All Projects → Jsitech → Jshielder

Jsitech / Jshielder

Licence: gpl-3.0
Hardening Script for Linux Servers/ Secure LAMP-LEMP Deployer/ CIS Benchmark

Projects that are alternatives of or similar to Jshielder

Prowler
Prowler is a security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains more than 200 controls covering CIS, ISO27001, GDPR, HIPAA, SOC2, ENS and other security frameworks.
Stars: ✭ 4,561 (+844.31%)
Mutual labels:  security-hardening, hardening
Ansible Role Hardening
Ansible role to apply a security baseline. Systemd edition.
Stars: ✭ 188 (-61.08%)
Mutual labels:  security-hardening, hardening
Windows 10 Hardening
Windows 10 hardening guide without gimmicks
Stars: ✭ 102 (-78.88%)
Mutual labels:  security-hardening, hardening
Lynis
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Stars: ✭ 9,137 (+1791.72%)
Mutual labels:  security-hardening, hardening
nim-contra
Lightweight Self-Documenting Design by Contract Programming and Security Hardened mode.
Stars: ✭ 46 (-90.48%)
Mutual labels:  hardening, security-hardening
Windows10 hardening
My Windows 10 x64 security hardening guide
Stars: ✭ 78 (-83.85%)
Mutual labels:  security-hardening, hardening
Hardentheworld
Harden the world is a community driven project to develop hardening guidelines and checklists for common software and devices.
Stars: ✭ 158 (-67.29%)
Mutual labels:  security-hardening, hardening
Snuffleupagus
Security module for php7 and php8 - Killing bugclasses and virtual-patching the rest!
Stars: ✭ 509 (+5.38%)
Mutual labels:  security-hardening, hardening
cis benchmarks audit
Simple command line tool to check for compliance against CIS Benchmarks
Stars: ✭ 182 (-62.32%)
Mutual labels:  centos7, hardening
prowler
Prowler is an Open Source Security tool for AWS, Azure and GCP to perform Cloud Security best practices assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. It contains hundreds of controls covering CIS, PCI-DSS, ISO27001, GDPR, HIPAA, FFIEC, SOC2, AWS FTR, ENS and custom security frameworks.
Stars: ✭ 8,046 (+1565.84%)
Mutual labels:  hardening, security-hardening
Stronghold
Easily configure macOS security settings from the terminal.
Stars: ✭ 813 (+68.32%)
Mutual labels:  security-hardening, hardening
RHEL7-CIS
Ansible RHEL 7 - CIS Benchmark Hardening Script
Stars: ✭ 28 (-94.2%)
Mutual labels:  centos7, security-hardening
Hardening
Hardening Ubuntu. Systemd edition.
Stars: ✭ 705 (+45.96%)
Mutual labels:  security-hardening, hardening
Content
Security automation content in SCAP, OSCAL, Bash, Ansible, and other formats
Stars: ✭ 1,219 (+152.38%)
Mutual labels:  security-hardening, hardening
Terraform Aws Secure Baseline
Terraform module to set up your AWS account with the secure baseline configuration based on CIS Amazon Web Services Foundations and AWS Foundational Security Best Practices.
Stars: ✭ 596 (+23.4%)
Mutual labels:  security-hardening, hardening
How To Secure A Linux Server
An evolving how-to guide for securing a Linux server.
Stars: ✭ 11,939 (+2371.84%)
Mutual labels:  security-hardening, hardening
Centos7 Cis
Ansible CentOS 7 - CIS Benchmark Hardening Script
Stars: ✭ 64 (-86.75%)
Mutual labels:  centos7, security-hardening
Windows11 Hardening
My Windows 11 x64 security hardening guide
Stars: ✭ 267 (-44.72%)
Mutual labels:  hardening, security-hardening
terraform-aws-secure-vpc
A terraform module to create a VPC with secure default configurations.
Stars: ✭ 13 (-97.31%)
Mutual labels:  hardening, security-hardening
Thgtoa
The Hitchhiker’s Guide to Online Anonymity
Stars: ✭ 326 (-32.51%)
Mutual labels:  security-hardening

JShielder

JShielder Automated Hardening Script for Linux Servers

JSHielder is an Open Source Bash Script developed to help SysAdmin and developers secure there Linux Servers in which they will be deploying any web application or services. This tool automates the process of installing all the necessary packages to host a web application and Hardening a Linux server with little interaction from the user. Newly added script follows CIS Benchmark Guidance to establish a Secure configuration posture for Linux systems.

