Ansible Collection - devsec.hardening Logo

Ansible Collection - devsec.hardening

0
Free
1 saves
Updated 11 March 2025
Visit Website

This collection provides battle tested hardening for: * Linux operating systems: CentOS 7/8/9, Rocky Linux 8/9, Debian 10/11/12, Ubuntu 18.04/20.04/22.04, Amazon Linux (some roles supported), Arch Linux (some roles supported), Fedora 37/38, Suse Tumbleweed (some roles supported) * MySQL MariaDB >= 5.5.65, >= 10.1.45, >= 10.3.17 * MySQL >= 5.7.31, >= 8.0.3 * Nginx 1.0.16 or later * OpenSSH 5.3 and later The hardening is intended to be compliant with the Inspec DevSec Baselines: https://github.com/dev-sec/linux-baseline https://github.com/dev-sec/mysql-baseline https://github.com/dev-sec/nginx-baseline https://github.com/dev-sec/ssh-baseline Looking for the old roles? The roles are now part of the hardening-collection. We have kept the old releases of the os-hardening role in this repository, so you can find the them by exploring older tags. The last release of the standalone role was 6.2.0. The other roles are in separate archives repositories: apache_hardening, mysql_hardening, nginx_hardening, ssh_hardening, windows_hardening Minimum required Ansible-version: Ansible >= 2.9.10 Included content: os_hardening, mysql_hardening, nginx_ha

FEATURES

EXPLORE BY TAGS

SIMILAR TOOLS

A vulnerability management tool for macOS that monitors and detects vulnerabilities in over 100 apps.

A curated list of known malicious NPM packages

A free and open-source deliberately insecure web application for security enthusiasts, developers, and students to discover and prevent web vulnerabilities.

Compares target's patch levels against Microsoft vulnerability database and detects missing patches.

Advanced vulnerability assessment tool for gaining visibility and preventing cyber attacks.

Automate Google Hacking Database scraping and searching with Pagodo, a tool for finding vulnerabilities and sensitive information.

SecurityVulnerability.io simplifies the process of collecting, enriching, and presenting vulnerability information for both human and machine consumption.

A tool that finds unprotected secrets in container images or file systems, matching against a database of 140 secret types.

A search engine for the Internet of Things (IoT) that provides real-time information about connected devices.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

Copyright © 2025 - All rights reserved