Ansible Collection - devsec.hardening Logo

Ansible Collection - devsec.hardening

Visit Website

This collection provides battle tested hardening for: * Linux operating systems: CentOS 7/8/9, Rocky Linux 8/9, Debian 10/11/12, Ubuntu 18.04/20.04/22.04, Amazon Linux (some roles supported), Arch Linux (some roles supported), Fedora 37/38, Suse Tumbleweed (some roles supported) * MySQL MariaDB >= 5.5.65, >= 10.1.45, >= 10.3.17 * MySQL >= 5.7.31, >= 8.0.3 * Nginx 1.0.16 or later * OpenSSH 5.3 and later The hardening is intended to be compliant with the Inspec DevSec Baselines: https://github.com/dev-sec/linux-baseline https://github.com/dev-sec/mysql-baseline https://github.com/dev-sec/nginx-baseline https://github.com/dev-sec/ssh-baseline Looking for the old roles? The roles are now part of the hardening-collection. We have kept the old releases of the os-hardening role in this repository, so you can find the them by exploring older tags. The last release of the standalone role was 6.2.0. The other roles are in separate archives repositories: apache_hardening, mysql_hardening, nginx_hardening, ssh_hardening, windows_hardening Minimum required Ansible-version: Ansible >= 2.9.10 Included content: os_hardening, mysql_hardening, nginx_ha

FEATURES

ALTERNATIVES

Amass by OWASP performs comprehensive attack surface mapping and asset discovery.

A vulnerability management tool for macOS that monitors and detects vulnerabilities in over 100 apps.

Automates SQL injection detection and exploitation

A tool for detecting secrets in your code

Advanced email reconnaissance tool leveraging public data.

A Docker analysis tool for identifying potential security vulnerabilities and weaknesses in Docker environments

An open source project for static analysis of vulnerabilities in application containers

A BloodHoundAD Report Engine for Security Teams to identify Active Directory security vulnerabilities and harden common configuration vulnerabilities and oversights.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved