Hardening
Guide
Awesome Security Hardening
https://github.com/decalage2/awesome-security-hardening
NCSC's Platform Security Guidance
Microsoft Cloud
Microsoft guide to preventing the onward compromise of cloud infrastructure following a successful on-prem attack
Incredibly useful guide to the additional Security functionality offered by the (ruinously expensive) upgrade from E3 to E5
https://frankmcg.com/2020/09/purchased-microsoft-365-e5-now-what/
Securing privileged access for hybrid and cloud deployments in Azure AD
Hardening O365
https://medium.com/falconforce/reducing-your-office365-attack-surface-1073a4d46a7b
Keep Office 365 safe from BEC when you are an SME
https://www.comae.com/posts/keep-office-365-safe-from-bec-when-you-are-an-sme/
Apple iOS
The ASD's guide to Apple iOS 14 hardening
CIS Benchmarks
You need a paid licence to use these commercially
Google Workspaces (Gsuite)
https://fleetdm.com/handbook/security#google-workspace-security
Google's guide for small and large businesses
Destructive Attacks / Wipers
Mandiant's guide to hardening against destructive attacks / wipers.
https://www.mandiant.com/resources/protect-against-destructive-attacks
Active Directory
Bloodhound maps the hidden relationships in AD and Ransomulator visualises it
https://bloodhound.readthedocs.io/en/latest/index.html
https://github.com/BloodHoundAD/BloodHound
https://github.com/zeronetworks/BloodHound-Tools/tree/main/Ransomulator
Network
NSA / CISA's guide to network hardening. Slightly old school and very Cisco focused so YMMV
Kubernetes
NSA / CISA's guide to Kubernetes hardening.
Exploit Mitigations
NCC's library of exploit mitigations
Github
Guide to hardening Github. Critical in many organisations' CI/CD pipelines
https://alsmola.medium.com/securing-github-organizations-9c33c850638
Windows
Microsoft's Windows Security Configuration Framework
HardeningKitty is a powershell script to harden Windows
Linux
Mandiant's guide to Linux Endpoint Hardening
https://www.mandiant.com/sites/default/files/2022-03/wp-linux-endpoint-hardening.pdf
Zero Trust
The original Google 'Beyondcorp' paper
https://research.google/pubs/pub43231/
NSA's paper "Embracing a Zero Trust Security Model"
Microsoft's view on Zero Trust