About How to Harden

How to Harden is an open-source collection of security hardening guides for SaaS platforms. Our mission is to help organizations defend against supply chain attacks by providing actionable, vendor-specific security configurations.

Why This Exists

Modern enterprises rely on dozens of SaaS applications—identity providers, DevOps platforms, data warehouses, and collaboration tools. Each of these integrations represents a potential entry point for attackers.

Recent breaches highlight the risk:

How to Harden provides the specific configuration guidance needed to prevent these attacks.

Our Approach

Each guide follows a consistent structure:

  1. Authentication & Access Controls - SSO, MFA, and RBAC configurations
  2. API & Integration Security - Token management, OAuth hardening, webhook security
  3. Data Security - Encryption, access controls, and data protection
  4. Monitoring & Detection - Audit logging, SIEM integration, and detection queries

We prioritize:

SaaS Categories

Guides are organized by platform category:

Category Description Examples
Identity Identity and access management platforms Okta, Ping Identity, SailPoint
Security Security tools and platforms CrowdStrike, CyberArk, HashiCorp Vault
DevOps Development and operations platforms GitLab, CircleCI, Datadog
Data Data platforms and analytics Snowflake, Databricks, Tableau
Productivity Collaboration and productivity tools Zoom, Notion, Asana
HR/Finance Human resources and finance platforms Workday, ADP, NetSuite
Marketing Marketing and CRM platforms Salesforce, HubSpot, Mailchimp

Contributing

How to Harden is open source and welcomes contributions. You can:

See our Contributing Guide or visit our GitHub repository to get started.

Philosophy

We believe security guidance should be:

A GRC Engineering Project

How to Harden is a GRC Engineering project. GRC Engineering represents a fundamental shift in how governance, risk, and compliance is done—one that fully embraces an engineering mindset.