Esc
Credential Hardening
Definition
Credential Hardening techniques modify system or network properties in order to protect system or network/domain credentials.
loading...
Technique Subclasses
There are 8 techniques in this category, Credential Hardening.
Name | ID | Definition | Synonyms |
---|---|---|---|
Credential Hardening | D3-CH | Credential Hardening techniques modify system or network properties in order to protect system or network/domain credentials. | |
- Credential Rotation | D3-CRO | Credential rotation is a security procedure in which authentication credentials, such as passwords, API keys, or certificates, are regularly changed or replaced to minimize the risk of unauthorized access. | |
- Strong Password Policy | D3-SPP | Modifying system configuration to increase password strength. | |
- One-time Password | D3-OTP | A one-time password is valid for only one user authentication. | OTP |
- Token Binding | D3-TB | Token binding is a security mechanism used to enhance the protection of tokens, such as cookies or OAuth tokens, by binding them to a specific connection. | |
- Certificate Rotation | D3-CERO | Certificate rotation involves replacing digital certificates and their private keys to maintain cryptographic integrity and trust, mitigating key compromise risks and ensuring continuous secure communications. | |
- Password Rotation | D3-PR | Password rotation is a security policy that mandates the periodic change of user account passwords to mitigate the risk of unauthorized access due to compromised credentials. | |
- Certificate Pinning | D3-CP | Persisting either a server's X.509 certificate or their public key and comparing that to server's presented identity to allow for greater client confidence in the remote server's identity for SSL connections. |
loading...
D3FEND™
A knowledge graph of cybersecurity countermeasures