Hardening and Security Guides
#1
Brick 
www.ucd.ie/t4cms/UCD%20Linux%20Security%20Checklist.pdf
www.sans.org/media/score/checklists/LinuxCheatsheet_2.pdf
www.pluralsight.com/blog/it-ops/linux-hardening-secure-server-checklist
www.security.utexas.edu/os-hardening-checklist/linux-7
www.github.com/a13xp0p0v/kconfig-hardened-check
www.github.com/anthraxx/linux-hardened/releases
www.wiki.alpinelinux.org/wiki/Alpine_security
www.docs.clip-os.org/clipos/kernel.html
www.techrepublic.com/article/spectre-and-meltdown-explained-a-comprehensive-guide-for-professionals/
www.libreplanet.org/wiki/LinuxLibre:Devices_that_require_non-free_firmware
www.openwall.com/lists/kernel-hardening/2018/07/18/1
www.kernsec.org/wiki/index.php/Kernel_Self_Protection_Project
www.capsule8.com/blog/kernel-configuration-glossary/
www.kernel.org/doc/html/latest/admin-guide/module-signing.html
www.wiki.alpinelinux.org/wiki/Entropy_and_randomness
www.digitalocean.com/community/tutorials/how-to-setup-additional-entropy-for-cloud-servers-using-haveged
www.avg7.de/forum/sicheres-alpine-linux-betriebs-system-usb-stick-speicherkarte/
www.superuser.com/questions/642080/is-there-a-way-to-check-the-integrity-of-a-cloned-repo
www.altusmetrum.org/ChaosKey/
www.theprivacyguide1.github.io/linux_hardening_guide.html
www.iot.bzh/download/public/2018/Security/AGL-Security-blueprint_v5.0.0.pdf
www.selflinux.org/selflinux/html/grundlagen_sicherheit01.html
www.wiki.archlinux.org/index.php/security
www.wiki.gentoo.org/wiki/Security_Handbook
www.wiki.debian.org/Hardening
www.people.redhat.com/swells/scap-security-guide/tables/
www.admin-magazin.de/content/download/1213/10923/file/Technical-Review/Linux-haerten.pdf
www.rz.uni-wuerzburg.de/fileadmin/42010000/docs/infos/sicherheit/secday06_unixsec.pdf
www.debian.org/doc/manuals/securing-debian-howto/securing-debian-howto.en.pdf
www.wiki.debian.org/SetupGuides/SecurePersonalComputer
www.themooltipass.com/
www.ponemon.org/local/upload/file/Zimbra%20report%20FINAL%201.pdf
www.kernel.org/doc/html/v4.15/userspace-api/seccomp_filter.html?highlight=harden
www.kernel.org/doc/html/v4.15/security/self-protection.html
www.itsecure.hu/library/image/CIS_Ubuntu_Linux_16.04_LTS_Benchmark_v1.0.0.pdf
www.access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/4/html/Step_by_Step_Guide/s1-navigating-ownership.html
www.prog2017.rmll.info/IMG/pdf/2017-07-05_rmll2017_durcissement_avec_systemd.pdf
www.clip-os.org/static/clipos_kr2018.pdf
www.kuketz-blog.de/debian-google-dns-in-systemd/
www.wiki.gentoo.org/wiki/Sakaki%27s_EFI_Install_Guide/Sandboxing_the_Firefox_Browser_with_Firejail
www.gist.github.com/ageis/f5595e59b1cddb1513d1b425a323db04
www.tldp.org/HOWTO/Partition/fdisk_part
www.security.stackexchange.com/questions/155132/allow-only-specific-devices-to-be-connected-to-usb
www.kuketz-blog.de/sicheres-desktop-system-linux-haerten-teil1/
www.privacy-handbuch.de/handbuch_92.htm
www.blog.frehi.be/2019/01/30/linux-security-hardening-recommendations/
www.bsdhandbook.com/hardenedbsd/#audit
www.wiki.kairaven.de/open/os/linux/tuxsectune
www.puschitz.com/SecuringLinux.shtml
www.micahflee.com/2016/01/debian-grsecurity/
www.joshrendek.com/2013/01/securing-ubuntu/
www.wiki.centos.org/HowTos/OS_Protection
www.index-of.es/Exploit/Securing%20&%20Hardening%20Linux%20v1.0.pdf
www.0pointer.de/blog/projects/security.html
www.kali.training/downloads/Kali-Linux-Revealed-1st-edition.pdf
www.highon.coffee/blog/security-harden-centos-7/
www.linuxacademy.com/guide/19746-linux-security-and-server-hardening-part2
www.linuxtopia.org/online_books/linux_administrators_security_guide/index.html
www.github.com/trimstray/the-practical-linux-hardening-guide
www.access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/pdf/security_guide/Red_Hat_Enterprise_Linux-7-Security_Guide-en-US.pdf
www.refspecs.linuxfoundation.org/FHS_3.0/fhs-3.0.pdf
www.ncsc.gov.uk/guidance/white-papers/common-cyber-attacks-reducing-impact
www.github.com/konstruktoid/hardening/blob/master/misc/sysctl.conf
www.askubuntu.com/questions/253728/how-to-safely-download-and-gpg-verify-a-debian-source-package
www.theintercept.com/2018/04/28/computer-malware-tampering/
www.hackernoon.com/securing-your-linux-web-server-2be683c223eb
www.ubuntuforums.org/showthread.php?t=1132821
www.whonix.org/wiki/Hardened_Malloc
www.estl.tech/ensuring-core-dumps-are-restricted-138f77759fc9
www.lwn.net/Articles/709755/
www.digitalocean.com/community/tutorials/understanding-systemd-units-and-unit-files
www.secscan.acron.pl/centos7/1/1/2
www.access.redhat.com/documentation/de-de/red_hat_enterprise_linux/6/html/installation_guide/s2-diskpartrecommend-x86
www.access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/4/html/Step_by_Step_Guide/s1-navigating-ownership.html
www.tldp.org/LDP/intro-linux/html/sect_03_04.html
www.wiki.debian.org/ReduceDebian
www.kali.training/topic/monitoring-and-logging/

This page has been archived:
www.archive.is/qrmWI
www.web.archive.org/web/20191202235636/https://forum.pine64.org/showthread.php?tid=8474


Possibly Related Threads…
Thread Author Replies Views Last Post
  Security vulnerability tracking sirspate 0 1,697 03-04-2020, 12:59 PM
Last Post: sirspate
  ARM vs x86 privacy/security? yangmusa 4 5,308 06-28-2019, 04:07 PM
Last Post: z4v4l

Forum Jump:


Users browsing this thread: 1 Guest(s)