How To Secure A Linux Server Logo

How To Secure A Linux Server

1
Free
Visit Website

An evolving how-to guide for securing a Linux server that, hopefully, also teaches you a little about security and why it matters. Table of Contents: - Introduction - Guide Objective - Why Secure Your Server - Why Yet Another Guide - Other Guides - To Do / To Add - Guide Overview - About This Guide - My Use-Case - Editing Configuration Files - For The Lazy - Contributing - Before You Start - Identify Your Principles - Picking A Linux Distribution - Installing Linux Pre/Post Installation Requirements - Other Important Notes - Using Ansible Playbooks to secure your Linux Server - The SSH Server - Important Note Before You Make SSH Changes - SSH Public/Private Keys - Create SSH Group For AllowGroups - Secure /etc/ssh/sshd_config - Remove Short Diffie-Hellman Keys - 2FA/MFA for SSH - The Basics - Limit Who Can Use sudo - Limit Who Can Use su - Run applications in a sandbox with FireJail - NTP Client - Securing /proc - Force Accounts To Use Secure Passwords - Automatic Security Updates and Alerts - More Secure Random Entropy Pool (WIP) - Add Panic/Secondary/Fake password Login Security System - The Network Firewall With UFW (Uncomplicated Firewall) - iptables - Intrusion Detection And Prevention with PSAD - Application Intrusion Detection

FEATURES

ALTERNATIVES

Find books at your favorite store and stay updated on new features with Universal Book Links.

A comprehensive guide to investigating security incidents in popular cloud platforms, covering essential tools, logs, and techniques for cloud investigation and incident response.

A platform offering hacking missions to test and enhance skills.

A compilation of Red Teaming resources including cheatsheets, notes, scripts, and practice platforms for cybersecurity learning and skill development.

A cybersecurity challenge where you play the role of an incident response consultant investigating an intrusion at Precision Widgets of North Dakota.

A comprehensive guide for using Docker with detailed information on prerequisites, installation, containers, images, networks, and more.

A comprehensive guide to Nessus, a vulnerability scanner, covering data directories, binary directories, logs directories, plugin directories, advanced settings, API, and good practices.

A practical guide to developing a comprehensive security monitoring and incident response strategy, covering incident response fundamentals, threat analysis, and data analysis.