Operating System Hardening
This page provides a template and guidance to assist organisations in documenting their approach to operating system hardening associated with their system(s) built on ASD's Blueprint for Secure Cloud.
Estimated reading time: 5 minutes
Instruction
The operating system hardening section of a System Security Plan (SSP) should document an organisation’s approach to hardening operating systems using vendor and ASD guidance. As with other sections of the SSP, information in the operating system hardening section should be documented according to the relevant controls outlined in ASD’s ISM and the SSP Annex.
All template text refers to a typical implementation of a system built using the Blueprint, and includes reference to organisational policies, processes and technical configurations to be implemented in addition to the technical controls that may be configured using guidance in the Blueprint. Any implementation implied by the below should not be considered as prescriptive as to how organisations must scope, build, document, or assess a system.
When completing the below template, organisations should insert and update information where relevant to ensure it accurately represents their approach to operating system hardening. When complete, remove any instructional boxes throughout.
Due to the number of applicable controls in ASD’s Guidelines for System Hardening, guidance on system hardening has been split into its five sections for the purpose of this SSP. The following controls have been grouped by equipment types and as as they relate to hardening of operating systems within <SYSTEM-NAME>
.
Operating system selection, versions, releases and SOEs
Applicability
ISM controls relating to the operating system selection, releases and versions and standard operating environments (SOE) within <SYSTEM-NAME>
’s system boundary are applicable to and covered by this section of the SSP.
<INSERT ADDITIONAL INFORMATION AS APPROPRIATE>
Organisational policies and processes implemented
All vendors of operating systems used within <SYSTEM-NAME>
have been assessed by <ORGANISATION-NAME>
as demonstrating a commitment to secure-by-design and secure-by-default principles, use of memory-safe programming languages where possible, secure programming practices, and maintaining the security of their products.
<ORGANISATION-NAME>
Vendor Assessment: Microsoft<ORGANISATION-NAME>
Vendor Assessment: Apple<ORGANISATION-NAME>
Vendor Assessment:<VENDOR-3>
<SYSTEM-NAME>
uses Microsoft Intune for the enrolment and configuration of endpoints (including Windows 10, 11 and iOS endpoints), that serve as the SOE for <SYSTEM-NAME>
.
<INSERT ADDITIONAL INFORMATION AS APPROPRIATE>
Technical controls implemented
Technical controls for operating system hardening and SOEs within <SYSTEM-NAME>
were configured with reference to ASD’s Blueprint for Secure Cloud, and applied by <ORGANISATION-NAME>
with regard to any malicious configurations that may have been injected. These controls will continue to be reviewed on an ongoing basis, with regard to the Blueprint and consideration of any malicious configurations that could be injected.
Operating systems used within <SYSTEM-NAME>
’s system boundary, along with their releases and versions, are listed in the Operating System Releases table below. All versions used are 64-bit and are of either the latest or N-1 releases. Windows endpoints are configured via Intune to use Microsoft’s General Availability Channel.
Component | Vendor | Operating System | Release | Version |
---|---|---|---|---|
Endpoints | Microsoft | Windows | 22H2 (Windows 10) | 64-bit |
23H2 (Windows 11) | (N/A: 64-bit only) | |||
Mobile Devices | Apple | iOS | 16 | (N/A: 64-bit only) |
17 | (N/A: 64-bit only) | |||
<ON-PREM SERVERS> | Microsoft | <WINDOWS SERVER> | <2022> | (N/A: 64-bit only) |
<ON-PREM SERVERS> | <VENDOR> | <LINUX DISTRO> | <RELEASE> | <64-BIT> |
<INSERT ADDITIONAL INFORMATION AS APPROPRIATE>
Hardening Windows endpoints
Applicability
This section of the SSP covers the following control topics within ASD’s ISM’s Operating System Hardening section, as they apply to all endpoints and servers within <SYSTEM-NAME>
:
- Hardening operating system configurations
- Application management
- Application control
- Command Shell
- PowerShell
- Host-based Intrusion Prevention System
- Software firewall
- Antivirus software
- Device Access
Organisational policies and processes implemented
<ORGANISATION-NAME>
has not implemented any specific organisational policies or processes related to hardening operating system configurations for <SYSTEM-NAME>
beyond ensuring implementation of the below technical controls as part of this System Security Plan, and reviewing all below configurations on an annual or more frequent basis.
<INSERT ADDITIONAL INFORMATION AS APPROPRIATE>
Technical controls implemented
<ORGANISATION-NAME>
has not implemented any specific organisational policies or processes relating to hardening operating systems within <SYSTEM-NAME>
beyond ensuring implementation of the below technical controls as part of this SSP and reviewing the below configurations on at least an annual basis (if not more frequently).
<INSERT ADDITIONAL INFORMATION AS APPROPRIATE>
Hardening server operating systems
Blueprint guidance
While the Blueprint does provide guidance on hardening operating systems for servers, the section below is provided for organisations to describe their implementation of hardening of operating systems for servers where it is included within the authorisation boundary for system(s) built using the Blueprint, noting that hardening of operating systems for servers is often completed as part of a separate system and SSP specific to those servers.
Where an organisation appropriately assesses this within another document, it may choose to remove its implementation and assessment from this SSP. However, it is recommended that organisations consider also documenting their approach to hardening operating systems for servers here for a holistic capture of a system’s context and associated risk.
Applicability
<INSERT ADDITIONAL INFORMATION AS APPROPRIATE>
Organisational policies and processes implemented
<INSERT ADDITIONAL INFORMATION AS APPROPRIATE>
Technical controls implemented
<INSERT ADDITIONAL INFORMATION AS APPROPRIATE>
Related information
Security & Governance
<ORGANISATION-NAME>
Vendor Assessment: Microsoft<ORGANISATION-NAME>
Vendor Assessment: Apple<ORGANISATION-NAME>
Vendor Assessment: <VENDOR-3>- Essential Eight: Patch Applications
- Essential Eight: Patch Operating Systems
Design
- Windows Hardening
- Microsoft Defender
- Windows Hardware Requirements
- Operating System
- Windows Update and Patching
- iOS devices
- Endpoint Device Updates
Configuration
External documentation
- ASD’s Guidelines for System Hardening
- ASD’s Hardening Microsoft Windows 10 version 21H1 Workstations
- Apple iOS 16: iPhones Common Criteria Configuration Guide
- Apple Platform Security
- Microsoft’s recommended block rules
- Microsoft’s recommended driver block rules
- ASD’s Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Security-by-Design and Default
- ASD’s The Case for Memory Safe Roadmaps