Cisco Blogs

Introducing the NX-OS Hardening Guide

- July 26, 2011 - 0 Comments

As the Nexus platform has become a staple in the data center environment, securing the environment begins with the Nexus Operating System (NX-OS). The recently published NX-OS hardening guide seeks to deliver on that. The Cisco NX-OS Hardening Guide provides information to help administrators and engineers secure NX-OS system devices, inherently increasing the overall security of a network environment. With the ever-increasing opportunity for exploits and vulnerabilities to prevail, it is imperative that organizations adopt and apply best practices to harden their infrastructure devices. We all know that an environment is only as strong as the weakest link, thus every effort should be made to ensure that each device is hardened.

Unique to the NX-OS hardening guide is the cross-spectrum approach predicated on the feature ubiquity and concepts inherent to the Nexus product line, such as infrastructure scalability, operational continuity, and transport flexibility. What does this mean? Merely that there are unique aspects to understanding and securely configuring, deploying and administering an NX-OS platform. With virtualization and high availability at every turn, the security principles must not only keep pace, but remain a few steps ahead!

Now that you have purchased or are contemplating the purchase of a Nexus platform, and have read through the product documentation and configuration guides regarding the extensive list of features and new concepts, now what? With so much riding on that data center, and having a Nexus at the core, hardening is not a formality, but a necessity. As with all Cisco security best practices and security centric whitepapers, your home base is the Cisco Security Intelligence Operations portal.

Cisco NX-OS Hardening Guide

Leave a comment

We'd love to hear from you! To earn points and badges for participating in the conversation, join Cisco Social Rewards. Your comment(s) will appear instantly on the live site. Spam, promotional and derogatory comments will be removed.

All comments in this blog are held for moderation. Your comment will not display until it has been approved

In an effort to keep conversations fresh, Cisco Blogs closes comments after 60 days. Please visit the Cisco Blogs hub page for the latest content.