05.05.2026

|

Alexander Stübi et al.

|

Article

Continuous Hardening: Transparency for Effective Security and Compliance

Teaser Image

In traditional IT security, system hardening was long regarded as a one-off act: a system was set up in a manual process or a golden image, hardened and then handed over for operation. However, in today’s dynamic infrastructure landscape, characterized by daily updates and upgrades, this approach inevitably leads to systems no longer having the required level of hardening.

The central challenge is no longer just defining a secure baseline, but continuously proving that these requirements are actually implemented technically. We therefore no longer regard hardening as a mere configuration task, but as an integral part of a comprehensive continuous compliance strategy.

The discrepancy between policy and reality

A hardened baseline configuration is formally a set of specifications for a system that has been checked and agreed. In practice, however, we often observe what is known as configuration drift: as soon as a system goes live, updates, manual corrections or incorrect adjustments cause it to gradually drift away from its secure initial state.

Conventional audits often only discover this drift after weeks or months. In the context of the current threat situation and regulatory requirements, this time window is critical. Continuous hardening closes this gap by shifting the focus from the mere presence of a control to its lasting effectiveness.

Hardening under the aspect of continuous compliance

Continuous compliance goes beyond pure monitoring; it proves the actual technical implementation of your security requirements and answers the key question: “What is the state of the system and does it meet our compliance requirements?”

By integrating hardening checks into automated control loops, configuration data is transformed into real-time audit evidence. This is based on three pillars:

  • Real-time visibility: Instead of waiting for reports from past periods, you get an instant view of compliance status.
  • Automated validation: Tools continuously check against defined standards such as CIS benchmarks or NIST requirements.
  • Actionable Insights: Deviations are not only logged, but also trigger defined actions such as automated remediation.

The effect of this approach can be seen in practice: While the detection of a drift can take several months with manual audits or is never detected at all, continuous verification with continuous hardening reduces this latency to a few minutes.

The technological implementation: policy as code

The key to scalability lies in the consistent application of Policy as Code (PaC). Here, security policies are defined in machine-readable code, versioned, tested, automatically rolled out and automatically verified.

Proven frameworks and tools

A combination of market-leading technologies has proven itself in consulting practice:

  • Infrastructure as Code (IaC): IaC transforms security from an afterthought to an integral part of infrastructure design. Tools such as Terraform, Pulumi, Ansible, GitOps, etc. ensure that security policies are seamlessly defined according to compliance requirements as early as the declaration phase.
  • Automated assessment: While Infrastructure as Code (IaC) enables the consistent definition of security policies, the assessment ensures that these policies are actually active in the target environment as desired. A declarative code is merely a declaration of intent. Only the automated check bridges the gap between the target state in the code and the actual state of the live infrastructure. To close this gap, the use of industry-recognized testing tools such as the CIS-CAT Pro Assessor is essential.
  • Automated enforcement: Simply detecting a drift is not enough; immediate, automated correction is crucial. Automation tools use the principle of idempotency to continuously return systems to the safe target state without undesirable side effects. Prominent examples are Ansible or Puppet: As soon as a drift occurs, playbooks compare the actual state with the target state and re-enforce the hardening specifications fully automatically.
  • OpenSCAP & InSpec: These frameworks make it possible to codify compliance requirements (e.g. CIS Level 1) and automatically scan systems against them.
  • Cloud-native controls: With tools such as Azure Policy or AWS Config, most cloud platforms offer native solutions with which they can check resources for compliance during deployment and block rollout in the event of violations.
  • Microsoft Intune & GPO: While Group Policy Objects (GPOs) remain the tried and tested method for in-depth, granular configurations in classic on-premises domains, Microsoft Intune enables modern, location-independent enforcement of security policies for hybrid endpoints through cloud-based security baselines.

The seamless integration of these tools into the CI/CD pipelines transforms hardening from a one-off measure to a continuous process. Security checks are carried out before the productive rollout (shift-left), while automated auditing during operation ensures that the infrastructure remains permanently compliant with the defined standards.

Conclusion: transparency creates resilience

Continuous hardening transforms baseline security from an administrative burden to a strategic asset. It makes visible what was previously in the dark: the actual technical implementation of your security requirements. In a world where attackers track down vulnerabilities in real time, the automated, continuous review of your baselines is the only adequate response.

Where do you stand when it comes to continuous hardening?

How do you answer the following questions:

  • Do we have the certainty that the security of our systems is currently configured exactly as it was at the time of acceptance?
  • How much time elapses between a risky misconfiguration and its actual detection in our monitoring?
  • Are our hardening specifications stored as code or do they only exist as static documents that have to be laboriously checked manually?
  • Is the maturity level of our system hardening appropriate?

TEMET AG supports you in translating your security requirements into automated processes and establishing seamless traceability. Contact us for a well-founded assessment.

About the authors

Alexander Stübi
Alexander Stübi
Security Consultant
Master of Law UZH, CAS Cyber Security & Information Risk Management FHNW
ISO/IEC 27001 Lead Implementer & Auditor, CIPP/E

Security is a competitive advantage, not just an obligation. As a security consultant, I primarily support companies in the efficient development of ISMS systems and their certification. In addition, I assist them in raising awareness among their employees and in business continuity management. My background in data protection law and AI regulation at the national and international level, combined with my experience in risk management, gives me a holistic view: security strategies and compliance projects that combine legal and organizational requirements. This results in solutions that provide companies with lasting security and trust.

vCard Linkedin
André Clerc
André Clerc
Managing Security Consultant
Dipl. Ing. FH Computer Science
CISSP, CAS Project Management

I support my customers with creativity and passion in areas such as Public Key Infrastructure (PKI), Crypto Agility, Internet of Things (IoT), authorization solutions, security architectures and system hardening. As a security architect and security engineer, I have extensive experience in the development of customized security solutions in complex IT environments. I am also involved in teaching practice-oriented PKI expertise at universities of applied sciences and at SGO in the area of Business Process Model and Notation (BPMN).

vCard Linkedin

Further publications

To all contributions