Configuring and auditing Linux systems with Audit daemon

Configuring and auditing Linux systems with Audit daemon The Linux Audit Daemon is a framework to allow auditing events on a Linux system. Within this article we will have a look at installation, configuration and using the framework to perform Linux system and security auditing. Auditing goals By using a powerful audit framework, the system can track many event types to monitor and audit the system. Examples include: Audit file access and modification See who changed a particular file Detect […]

Read more

CAATTs for Linux: Lynis

CAATTs for Linux Within the field of the audit profession the usage of CAAT (Computer-assisted audit techniques) or CAATTs (computer-assisted audit tools and techniques) is growing. Lynis is filling this gap for Linux and Unix based systems. It’s a well-known and stable tool in this area and improves the audit process by automation. Only a few items could then be checked manually. This saves time, makes the audit more predictable and increases the quality of the overall audit. Lynis Based […]

Read more

Antivirus for Linux: is it really needed?

Antivirus for Linux The question regarding the need of antivirus for Linux is still a hot subject. Is it really needed or simply a nice-to-have? Within this article we have a look at antivirus for Linux and the alternative options. Malware Antivirus is a security measure to protect against malicious software, also known as malware. Most malware is still focused on Windows, followed by mobile devices and Mac OS. While there is malware for Linux, these pieces usually attack server […]

Read more

How to secure Linux systems – Auditing, Hardening and Security

How to secure Linux systems Within this article we have a look on how to secure a Linux system. Focus of the article is providing tips regarding auditing, hardening and general security of Linux servers. Hardening Focus on minimizing By minimizing the footprint of the server, its data and users, we can more quickly determine if a system is running properly. Also risks will be reduced, as every part on a system might be something which can be sooner or […]

Read more

Dealing with a compromised Linux system

Compromised Linux system Before we dive deep into this subject of dealing with a compromised Linux system, we have the answer the biggest question: how do we know we are compromised? Usually some signs are a clear give-away: The website hosted was altered and replaced with a “You have been hacked” page The system is missing essential binaries, or they all crash after executing Unauthorized users have been created and the system is hosting movies and music, which is not […]

Read more
1345