ubuntu_on_HPE_ProLiant_MS_GEN10
ansible-role-security
ubuntu_on_HPE_ProLiant_MS_GEN10 | ansible-role-security | |
---|---|---|
1 | 7 | |
4 | 768 | |
- | - | |
0.0 | 5.0 | |
over 1 year ago | about 2 months ago | |
Jinja | Jinja | |
- | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ubuntu_on_HPE_ProLiant_MS_GEN10
ansible-role-security
-
Can't access to my nas after I create some group
My playbook is only doing some software installation (openzfs, ...) and some SSH configuration (something really similar to jeff geerling : https://github.com/geerlingguy/ansible-role-security ), and it works perfectly without the tasks where I create groups and add user to these groups.
- Wie Rootserver sicher machen?
-
Selfhosting Security for Cloud Providers like Hetzner
I suggest these resources: - Some fundamentals: https://www.cyberciti.biz/tips/linux-security.html - One of the best imho ( exhaustive list ): https://github.com/imthenachoman/How-To-Secure-A-Linux-Server - Ansible playbook to harden security by Jeff Geerling: https://github.com/geerlingguy/ansible-role-security - OAWSP Check list ( targeted for web apps... and honestly a bit overkill ): https://github.com/0xRadi/OWASP-Web-Checklist
-
Good server setup tutorials
THAT all being said. Check out this: https://github.com/geerlingguy/ansible-role-security. YOu can see everything Jeff Does. My guy is a mad genious :).
-
My First 5 Minutes On A Server; Or, Essential Security for Linux Servers
Solid advice, most of it is now covered by GeerlingGuy's Security Ansible role (https://github.com/geerlingguy/ansible-role-security) and the Firewall one (https://github.com/geerlingguy/ansible-role-firewall).
-
Arma 3 Server tips?
yea, what jessel0l said (or vlan) plus you could use something like chroot or podman to separate privileges. Remember to set up fail2ban sane and easy starting point might be https://github.com/geerlingguy/ansible-role-security
- Secure your Cloud Server from Hackers with Fail2Ban
What are some alternatives?
homelab - Collection of configuration and tools used in my homelab
ansible-role-hardening - Ansible role to apply a security baseline. Systemd edition.
nas-system-exportes - Simple installer of crucial prometheus exporters
ansible-role-java - Ansible Role - Java
ansible-mysqld_exporter - Provision mysqld exporter for prometheus monitoring tool
OS-Hardening - Hardening the Linux operating system for Debian like distributions.
raspberry-gateway - Simple yet powerful home gateway environment with Pi-Hole +Unbound, VPN, Torrent client and Internet monitoring, all managed by Portainer.
ansible-role-mysql - Ansible Role - MySQL
homeserver-ansible - Quickly setup your own HomeServer/NAS with these playbooks
ansible-role-nginx - Ansible Role - Nginx
k3s-on-prem-production - Playbooks needed to set up an on-premises K3s cluster and securize it
anaconda - System installer for Fedora, RHEL and other distributions