Hardening Guides

From ArchWiki

Jump to: navigation, search

Guides for Hardening your system

This page is used to document guides and resources on how to harden and minimise a Linux system from attack.

UNIX and Linux Security Checklist v3.0

http://www.auscert.org.au/5816

"The checklist is structured to follow the lifecycle of a system, from planning and installation to recovery and maintenance. Sections A to G of the checklist are best applied to a system before it is connected to the network for the first time. In addition, the checklist can be reapplied on a regular basis, to audit conformance."

Published by the Australian Computer Emergency Response Team (AusCERT), this document is mainly targeted at sysadmins. The value for the average user is the insight on how to set up a new system from a security point of view, hardening the file system, minimising services to reduce attack vectors etc.

  Contents
  1. A. Determine Appropriate Security
  2. B. Installation
  3. C. Patch and Update
  4. D. Minimise
  5. E. Secure Base OS
  6. F. Secure Major Services
  7. G. Add Monitoring Capability
  8. H. Connect to Net
  9. I. Test Backup/Rebuild Strategy
 10. J. Maintain


Cromwell-intl.com: Hardening a Linux or OpenBSD Installation

Cromwell-intl.com shows us how to harden a Linux installation and filesystem and how to harden an TCP/IP stack.

The site also provides information on other computing areas such as Networking and Cryptography. Follow the internal links for more.

Personal tools