Security Hardening Precautions
The security hardening measures listed in this document are basic security hardening suggestions. You need to review the network security hardening measures of the entire system based on your services. You should perform related configurations according to the security policies of your organization, including but not limited to software versions, password complexity requirements, security configurations (protocols, cipher suites, and key lengths), permission configurations, and firewall settings. If necessary, refer to excellent hardening solutions in the industry and suggestions from security experts.
Security hardening involves host hardening and containers hardening to prevent potential security risks and ensure the security of devices and containers. Perform security hardening according to the actual situations.
The software code or programs downloaded from external sources may have risks. You must ensure the security of their functions yourself.