Introduction

Even in a controlled corporate environment, internal systems are not immune to threats. Misconfigurations, outdated software, and open services can quickly become entry points for attackers — whether from inside the network or through lateral movement after a breach.

This section focuses on secure setup procedures for critical infrastructure components such as databases, web servers, and remote management tools. Each guide demonstrates how to install, harden, and verify these systems using best practices that align with corporate security standards and the ACSC Essential Eight framework.

Securing internal systems is just as important as protecting external-facing ones — strong internal security helps prevent privilege escalation, data exposure, and downtime in the event of a compromise.

Active Directory Certificate Services

Secure Active Directory Enterprise CA Server Setup

Database Servers

How to Set Up MySQL Server on Windows Server for Production Environments

Install & Hardening Your Microsoft SQL Server: Essential Post-Install Security Steps

Web Servers

Step-by-Step Secure IIS Baseline Setup in an Active Directory Environment