

From Framework to Workfloor

This topic works best as a practical framework: clear enough for decision-making and concrete enough for execution.

For Hardening Checklists, applicability is central: decisions that directly translate to backlog, architecture, and operations.

This keeps this chapter from being theory, making it a usable compass for consistent execution.

Immediate measures (15 minutes)

Why this matters

The core of Hardening Checklists is risk reduction in practice. Technical context supports the choice of measures, but implementation and assurance are central.

Windows Server 2022 Hardening

Reference: Network 12 (Windows hardening), Network 04 (AD hardening)

Basic Security

Services & Features

Network & Firewall

Authentication & Credentials

Logging & Monitoring

Endpoint Protection

Ubuntu/Debian Server Hardening

Reference: Network 11 (Linux hardening)

Updates & Patch Management

SSH Hardening

Firewall & Network

User Management & Authentication

File System & Kernel

    • net.ipv4.ip_forward = 0 (unless router/gateway)
    • net.ipv4.conf.all.accept_redirects = 0
    • net.ipv4.conf.all.send_redirects = 0
    • net.ipv4.conf.all.accept_source_route = 0
    • net.ipv4.conf.all.log_martians = 1
    • kernel.randomize_va_space = 2
    • kernel.dmesg_restrict = 1
    • kernel.kptr_restrict = 2

Logging & Monitoring

Other

nginx Hardening

Reference: Web 11 (Security headers), Web 13 (TLS configuration)

TLS & Encryption

Headers & Information Leakage

    • X-Frame-Options: DENY
    • X-Content-Type-Options: nosniff
    • Referrer-Policy: strict-origin-when-cross-origin
    • Permissions-Policy: camera=(), microphone=(), geolocation=()

Access Control & Rate Limiting

Operational

Apache Hardening

Reference: Web 11 (Security headers), Web 13 (TLS configuration)

TLS & Encryption

Headers & Information Leakage

    • Header always set X-Frame-Options "DENY"
    • Header always set X-Content-Type-Options "nosniff"
    • Header always set Referrer-Policy "strict-origin-when-cross-origin"
    • Header always set Permissions-Policy "camera=(), microphone=()"

Modules & Configuration

Access Control & Limits

  • <FilesMatch "^\.(git|env|svn|htaccess|htpasswd)">
        Require all denied
    </FilesMatch>

PostgreSQL Hardening

Reference: Network 14 (MSSQL hardening – principles are equivalent for relational databases)

Authentication & Access

SSL/TLS

Roles & Permissions

Logging & Monitoring

Other

MySQL/MariaDB Hardening

Reference: Network 14 (MSSQL hardening – principles are equivalent for relational databases)

Initial & Basic Security

Network & Encryption

User Management & Permissions

Configuration & Features

Logging & Monitoring

Summary

These checklists are a starting point, not an endpoint. Every system, every environment, and every organization has its own nuances that require adjustments. But the basics — the items that appear on every checklist — should be implemented on every server. No exceptions. No "yes but that's not needed for us." No "the application breaks if we do that" without actually having tested whether the application breaks.

Use these checklists for:

  • New server provisioning – go through the relevant checklist before the system goes into production. No server should run production without this baseline.
  • Periodic audit – schedule a quarterly check and tick off again. Configuration drift is not a theoretical risk; it is a certainty. Someone added that firewall rule "temporarily." It is still there.
  • Incident response – after an incident, verify that all hardening items are still intact. Attackers disable security measures as part of their post-exploitation routine.
  • Compliance audits – use the checked-off checklists as evidence for CIS Control 4 (Secure Configuration) and ISO 27001 A.8.9 (Configuration Management).

Combine these checklists with the corresponding Securitymaatregelen.nl chapters for the underlying rationale and detailed configuration examples.

Op de hoogte blijven?

Ontvang maandelijks cybersecurity-inzichten in je inbox.

← Reference & Architecture ← Home