- Prevent others to access your servers
- Configure BIOS
- Disable booting from CD/DVD and External Devices
- Setup BIOS password
- Protect GRUB with password
- Disable USBs and Input Devices in OS-COnfiguration
/etc/modprobe.d/no-usb
- Use key-based authentication instead of password-based authentication.
- Restrict SSH access from certain known IPs only
- Disable root login
- Set
PermitRootLogin noin/etc/ssh/sshd_config
- Set
- Set
Protocol 2in/etc/ssh/sshd_config - Users with the appropriately configured access level should be allowed to login
- Take down unnecessary open ports can quickly reduce the attack surface
- Lockdown Cronjobs
/etc/cron.allowand/etc/cron.deny
- Restrict access to Linux's services
- Define policies
- Block unwanted connections
- Zero Trust network
- At least 18 characters that include lowercases, Uppercases, Numbers and Special Characters
- Minimize Packages to Minimize Vulnerability
chkconfig
- Ping sweep (to prevent identify hosts on a network)
- Ping flood (to prevent ICMP flood attack)
- ...
- Detect any attempted intrusions
- Help to inspect the occurred breach
- To reduce attack surface
/etc/sysconfig/network
- Keep partitions separated and grouped. It can helps decrease the radius of any attack
- An off-site backup of your server can help you quickly recover any lost machines due to intrusion or attack
- IPS / IDS
- Snort
- Suricata
- ...