System Hardening controls are implemented when an application, database, server or other system comes out of the box to ensure the system is secure. Most systems come with delivered content or existing vulnerabilities that are widely known and require ‘hardening’. This is the process of securing the system to ensure delivered, risk laden content has been appropriately mitigated.
The following Identity Governance related controls are organized by Platform. You can also “Jump To” Control Types and Categories by clicking on the link located at the right of this screen.
The following are links to more detailed pages: