An evolving how-to guide for securing a Linux server.
-
Updated
Jan 21, 2020
An evolving how-to guide for securing a Linux server.
Agent-less vulnerability scanner for Linux, FreeBSD, Container Image, Running Container, WordPress, Programming language libraries, Network devices
It'd be helpful if there was a check for ELB and ALBs that have either no listeners or no instances in their target pool. The check is similar to an unused security group although their are more financial penalties for having idle ELB and ALBs.
As you know it is hard to surf on web with user.js. I always have problem with many sites, but it i realyly takes time to find which config is not compatibale with the visited site. I think we can create a list of buggy sites so anyone can contribute it.
I can start with mines:
When we have an automatic email reports configuration and there are no alerts to be reported that day (e.g the rule or group of rules that we have configured in reports have not triggered during the day), the report will not be sent.
This is not good behavior because it can lead the user to think that the automatic reports are not working.
Let's also say that I have to sen
I love the idea behind this project!!!
I'm seeing that you don't automatically support say downloading stdio.h and stdio.c and transpiling them at the same time? How hard would that be? Seems like it'd be a huge win to automatically support standard libraries.
While I'm at it, I just posted to gstreamer-rs github encouraging them to try this out, I'd recommend he
Librefox: Firefox with privacy enhancements
This may surprise developers used to other templating engines used in Rails, but, at time of writing, Liquid does not behave like ERB/HAML templates in Rails where interpolated values are escaped by default.
Liquid does not escape interpolated values and does not have an option (at time of writing) to configure this to be the default. The developer needs to remember each and every time to es
Sandboxed API should build/work on all major Linux distributions.
We should provide at least some basic instructions for distributions other than Debian/Ubuntu:
I have never written SCAP content before, and am looking at how to get started. I would like to write SCAP content to test compliance on Photon OS against DISA SRGs. I have been all over the wiki pages, but I am still not sure how to get started. The main page makes it look super easy for writing OVAL and XCCDF files using YAML, but I am not sure where to build those
Simple Golang HTTPS/TLS Examples
https://github.com/0xmachos/mOSL is a good replacement until this is updated.
Basically, we should remove all settings that are no longer relevant, and add ones that are newly added.
As the engineer who wrote this, I'm sure it all seems obvious to you :) but something that would be VERY helpful to add your website and your github README file would be two bullet lists: "What USBGuard Does", "What USBGuard Doesn't Do". Having this explained clearly would be very helpful even to those of us who are tech-savvy :) Thanks.
Hardening Ubuntu. Systemd edition.
A collection of awesome security hardening guides, tools and other resources
Scripts built from our Guide to User Data Security
Ansible playbook roles for security
Terraform module to set up your AWS account with the secure baseline configuration based on CIS Amazon Web Services Foundations.
It seems you log full IP addresses at jvoisin/snuffleupagus@b1a4af5
I'm not sure if this logs directly to logfiles or if filter are applied by syslog like it is done at many hosting platforms for accesslog files.
Full IP addresses are not helpful and are GDPR relevant under the jurisdication that an IP address can be connected to a s
Hardening Script for Linux Servers/ Secure LAMP-LEMP Deployer/ CIS Benchmark
Quickly secure UNIX/Linux systems
I've been tasked with creating a CIS Level 1 standard RHEL image in Azure. I've taken a market place RHEL 7.3 image and applied this playbook with packer/ansible using tags level1.
However, when I go and try and create a VM from the image, it fails. If I skip cis_section1, I can create a VM from the image. I'm a linux newbie, apologies, but any obvious rules in section 1 that could be causing
Hi team,
I have noticed that the log examples found in 0610-win-ms_logs_rules.xml don't match their rules.
It is due the fields providerName and channel aren't correct.
To match rules 63103, 63104 and 63105, the logs must have matched before rules `60
Look-Ahead Java Deserialization Library
currently, we hard-code the default RHEL NTP servers.
MSVC on Windows prepends padding instructions to functions for alignment (it currently uses the CC opcode for this and a 16-byte alignment for all functions by default). We currently preserve those instructions as "gap functions", but they should be safe to discard. We could add a pass that scans all gap functions and trims them by removing all CC (and even 90 as well) opcode.
Hello folks,
I think it'd be great if every ENV VAR used in the images would be explained in the README.md, and also it can be included in the Wazuh official documentation once they're ready.
Feel free to share your thoughts on this here.
Regards
Add a description, image, and links to the security-hardening topic page so that developers can more easily learn about it.
To associate your repository with the security-hardening topic, visit your repo's landing page and select "manage topics."
It would be nice if lynis would gather (and report in the portal/reports) information about user-accounts: