Hardening
Defense in depth: SSH, firewalls, mandatory access control, and audit.
Topics
| Topic | Description |
|---|---|
SSH Hardening |
Key-based auth, disable root, port changes, fail2ban |
Firewall |
firewalld, nftables, zones, services, rich rules |
SELinux |
Contexts, booleans, troubleshooting, custom policies |
AppArmor |
Profiles, enforcement modes, creating profiles |
Audit Framework |
auditd rules, ausearch, aureport, compliance |
CIS Benchmarks |
Automated hardening, compliance scanning |
Hardening Priorities
-
SSH — Disable password auth, use keys, restrict users
-
Firewall — Default deny, explicit allows
-
Updates — Automated security patches
-
MAC — SELinux/AppArmor enforcement
-
Audit — Log everything, alert on anomalies
-
Users — Principle of least privilege