Application Configuration Hardening
Definition
Modifying an application's configuration to reduce its attack surface.
How it works
Application configuration settings can be configured to limit the permissions on an application or disable certain vulnerable application features.
Hardening an application's configuration involves analyzing not only the application but also the environment in which the application is run in for potential vulnerabilities.
Artifact Relationships:
This defensive technique is related to specific artifacts. Click the artifact node for more information.
Technique Subclasses
There are 2 techniques in this category, Application Configuration Hardening.
| Name | ID | Definition | Synonyms |
|---|---|---|---|
| Application Configuration Hardening | D3-ACH | Modifying an application's configuration to reduce its attack surface. | |
| - Disable Remote Access | D3-DRA | Limiting access to a computing device which is not required through or from a non-organization-controlled network. |
References
The following references were used to develop the Application Configuration Hardening knowledge-base article.
(Note: the consideration of references does not imply specific functionality exists in an offering.)