From the course: CSSLP Cert Prep: 7 Software Deployment, Operations, and Maintenance

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Ensuring secure installation

Ensuring secure installation

From the course: CSSLP Cert Prep: 7 Software Deployment, Operations, and Maintenance

Start my 1-month free trial

Ensuring secure installation

- [Narrator] With the environment hardened and the bootstrapping process secured, you should devote some time to securing the software activation process. Your secure activation processes are intended to counter the threat of a bad actor who wants to get their hands on your software. If this were to happen, you can have multiple controls at your disposal that can mitigate that threat. One of the most common controls is credentials, especially for internet facing web applications. Without a valid set of credentials, those bad actors can't log in and start poking around. A network level control you might implement is white listing. This is where you restrict who can access your app by their source IP address. If someone tries to connect to an app from an unapproved source IP, they won't even be able to get to the log in page. You can configure your software to check the configuration of the user's device before running.…

Contents