However, retrieving and querying data in more decentralized environments requires fundamentally different approaches, whose properties are not yet well understood. The societal and economical consequences surrounding Big Data-driven platforms have increased the call for decentralized solutions. This will help secure enterprise systems at the front-end in addition to the network perimeter. We hope that system administrators use this guide to jump-start an enterprise-wide strategy for implementing high-granularity and least privilege browser hardening. In this article, we present detailed steps for remotely hardening multiple web browsers in a Windows-based enterprise, for Internet Explorer and Google Chrome. However, most organizations, today, still allow web browsers to run with their default configurations and allow users to use the same browser to connect to trusted and un-trusted sites alike. For example, on a classic client desktop infrastructure, an enforced configuration that enables users to use one browser to connect to critical and trusted websites and a different browser for un-trusted sites, with the former restricted to trusted sites and the latter with JavaScript and Plugins disabled by default, may help prevent most JavaScript and Plugin-based attacks to critical enterprise sites. Web browser hardening, through high-granularity and least privilege tailored configurations, can help prevent or mitigate many of these attack avenues. Today, web browsers are a major avenue for cyber-compromise and data breaches.
0 Comments
Leave a Reply. |