Linux

Below are some specific options to improve security of your system. Some specific Linux notes were described in the general section. Below, I will provide a checklist to follow:

  • SSH

    • Disable root access for SSH. Use a new user account for SSH.

    • Change the default port (22) for SSH to something other than 22.

    • Disable “Password Login Authentication” for SSH.

      • Use a private/public key pair. Create these with the following encryption methods:

        • rsa 4096 (or above)

        • Or use ed25519

  • Enable and configure UFW (Firewall)

    • If using as a server for a specific application, start off with blocking ALL and only allowing what is needed. If using for day to day workstation, this may be harder to achieve. So instead, you can only block what is needed.

  • Use an IDS, such as Snort.

  • Use an IPS, such as Fail2Ban. Great for intrusions and attacks such as DDOS

  • Monitor traffic with tools such as netstat or nmap

    • netstat -tulpn | ss -tulpn | -sT for nmap

  • User SELinux – Some benefits are:

    • RBAC (Role Based Access Control for user accounts

    • Rule based access for ports, processes, files, and directories

Last updated