Hardening Checklists
From Framework to Workfloor
This topic works best as a practical framework: clear enough for decision-making and concrete enough for execution.
For Hardening Checklists, applicability is central: decisions that directly translate to backlog, architecture, and operations.
This keeps this chapter from being theory, making it a usable compass for consistent execution.
Immediate measures (15 minutes)
Why this matters
The core of Hardening Checklists is risk reduction in practice. Technical context supports the choice of measures, but implementation and assurance are central.
Windows Server 2022 Hardening
Reference: Network 12 (Windows hardening), Network 04 (AD hardening)
Basic Security
Services & Features
Network & Firewall
Authentication & Credentials
Logging & Monitoring
Endpoint Protection
Ubuntu/Debian Server Hardening
Reference: Network 11 (Linux hardening)
Updates & Patch Management
SSH Hardening
Firewall & Network
User Management & Authentication
File System & Kernel
-
net.ipv4.ip_forward = 0(unless router/gateway)net.ipv4.conf.all.accept_redirects = 0net.ipv4.conf.all.send_redirects = 0net.ipv4.conf.all.accept_source_route = 0net.ipv4.conf.all.log_martians = 1kernel.randomize_va_space = 2kernel.dmesg_restrict = 1kernel.kptr_restrict = 2
Logging & Monitoring
Other
nginx Hardening
Reference: Web 11 (Security headers), Web 13 (TLS configuration)
TLS & Encryption
Headers & Information Leakage
-
X-Frame-Options: DENYX-Content-Type-Options: nosniffReferrer-Policy: strict-origin-when-cross-originPermissions-Policy: camera=(), microphone=(), geolocation=()
Access Control & Rate Limiting
Operational
Apache Hardening
Reference: Web 11 (Security headers), Web 13 (TLS configuration)
TLS & Encryption
Headers & Information Leakage
-
Header always set X-Frame-Options "DENY"Header always set X-Content-Type-Options "nosniff"Header always set Referrer-Policy "strict-origin-when-cross-origin"Header always set Permissions-Policy "camera=(), microphone=()"
Modules & Configuration
Access Control & Limits
-
<FilesMatch "^\.(git|env|svn|htaccess|htpasswd)"> Require all denied </FilesMatch>
PostgreSQL Hardening
Reference: Network 14 (MSSQL hardening – principles are equivalent for relational databases)
Authentication & Access
SSL/TLS
Roles & Permissions
Logging & Monitoring
Other
MySQL/MariaDB Hardening
Reference: Network 14 (MSSQL hardening – principles are equivalent for relational databases)
Initial & Basic Security
Network & Encryption
User Management & Permissions
Configuration & Features
Logging & Monitoring
Summary
These checklists are a starting point, not an endpoint. Every system, every environment, and every organization has its own nuances that require adjustments. But the basics — the items that appear on every checklist — should be implemented on every server. No exceptions. No "yes but that's not needed for us." No "the application breaks if we do that" without actually having tested whether the application breaks.
Use these checklists for:
- New server provisioning – go through the relevant checklist before the system goes into production. No server should run production without this baseline.
- Periodic audit – schedule a quarterly check and tick off again. Configuration drift is not a theoretical risk; it is a certainty. Someone added that firewall rule "temporarily." It is still there.
- Incident response – after an incident, verify that all hardening items are still intact. Attackers disable security measures as part of their post-exploitation routine.
- Compliance audits – use the checked-off checklists as evidence for CIS Control 4 (Secure Configuration) and ISO 27001 A.8.9 (Configuration Management).
Combine these checklists with the corresponding Securitymaatregelen.nl chapters for the underlying rationale and detailed configuration examples.
Further reading in the knowledge base
These articles in the portal provide more background and practical context:
- Incident Response — when things go wrong
- Compliance — following rules without losing your mind
- Least Privilege — give people only what they need
- Patch management — the most boring thing that can save your life
- Backups — the most boring topic that can save your life
You need an account to access the knowledge base. Log in or register.
Related security measures
These articles provide additional context and depth: