All Projects → emirozer → Nixarmor

emirozer / Nixarmor

Licence: gpl-3.0
nixarmor is a linux hardening automation project

Programming Languages

shell
77523 projects

Projects that are alternatives of or similar to Nixarmor

Ckss Certified Kubernetes Security Specialist
This repository is a collection of resources to prepare for the Certified Kubernetes Security Specialist (CKSS) exam.
Stars: ✭ 333 (+437.1%)
Mutual labels:  hardening
Terraform Aws Secure Baseline
Terraform module to set up your AWS account with the secure baseline configuration based on CIS Amazon Web Services Foundations and AWS Foundational Security Best Practices.
Stars: ✭ 596 (+861.29%)
Mutual labels:  hardening
Smokinglinuxeveryday
Smoking Linux Every Day!
Stars: ✭ 47 (-24.19%)
Mutual labels:  hardening
Chef Os Hardening
This chef cookbook provides numerous security-related configurations, providing all-round base protection.
Stars: ✭ 386 (+522.58%)
Mutual labels:  hardening
Snuffleupagus
Security module for php7 and php8 - Killing bugclasses and virtual-patching the rest!
Stars: ✭ 509 (+720.97%)
Mutual labels:  hardening
Graphenex
Automated System Hardening Framework
Stars: ✭ 665 (+972.58%)
Mutual labels:  hardening
Prowler
Prowler is a security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains more than 200 controls covering CIS, ISO27001, GDPR, HIPAA, SOC2, ENS and other security frameworks.
Stars: ✭ 4,561 (+7256.45%)
Mutual labels:  hardening
Hayat
Hayat is a script for report and analyze Google Cloud Platform resources.
Stars: ✭ 55 (-11.29%)
Mutual labels:  hardening
Linux Baseline
DevSec Linux Baseline - InSpec Profile
Stars: ✭ 524 (+745.16%)
Mutual labels:  hardening
Stronghold
Easily configure macOS security settings from the terminal.
Stars: ✭ 813 (+1211.29%)
Mutual labels:  hardening
Suhosin
SUHOSIN [수호신] for PHP 5.x - The PHP security extension.
Stars: ✭ 466 (+651.61%)
Mutual labels:  hardening
Jshielder
Hardening Script for Linux Servers/ Secure LAMP-LEMP Deployer/ CIS Benchmark
Stars: ✭ 483 (+679.03%)
Mutual labels:  hardening
Hardening
Hardening Ubuntu. Systemd edition.
Stars: ✭ 705 (+1037.1%)
Mutual labels:  hardening
Curl For Win
Reproducible curl (and OpenSSL) binaries for Windows
Stars: ✭ 352 (+467.74%)
Mutual labels:  hardening
Sshd config
K4YT3X's Hardened OpenSSH Server Configuration
Stars: ✭ 49 (-20.97%)
Mutual labels:  hardening
Cis Docker Benchmark
CIS Docker Benchmark - InSpec Profile
Stars: ✭ 324 (+422.58%)
Mutual labels:  hardening
Zeus
AWS Auditing & Hardening Tool
Stars: ✭ 630 (+916.13%)
Mutual labels:  hardening
Ssl Baseline
DevSec SSL/TLS Baseline - InSpec Profile
Stars: ✭ 56 (-9.68%)
Mutual labels:  hardening
Harden.sh
Slackware hardening script
Stars: ✭ 53 (-14.52%)
Mutual labels:  hardening
Ansible Ssh Hardening
This Ansible role provides numerous security-related ssh configurations, providing all-round base protection.
Stars: ✭ 746 (+1103.23%)
Mutual labels:  hardening

Screenshot

##Linux Hardening Automation Project

travis

This program comes with ABSOLUTELY NO WARRANTY!

Be Advised, do NOT use in production environments!

Wikipedia's description for Hardening:

In computing, hardening is usually the process of securing a system
by reducing its surface of vulnerability.
A system has a larger vulnerability surface the more functions
it fulfills; in principle a single-function system is more secure
than a multipurpose one.
Reducing available vectors of attack typically includes the
removal of unnecessary software, unnecessary usernames or
logins and the disabling or removal of unnecessary services.[1]

[1]Hardening(computing)

##USAGE

Clone the repository.

git clone https://github.com/emirozer/nixarmor.git

Run the related automation script based on your distribution.

OR

You can try the environment via using vagrant. Go to the /vagrant/.. dir and pick the distro you are interested in.

vagrant up

I am assuming you have vagrant on your system packages for this task. ###CHKROOTKIT & Cron Job

Chkrootkit is installed for ubuntu/debian/fedora and ran once.

For centOS, yum won't serve this package so you have to get it manually.

It is in your best interest to run chkrootkit daily. Here are some basic universal instructions:

vi /etc/cron.daily/chkrootkit.sh

#!/bin/bash
cd /your_installpath/chkrootkit-0.42b/
./chkrootkit | mail -s “Daily chkrootkit from Servername” [email protected]

Note

  1. Replace ‘your_installpath’ with the actual path to where you unpacked Chkrootkit.

  2. Change ‘Servername’ to the server which you are running.

  3. Change ‘[email protected]’ to your actual email address where the script will mail you.

Save the file.

Change the file permissions

chmod 755 /etc/cron.daily/chkrootkit.sh

Small note about unattanded updates: It is a good idea if and only if you compose your own black list..Meaning put everything that you find upgrading without supervision risky. http://askubuntu.com/questions/193773/can-i-configure-unattended-upgrades-to-not-upgrade-packages-that-require-a-reboo

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].