<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Radhitya Rangga Pratama</title>
    <description>The latest articles on DEV Community by Radhitya Rangga Pratama (@tamaa).</description>
    <link>https://dev.to/tamaa</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3859709%2F8eb7a00a-002a-4618-91b0-c6100a5de885.jpeg</url>
      <title>DEV Community: Radhitya Rangga Pratama</title>
      <link>https://dev.to/tamaa</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/tamaa"/>
    <language>en</language>
    <item>
      <title>Stop Leaving Your Doors Open: 5 Essential Steps for Linux Server Hardening</title>
      <dc:creator>Radhitya Rangga Pratama</dc:creator>
      <pubDate>Fri, 03 Apr 2026 15:51:14 +0000</pubDate>
      <link>https://dev.to/tamaa/stop-leaving-your-doors-open-5-essential-steps-for-linux-server-hardening-4cg3</link>
      <guid>https://dev.to/tamaa/stop-leaving-your-doors-open-5-essential-steps-for-linux-server-hardening-4cg3</guid>
      <description>&lt;p&gt;Setting up a server is easy; keeping it secure is a different story. In an era where automated bots scan for vulnerabilities within seconds of a server going live, "default settings" are your biggest enemy. As a security enthusiast at &lt;strong&gt;NexxaCodeID&lt;/strong&gt;, I’ve learned that security isn't just a feature—it’s the foundation.&lt;/p&gt;

&lt;p&gt;Here is how I implement &lt;strong&gt;Security by Design&lt;/strong&gt; to harden Linux infrastructure against modern threats.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;##SSH Hardening: The First Line of Defense
Your SSH port is the primary target for brute-force attacks. Don't leave the keys under the mat.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Disable Root Login&lt;/strong&gt;: Never allow direct root access.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key-Based Auth&lt;/strong&gt;: Disable password authentication entirely; use Ed25519 SSH keys.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Change Default Port&lt;/strong&gt;: Moving from port 22 to a custom port (e.g., 2204) cuts down 90% of bot noise.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;# Edit /etc/ssh/sshd_config
Port 2204
PermitRootLogin no
PasswordAuthentication no
PubkeyAuthentication yes
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Implement a "Default Deny" Firewall&lt;/strong&gt;&lt;br&gt;
The rule is simple: If it’s not required, it’s closed. Use UFW (Uncomplicated Firewall) to drop all incoming traffic except for essential services like HTTPS and your custom SSH port.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Fail2Ban: Automating the Ban Hammer&lt;/strong&gt;&lt;br&gt;
Bots are persistent. Fail2Ban monitors system logs and automatically jails IP addresses that show malicious signs (like multiple failed login attempts). It’s a set-it-and-forget-it layer of proactive defense.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Zero-Trust Access with Cloudflare Tunnels&lt;/strong&gt;&lt;br&gt;
Industry Standard 2026: Why expose your SSH port to the public internet at all? By using Cloudflare Tunnel (cloudflared), your server doesn't need any inbound ports open. Access is routed through an encrypted tunnel protected by Cloudflare’s Zero Trust dashboard. This makes your server invisible to port scanners.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Automated Security Patching&lt;/strong&gt;&lt;br&gt;
Security fails when software rots. Enable unattended-upgrades to ensure critical security patches are applied the moment they are released, without needing manual intervention.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Digital Stewardship&lt;/strong&gt;: A Christian Perspective&lt;br&gt;
In Cyber Security, we act as stewards of data and privacy. From a Christian ethical standpoint, building secure systems is an act of service—protecting our neighbors' digital lives from those who seek to do harm. Integrity is built when we harden the parts of the system that no one sees, ensuring the safety of those who rely on it.&lt;/p&gt;

</description>
      <category>devops</category>
      <category>linux</category>
      <category>security</category>
      <category>tutorial</category>
    </item>
  </channel>
</rss>
