Home System Tutorial LINUX 6 ways to harden your Linux workstation security

6 ways to harden your Linux workstation security

Dec 29, 2023 am 08:44 AM
linux linux tutorial Red Hat linux system linux command linux certification red hat linux linux video

Introduction As I said before, safety is like driving on the highway - anyone who drives slower than you is an idiot, and anyone who drives faster than you is a lunatic. The guidelines presented in this article are just a basic set of core safety rules. They are not comprehensive and do not replace experience, caution, and common sense. You should slightly adjust these suggestions to fit the context of your organization.

For every system administrator, here are some necessary steps that should be taken:

  • 1. Always disable Firewire and Thunderbolt modules.
  • 2. Check the firewall to ensure that all inbound ports have been filtered.
  • 3. Make sure root mail is forwarded to the account you verified.
  • 4. Set up an automatic update schedule for the operating system, or update reminder content.

Additionally, you should also consider some of these best steps to take to further harden your system:

  • 1. Check to make sure the sshd service is disabled by default.
  • 2. Set the screen saver to automatically lock after a period of inactivity.
  • 3. Install logwatch.
  • 4. Install and use rkhunter
  • 5. Install an intrusion detection system

6 ways to harden your Linux workstation security

1. Add relevant modules to the blacklist

To blacklist Firewire and Thunderbolt modules, add the following lines to the file in /etc/modprobe.d/blacklist-dma.conf:

blacklist firewire-core
blacklist thunderbolt
Copy after login

Once the system is restarted, the above modules will be blacklisted. Even if you don't have these ports, there's no harm in doing this.

2. root email

By default, root mail is stored entirely on the system and is often never read. Make sure you set up /etc/aliases to forward root mail to the mailbox you actually read, otherwise you risk missing important system notifications and reports:

# Person who should get root’s mail
root:           [email protected]
Copy after login

After editing this, run newaliases and test it to make sure the email was actually delivered, as some email providers will reject email from domain names that don't exist or cannot be routed. If this is the case, you'll need to adjust your mail forwarding configuration until this actually works.

3. Firewall, sshd and listening daemon

The default firewall settings will depend on your distribution, but many allow inbound sshd ports. Unless you have a good and valid reason to allow inbound ssh, this should be filtered out and the sshd daemon disabled.

systemctl disable sshd.service
systemctl stop sshd.service
Copy after login

You can always enable it temporarily if you need to use it.

Generally speaking, your system should not have any listening ports other than responding to pings. This will help you protect against zero-day vulnerabilities at the network level.

4. Automatic updates or notifications

It is recommended to turn on automatic updates unless you have a very good reason not to do so, such as worrying that automatic updates will render your system unusable (this has happened before, so this worry is not unfounded). At the very least, you should enable automatic notification of available updates. Most distributions already have this service run automatically for you, so you most likely won't have to do anything. Check your distribution's documentation to learn more.

5. View log

You should pay close attention to all activity that occurs on your system. For this reason, logwatch should be installed and configured to send nightly activity reports indicating everything that is happening on the system. This won't protect against dedicated attackers, but it's a good safety net feature that needs to be deployed.

Please note: Many systemd distributions no longer automatically install the syslog server required by logwatch (that is due to systemd relying on its own logs), so you need to install and enable rsyslog and make sure /var/log is not available before logwatch has any use empty.

6. rkhunter and IDS

Unless you actually understand how it works and have taken the necessary steps to set it up properly (such as placing the database on external media, running checks from a trusted environment, and remembering to update the hash database after performing system updates and configuration changes) , etc.), otherwise installing rkhunter and an intrusion detection system (IDS) like aide or tripwire is not very useful. If you're not willing to take these steps and adjust the way you perform tasks on your workstation, these tools will only cause trouble without any real security benefit.

We do recommend that you install rkhunter and run it at night. It's fairly easy to learn and use; while it won't catch clever attackers, it can help you catch your own mistakes.

Original title: 9 Ways to Harden Your Linux Workstation After Distro Installation, author: Konstantin Ryabitsev

The above is the detailed content of 6 ways to harden your Linux workstation security. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

What computer configuration is required for vscode What computer configuration is required for vscode Apr 15, 2025 pm 09:48 PM

VS Code system requirements: Operating system: Windows 10 and above, macOS 10.12 and above, Linux distribution processor: minimum 1.6 GHz, recommended 2.0 GHz and above memory: minimum 512 MB, recommended 4 GB and above storage space: minimum 250 MB, recommended 1 GB and above other requirements: stable network connection, Xorg/Wayland (Linux)

Linux Architecture: Unveiling the 5 Basic Components Linux Architecture: Unveiling the 5 Basic Components Apr 20, 2025 am 12:04 AM

The five basic components of the Linux system are: 1. Kernel, 2. System library, 3. System utilities, 4. Graphical user interface, 5. Applications. The kernel manages hardware resources, the system library provides precompiled functions, system utilities are used for system management, the GUI provides visual interaction, and applications use these components to implement functions.

vscode terminal usage tutorial vscode terminal usage tutorial Apr 15, 2025 pm 10:09 PM

vscode built-in terminal is a development tool that allows running commands and scripts within the editor to simplify the development process. How to use vscode terminal: Open the terminal with the shortcut key (Ctrl/Cmd). Enter a command or run the script. Use hotkeys (such as Ctrl L to clear the terminal). Change the working directory (such as the cd command). Advanced features include debug mode, automatic code snippet completion, and interactive command history.

How to check the warehouse address of git How to check the warehouse address of git Apr 17, 2025 pm 01:54 PM

To view the Git repository address, perform the following steps: 1. Open the command line and navigate to the repository directory; 2. Run the "git remote -v" command; 3. View the repository name in the output and its corresponding address.

How to run java code in notepad How to run java code in notepad Apr 16, 2025 pm 07:39 PM

Although Notepad cannot run Java code directly, it can be achieved by using other tools: using the command line compiler (javac) to generate a bytecode file (filename.class). Use the Java interpreter (java) to interpret bytecode, execute the code, and output the result.

Where to write code in vscode Where to write code in vscode Apr 15, 2025 pm 09:54 PM

Writing code in Visual Studio Code (VSCode) is simple and easy to use. Just install VSCode, create a project, select a language, create a file, write code, save and run it. The advantages of VSCode include cross-platform, free and open source, powerful features, rich extensions, and lightweight and fast.

What is the main purpose of Linux? What is the main purpose of Linux? Apr 16, 2025 am 12:19 AM

The main uses of Linux include: 1. Server operating system, 2. Embedded system, 3. Desktop operating system, 4. Development and testing environment. Linux excels in these areas, providing stability, security and efficient development tools.

How to run sublime after writing the code How to run sublime after writing the code Apr 16, 2025 am 08:51 AM

There are six ways to run code in Sublime: through hotkeys, menus, build systems, command lines, set default build systems, and custom build commands, and run individual files/projects by right-clicking on projects/files. The build system availability depends on the installation of Sublime Text.

See all articles