App Configartion Hardening
Definition
Modifying an application's configuration to reduce its attack surface.
ROS2 Example
ROS2 is insecure-by-default, it and SROS2 require extensive configuration to abide by the secure-by-default
principle. Within this project an advisory report is delivered which can be used to review what configurations
should be changed, and why. This report also contains the scripts to automate parts of this behavior.
Considerations
When modifying an application's configuration, it is imperative to approach the process with careful
consideration. Begin by thoroughly documenting the existing configuration and creating backups to facilitate a
swift rollback if necessary. Testing the proposed changes in a controlled environment is crucial to identifying
and addressing potential issues before impacting the production system. An impact analysis should be conducted
to understand how modifications may affect dependencies, security, and overall system performance. Additionally,
communication with team members, stakeholders, and end-users is essential to ensure awareness and gather
valuable input. Throughout the process, adherence to security best practices, compliance with regulations, and
attention to scalability and performance implications are paramount. Implementing automated deployment practices
can streamline the application of configuration changes, reducing the risk of human error and ensuring a
consistent and controlled process.
Related ATTACK Techniques
Modify Control Logic
References
Developing a security framework
for robots
Securing robot endpoints
in
Operation Technology (OT)
enviroments