Security Hygiene
Foundational practices that keep an environment secure over time: maintaining an accurate asset inventory, patching known vulnerabilities where possible, and enforcing consistent access controls.
What is Security Hygiene?
Foundational practices that keep an environment secure over time: maintaining an accurate asset inventory, patching known vulnerabilities where possible, and enforcing consistent access controls.
Security hygiene refers to the foundational practices that keep an environment secure as a matter of ongoing operational routine rather than periodic campaigns. Core hygiene practices include: maintaining an accurate and complete asset inventory, applying patches and updates on a consistent schedule, enforcing strong credentials and disabling defaults, removing unnecessary services and open ports, monitoring for anomalous activity, and maintaining backups and recovery capabilities.
The concept of hygiene emphasizes that most security failures trace back to failures of basics rather than sophisticated attacks. The majority of successful breaches exploit known vulnerabilities for which patches were available, default or weak credentials, or assets that weren't known to exist. The 2023 Verizon Data Breach Investigations Report found that over 80% of breaches involved vulnerabilities that were known and patchable — the security failure was a hygiene failure, not a zero-day.
In IoT and OT environments, hygiene is more difficult to achieve and more often neglected. Patch hygiene is impractical for most IoT and OT devices. Credential hygiene requires active management of device access credentials across thousands of devices, many of which use proprietary management interfaces. Asset inventory hygiene requires continuous monitoring rather than manual enumeration. The tools and processes that support IT hygiene often don't transfer directly to IoT and OT, requiring adapted approaches.
Key Facts
- Over 80% of data breaches exploit vulnerabilities with available patches — hygiene failures, not zero-days
- Default credentials on IoT devices are exploited in 30%+ of IoT-involved incidents
- Asset inventory completeness is the foundational hygiene metric — you can't maintain hygiene for assets you don't know exist
- CIS Critical Security Controls prioritizes the six "Implementation Group 1" controls as foundational hygiene for all organizations
How ORDR Addresses Security Hygiene
ORDR supports security hygiene programs by providing continuous asset inventory (the foundation of all hygiene), CVE-based vulnerability tracking (enabling informed patch prioritization), detection of default credential usage through behavioral analysis, and continuous monitoring that flags hygiene deviations — new unauthorized devices, unexpected configuration changes, unmanaged assets without security coverage.
See ORDR in actionFrequently Asked Questions
See Security Hygiene in practice.
ORDR gives security teams complete visibility into every connected asset—and the intelligence to act on what matters most.