Ansible Collection - devsec.hardening Logo

Ansible Collection - devsec.hardening

0
Free
Visit Website

This collection provides battle tested hardening for: * Linux operating systems: CentOS 7/8/9, Rocky Linux 8/9, Debian 10/11/12, Ubuntu 18.04/20.04/22.04, Amazon Linux (some roles supported), Arch Linux (some roles supported), Fedora 37/38, Suse Tumbleweed (some roles supported) * MySQL MariaDB >= 5.5.65, >= 10.1.45, >= 10.3.17 * MySQL >= 5.7.31, >= 8.0.3 * Nginx 1.0.16 or later * OpenSSH 5.3 and later The hardening is intended to be compliant with the Inspec DevSec Baselines: https://github.com/dev-sec/linux-baseline https://github.com/dev-sec/mysql-baseline https://github.com/dev-sec/nginx-baseline https://github.com/dev-sec/ssh-baseline Looking for the old roles? The roles are now part of the hardening-collection. We have kept the old releases of the os-hardening role in this repository, so you can find the them by exploring older tags. The last release of the standalone role was 6.2.0. The other roles are in separate archives repositories: apache_hardening, mysql_hardening, nginx_hardening, ssh_hardening, windows_hardening Minimum required Ansible-version: Ansible >= 2.9.10 Included content: os_hardening, mysql_hardening, nginx_ha

FEATURES

ALTERNATIVES

A tool to find and search for registered CVEs, creating a local CVE database for offline use.

A guide to brute forcing DVWA on the high security level with anti-CSRF tokens

Check for known vulnerabilities in your Node.js installation.

Weekly security newsletter with advisories from major software vendors

Threat intelligence and digital risk protection platform

An open-source tool for finding security vulnerabilities, compliance issues, and infrastructure misconfigurations in infrastructure-as-code

Automate the search for Exploits and Vulnerabilities in important databases.

A collection of 132 exploits added to Packet Storm in April 2024