Lock Down Strategies for Linux Servers

Locking Down Linux: Strategies Most of the security defenses on Linux, are based on the earlier performed hardening activities. By locking down components on the system, the chance of a full compromise is lowered. This step-by-step locking down is a time consuming process. Time to review some of the strategies which can be applied when you want to secure your systems. Strategy 1: Locking down processes The first area to lock down are system processes. After all, each system needs […]

Read more

Most important steps for Linux server hardening

Linux Server Hardening 1. Install security¬†updates and patches Most weaknesses in systems are caused by flaws in software. These flaws we call vulnerabilities. Proper care for software patch management help with reducing a lot of the related risks. The activity of installing updates often has a low risk, especially when starting with the security patches first. Most Linux distributions have the option to limit what packages you want to upgrade (all, security only, per package). Make sure that your security […]

Read more

How to secure Linux systems – Auditing, Hardening and Security

How to secure Linux systems Within this article we have a look on how to secure a Linux system. Focus of the article is providing tips regarding auditing, hardening and general security of Linux servers. Hardening Focus on minimizing By minimizing the footprint of the server, its data and users, we can more quickly determine if a system is running properly. Also risks will be reduced, as every part on a system might be something which can be sooner or […]

Read more

Dealing with a compromised Linux system

Compromised Linux system Before we dive deep into this subject of dealing with a compromised Linux system, we have the answer the biggest question: how do we know we are compromised? Usually some signs are a clear give-away: The website hosted was altered and replaced with a “You have been hacked” page The system is missing essential binaries, or they all crash after executing Unauthorized users have been created and the system is hosting movies and music, which is not […]

Read more