Linux Audit

Linux security and system management blog

Linux Audit is one of the few blogs dedicated to Linux security. We aim for high-quality articles to explain security concepts and how they apply to Linux systems.

Interested in a particular subject or want to look around? The glossary might be a great start.

Did you know?

You can monitor ongoing and new connections linked to a process

lsof -a -i -r 1 -p 1234

Also 💙 the command-line or terminal? Have a look at the command-line tips.

Latest articles

Set default file permissions on Linux with umask

Learn how to use umask to set the default file permissions in Linux. We look at examples, including how and where to implement them.

UMask setting

Harden services by configuring systemd units with a strict umask value using the unit setting UMask.

RestrictRealtime setting

Harden services by restricting systemd units to use realtime scheduling with the unit setting RestrictRealtime.

RestrictSUIDSGID setting

Harden services by restricting systemd units to set the set-user-ID (suid) or set-group-ID (sgid) bit on files with the unit setting RestrictSUIDSGID.

RestrictNamespaces setting

Harden services by restricting systemd units to only specified namespaces with the unit setting RestrictNamespaces.

Using a RSS feed reader? See links in footer to stay up-to-date!

Recent changes

Topics

Auditing

Inspect your systems with security tools and manually by knowing what to look for.

Latest article (of 59):
How to secure a Linux system

Auditing »

Automation

Save time by learning how to automate manual and repeating tasks.

Latest article (of 12):
Shell scripting

Automation »

Compliance

Everything related to compliance, such as security auditing and system hardening.

Latest article (of 15):
GDPR Compliance: Technical Requirements for Linux Systems

Compliance »

File systems

Everything about storing data on a file system

Latest article (of 25):
Set default file permissions on Linux with umask

File systems »

Hardening

Apply defenses to your Linux systems and make them less vulnerable.

Latest article (of 30):
How to secure a Linux system

Hardening »

Linux

Everything related to Linux, from the basics of system administration to running services and securing them.

Latest article (of 37):
How to block POST requests in nginx

Linux »

Software

Configure, maintain, and monitor software applications

Latest article (of 33):
How to show all installed packages with pacman

Software »

System administration

Learn generic Linux and security concepts with the articles in our system administrator category

Latest article (of 202):
Set default file permissions on Linux with umask

System administration »

Vulnerabilities

Know what vulnerabilities could be present on your systems and how to harden your Linux environment.

Latest article (of 12):
Show vulnerable packages on Arch Linux with arch-audit

Vulnerabilities »

Web

Let’s build a better web together

Latest article (of 23):
Hardening nginx with systemd security features

Web »