Skip to main content
Notes by Peter Galonza(Пётр Галонза)
GitHub Toggle Dark/Light/Auto mode Toggle Dark/Light/Auto mode Toggle Dark/Light/Auto mode Back to homepage

Linux


  • Access control
    • Accounts without empty passwords
    • Disable root login
    • Restricting access to the SU and SUDO command
    • Limiting the list of sudo commands for accounts
    • Restricting access to performance events
    • System accounting with auditd
    • No Non-Root accounts have UID 0
    • Noowner files
    • Kerberos
    • World-Writable files
    • Disable USB/firewire/thunderbolt devices
  • Distributions security
    • Minimize software to minimize vulnerability
    • One network service per system or vm instance
    • Use linux security extensions
    • Delete X Window Systems (X11)
    • Configure firewall
    • Separate Disk Partitions
    • Disk Quotas
    • Disable unwanted SUID and SGID binaries
    • Logging and Auditing
  • Kernel
    • Keep linux kernel and software up to Date
    • Restrict access to the kernel log
    • The core addresses in /proc and other interfaces are zero
    • Initializing dynamic core memory to zero when allocating it
    • Disabling mounting the debugfs virtual file system
    • Disabling the kexec_load system call
    • Restriction on the use of user namespaces
    • Prohibiting the bpf system call for unprivileged users
    • Prohibiting the userfaultfd system call for unprivileged users
    • Prohibition of automatic loading of kernel modules responsible for maintaining
    • Disabling Transactional Synchronization Extension (TSX) technology
    • Configuring user space protection from the Linux kernel
    • Prohibiting connection to other processes using ptrace
    • Limitation unsafe symlinks and hardlinks options
    • Enabling protection against unintentional writes to the FIFO object
    • Enabling protection against unintentional writing to a file
    • Prohibiting the creation of coredumps for certain executable files