hardening
content
Our great sponsors
hardening | content | |
---|---|---|
5 | 7 | |
1,306 | 2,076 | |
- | 2.7% | |
8.8 | 10.0 | |
7 days ago | 5 days ago | |
Shell | Shell | |
Apache License 2.0 | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
hardening
-
Security Harden Ubuntu 22.04
Thanks for the link. I’m looking into it now. I also am testing out konstrukoid/hardening on GitHub
-
Any tool to check the security of my server?
There is also: https://github.com/konstruktoid/hardening
-
Industry Standard Linux Hardening Script [Ubuntu Server]
Are there any Linux(Ubuntu Server in my case) hardening scripts that abides to any well known industry standards. I can only find some scripts on Github like this one - https://github.com/konstruktoid/hardening
- Basic Server Hardening Steps
- Advice on locking down / securing servers?
content
- Oracle linux CIS benchmark
-
FIPS 140 and MacOS
For starters there's an entire NIST project for macOS Security Compliance - https://github.com/usnistgov/macos_security this will make your life a million times easier to meet a lot of the technical controls required for compliance. Nothing like this really exists for Windows or Linux(closest is Compliance As Code https://github.com/ComplianceAsCode/content)
- Ansible for automation/ hardening.
- I wrote a Script to bring firefox into dISA STIG compliance on RHEL 7 & 8 systems.
- hardening a RHEL8 VM using OpenSCAP and DISA STIG
-
CIS Benchmarking Git Community
I haven't used this in a while but take a look at ComplianceAsCode it is attempting to apply controls for each of the different benchmarks on different OSes. It might have what you are looking for, plus you can always contribute back any changes you make to help others.
- ComplianceAsCode/content: Security automation content in SCAP, OSCAL, Bash, Ansible, and other formats
What are some alternatives?
debian-cis - PCI-DSS compliant Debian 10/11/12 hardening
flake8-bandit - Automated security testing using bandit and flake8.
Android-PIN-Bruteforce - Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN cracker for Android devices! (no root, no adb)
AMDH - Android Mobile Device Hardening
ansible-role-hardening - Ansible role to apply a security baseline. Systemd edition.
ansible-role-rhel8-stig - DISA STIG for Red Hat Enterprise Linux 8 - Ansible role generated from ComplianceAsCode Project
PowerDNS - PowerDNS Authoritative, PowerDNS Recursor, dnsdist
How-To-Secure-A-Linux-Server - An evolving how-to guide for securing a Linux server.
lunasec - LunaSec - Dependency Security Scanner that automatically notifies you about vulnerabilities like Log4Shell or node-ipc in your Pull Requests and Builds. Protect yourself in 30 seconds with the LunaTrace GitHub App: https://github.com/marketplace/lunatrace-by-lunasec/
ubuntu-hardened-host - Hardened (FIPS) Host for NGINX, Docker, Kubernets, etc
lynis - Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.