Linux - Hardening

The following Linux distributions can be hardened during provisioning:

  • Debian starting version 11

  • Ubuntu starting version 22.04

  • Oracle Linux starting version 9

Recommandations from the CIS Benchmark documents have been following in order to enforce, harden and secure our Linux operating systems.

Filesystems

  • Some weak filesystems are disabled in the kernel

  • Separate mount points for very active filesystems: /var/log, /var/log/audit, /var/tmp

  • Protection of /var/log, /tmp and /var/tmp

  • Disabling removable storage

Secure boot

  • Ensure root password is required to boot in rescue mode

Sudo usage

  • Tracing of every usage of sudo command

Process hardening

  • Several parameters are activated in kernel to protect running processes

Network

  • Unnecessary or weak network services are disabled (enforced by configuration manager)

  • Ensure time service is configured and active

  • IPV6 is disabled

  • Several kernel parameters are set to protect network

  • Disable uncommon network protocols

Logging

  • Centralization of system logs

  • Ensure that every event is logged

Access and Authentication

  • Ensure cron service is active and configured

  • Ensure cron directories are protected

  • Ensure ssh is active and configured

  • Force ssh secure protocols and parameters

  • Ensure idle sessions deactivation

  • Ensure strong password rules are applied

  • Ensure sensitive authentication files are protected

Last updated