Introduction
Even in a controlled corporate environment, internal systems are not immune to threats. Misconfigurations, outdated software, and open services can quickly become entry points for attackers — whether from inside the network or through lateral movement after a breach.
This section focuses on secure setup procedures for critical infrastructure components such as databases, web servers, and remote management tools. Each guide demonstrates how to install, harden, and verify these systems using best practices that align with corporate security standards and the ACSC Essential Eight framework.
Securing internal systems is just as important as protecting external-facing ones — strong internal security helps prevent privilege escalation, data exposure, and downtime in the event of a compromise.
Active Directory Certificate Services
Secure Active Directory Enterprise CA Server Setup
Database Servers
How to Set Up MySQL Server on Windows Server for Production Environments
Install & Hardening Your Microsoft SQL Server: Essential Post-Install Security Steps
Web Servers
Step-by-Step Secure IIS Baseline Setup in an Active Directory Environment