Checklists: System is Hacked (Part 2) Preventive Steps for Infra (OS Hardening)

Introduction

In the last article, we described a list of checks which can determine if a system is compromised or hacked.  In this article, we will talk about preventive steps (especially infra-related) that can be taken care of to avoid hacking or to make the system more secure. There are many directions in which we can secure our application as follows:

  • OS Hardening (Infra Level Security).
  • Secure Coding Guidelines.
  • Encryption Of Sensitive Data.
  • Ensure No Vulnerability Exists in System.

In this blog, we will be concerned about OS hardening (Infra Level Security) in Linux systems (CentOS/Redhat). We will cover other parts in future blogs.

Checklists: System is Hacked (Part 1) Confirming a Compromise

Introduction

As in my previous blog where I explained how I came to know if my system is hacked or compromised (link here). Here in this blog, I will explain what basic things we can check on our system when we have doubt if our system is compromised.

This blog has 3 parts. In this part, we look at a list of checks which can determine if a system is compromised or hacked.

A Rapid Overview of ISA-88 and How It Aligns With ISA-95 and IIoT Platforms

ISA-88 is a long-standing standard for managing batch processes, while ISA-95 is focused on defining the progressive complexity of information that is expected to be available at each layer.

Often, interconnect between the two standard definitions and further the evolving IIOT platform definitions cause some degree of confusion as manufacturing firms grapple with defining and shaping their IT strategies and new tech/platform/apps adoption frameworks.