DEV Community

Introduction to Linux Hardening

Paula on April 22, 2019

It's been a while! I've been working on so many projects recently, but one of the most important ones is related with Linux Hardening. This week I'...
Collapse
 
thelonelyghost profile image
David Alexander

Also of note, automating these sorts of checks are a lot easier than you'd expect. There's InSpec and the Linux baseline profile already built for it, and you can pretty easily write your own. No agent, nothing on the target server(s) except SSH and some basic tools that are probably already installed.

Blew my mind the first time I saw I could run a report and iterate through a fleet of servers with it.

Collapse
 
terceranexus6 profile image
Paula

I knew about automatization (mostly for monitoring purpose) but I didn't know about InSpec! I will give it a try, thanks!

Collapse
 
erosen03 profile image
Eugene Rosenfeld

Nice post about encryption. But there is a lot more to hardening systems. For further reading I would suggest checking out the CIS Benchmarks - cisecurity.org/cis-benchmarks/, or the Department of Defense Security Technical Implementation Guide (STIGs) - public.cyber.mil/stigs/. Both are based on the National Institute of Standards and Technology (NIST) guidance - nist.gov/.

Collapse
 
mjjcha profile image
Judy Cha

Thanks for this article, Paula! I mostly write application-level code, so infrastructure reliability/security good practices is not something I'm so familiar with. I'm really glad I happened upon your article today!

Collapse
 
mboelen profile image
Michael Boelen

Another tool that you might help with your Linux hardening quest is Lynis. The FOSS project exists since 2007 and is still maintained.

Collapse
 
justinvincent2 profile image
Justin Vincent

Paula, thanks so much for writing this! I learned a lot and the way you provided examples was very helpful.

Collapse
 
terceranexus6 profile image
Paula

Thank you! I'm glad you enjoyed!

Collapse
 
ondrejs profile image
Ondrej

Thanks for nice article! Some other things to mention is selecting distributions which use SELinux (e.g. CentOS) or hardening kernel with grsecurity patches (relevant mainly to Debian-Testing).