This tool is a Bash Script that hardens the Linux Server security automatically and the steps followed are:

  • Configures a Hostname
  • Reconfigures the Timezone
  • Updates the entire System
  • Creates a New Admin user so you can manage your server safely without the need of doing remote connections with root.
  • Helps user Generate Secure RSA Keys, so that remote access to your server is done exclusive from your local pc and no Conventional password
  • Configures, Optimize and secures the SSH Server (Some Settings Following CIS Benchmark)
  • Configures IPTABLES Rules to protect the server from common attacks
  • Disables unused FileSystems and Network protocols
  • Protects the server against Brute Force attacks by installing a configuring fail2ban
  • Installs and Configure Artillery as a Honeypot, Monitoring, Blocking and Alerting tool
  • Installs PortSentry
  • Install, configure, and optimize MySQL
  • Install the Apache Web Server
  • Install, configure and secure PHP
  • Secure Apache via configuration file and with installation of the Modules ModSecurity with the OWASP ModSecurity Core Rule Set (CRS3), ModEvasive, Qos and SpamHaus
  • Secures NginX with the Installation of ModSecurity NginX module and the OWASP ModSecurity Core Rule Set (CRS3)
  • Installs RootKit Hunter
  • Secures Root Home and Grub Configuration Files
  • Installs Unhide to help Detect Malicious Hidden Processes
  • Installs Tiger, A Security Auditing and Intrusion Prevention system
  • Restrict Access to Apache Config Files
  • Disables Compilers
  • Creates Daily Cron job for System Updates
  • Kernel Hardening via sysctl configuration File (Tweaked)
  • /tmp Directory Hardening
  • PSAD IDS installation
  • Enables Process Accounting
  • Enables Unattended Upgrades
  • MOTD and Banners for Unauthorized access
  • Disables USB Support for Improved Security (Optional)
  • Configures a Restrictive Default UMASK
  • Configures and enables Auditd
  • Configures Auditd rules following CIS Benchmark
  • Sysstat install
  • ArpWatch install
  • Additional Hardening steps following CIS Benchmark
  • Secures Cron
  • Automates the process of setting a GRUB Bootloader Password
  • Secures Boot Settings
  • Sets Secure File Permissions for Critical System Files

#NEW!!

  • LEMP Deployment with ModSecurity and the OWASP ModSecurity Core Rule Set (CRS3)

CIS Benchmark JShielder Script Added

To Run the tool

./jshielder.sh

As the Root user

Issues

Having Problems, please open a New Issue for JShielder on Github.

Distro Availability

  • Ubuntu Server 16.04LTS
  • Ubuntu Server 18.04LTS

ChangeLog

v2.4 Added LEMP Deployment with ModSecurity and the OWASP ModSecurity Core Rule Set (CRS3)

v2.3 More Hardening steps Following some CIS Benchmark items for LAMP Deployer

v2.2.1 Removed suhosing installation on Ubuntu 16.04, Fixed MySQL Configuration, GRUB Bootloader Setup function, Server IP now obtain via ip route to not rely on interface naming

v2.2 Added new Hardening option following CIS Benchmark Guidance

v2.1 Hardened SSH Configuration, Tweaked Kernel Security Config, Fixed iptables rules not loading on Boot. Added auditd, sysstat, arpwatch install.

v2.0 More Deployment Options, Selection Menu, PHP Suhosin installation, Cleaner Code,

v1.0 - New Code

Developed by Jason Soto

https://www.jasonsoto.com

https://github.com/jsitech

Twitter = @JsiTech

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].