An evolving how-to guide for securing a Linux server.
-
Updated
Jan 21, 2020
{{ message }}
An evolving how-to guide for securing a Linux server.
This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).
Prowler is a security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains all CIS controls listed here https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf and more than 100 additional checks that help on GDPR, HIPAA and other security requirements.
This Ansible role provides numerous security-related configurations, providing all-round base protection.
Security automation content in SCAP, OSCAL, Bash, Ansible, and other formats
https://github.com/0xmachos/mOSL is a good replacement until this is updated.
Basically, we should remove all settings that are no longer relevant, and add ones that are newly added.
This Ansible role provides numerous security-related ssh configurations, providing all-round base protection.
Automated System Hardening Framework
AWS Auditing & Hardening Tool
Hardening Ubuntu. Systemd edition.
Terraform module to set up your AWS account with the secure baseline configuration based on CIS Amazon Web Services Foundations.
Hardening Script for Linux Servers/ Secure LAMP-LEMP Deployer/ CIS Benchmark
It would be great to be able to get a complete stacktrace along with the request dump when a rule is triggered.
Hardened allocator designed for modern systems. It has integration into Android's Bionic libc and can be used externally with musl and glibc as a dynamic library for use on other Linux-based platforms. It will gain more portability / integration over time.
CIS Docker Benchmark - InSpec Profile
HardenedBSD development tree.
aws-gate should have type annotations, so we can do more linting and discover design issues.
Add a description, image, and links to the hardening topic page so that developers can more easily learn about it.
To associate your repository with the hardening topic, visit your repo's landing page and select "manage topics."
It would be nice if lynis would gather (and report in the portal/reports) information about user-accounts: