7. Linux Hardening
Ubuntu/Debian (unattended-upgrades)
sudo apt update
sudo apt upgrade
sudo apt install unattended-upgrades
sudo dpkg-reconfigure --priority=low unattended-upgradesRed Hat/CentOS (yum-cron)
sudo yum update
sudo yum install yum-cron
sudo systemctl enable yum-cron
sudo systemctl start yum-cronFind SUID binaries
find / -perm -4000 2>/dev/nullFind world-writable files/directories
find / -perm -o+w -type f 2>/dev/null
find / -perm -o+w -type d 2>/dev/nullCheck cron jobs (root)
sudo crontab -lCheck cron jobs (user)
Check sudo privileges
Check home directories
Check bash history
Check for custom libraries (example)
Remove unnecessary packages (example)
SELinux status
List users
List groups
Check login attempts
Password policy (example)
Rotate passwords (example)
Check /etc/security/opasswd (example)
Clone Lynis
Run Lynis audit
Key Hardening Practices:
Last updated