title: "System Hardening" description: "Production hardening checklist drawn from the GuardBSD audit report."

System Hardening

Based on the GuardBSD Winter Saga v1.0.0 audit, these mitigations are active and should remain enforced.

Exploit Mitigations

| Mitigation | Status | Overhead | Effectiveness | | --------------------- | ------ | ------------ | ------------- | | Stack Canaries | ✅ | ~2 cycles | High | | ASLR (16-bit) | ✅ | one-time | Medium | | W^X Enforcement | ✅ | ~3 cycles | High | | Pointer Validation | ✅ | ~5 cycles | High | | Secure Memory Zeroing | ✅ | ~1 cycle/byte| Medium | | Rate Limiting | ✅ | ~10 cycles | Medium |

Total overhead: <5% system-wide.

Capability System Essentials

  • Unforgeable, transferable, revocable, and attenuable tokens
  • Cryptographic sealing with generation-based revocation
  • No ambient authority; principle of least privilege
# Audit running services and lock down SSH keys
service list
chmod 600 /etc/ssh/ssh_host_*

Operational Hardening

  • Keep debug symbols off production binaries (strip uk_ipc, etc.)
  • Maintain serial logging for forensics
  • Enforce firewall defaults and disable unused services
  • Snapshot before upgrades; test rollback paths