Linux Hardening Guidelines And Recommendations
Linux is designed to be the most secure Operating System, with a number of security features added that aren’t available/enabled in other popular OSes.
You can improve the security for Linux by implementing the security recommendations and guidelines below:
GNU/Linux
- ANSSI – Configuration recommendations of a GNU/Linux system
- CIS Benchmark for Distribution Independent Linux
- trimstray – The Practical Linux Hardening Guide – practical step-by-step instructions for building your own hardened systems and services. Tested on CentOS 7 and RHEL 7.
- trimstray – Linux Hardening Checklist – most important hardening rules for GNU/Linux systems (summarized version of The Practical Linux Hardening Guide)
- How To Secure A Linux Server – for a single Linux server at home
- nixCraft – 40 Linux Server Hardening Security Tips (2019 edition)
- nixCraft – Tips To Protect Linux Servers Physical Console Access
- TecMint – 4 Ways to Disable Root Account in Linux
- ERNW – IPv6 Hardening Guide for Linux Servers
- trimstray – Iptables Essentials: Common Firewall Rules and Commands
- Neo23x0/auditd – Best Practice Auditd Configuration
Red Hat Enterprise Linux – RHEL
- Red Hat – A Guide to Securing Red Hat Enterprise Linux 7
- DISA STIGs – Red Hat Enterprise Linux 7 (2019)
- CIS Benchmark for Red Hat Linux
- nixCraft – How to set up a firewall using FirewallD on RHEL 8
CentOS
SUSE
- SUSE Linux Enterprise Server 12 SP4 Security Guide
- SUSE Linux Enterprise Server 12 Security and Hardening Guide