Comprehensive Linux security hardening procedures.
- ASLR configuration
- Core dump restrictions
- Exec shield
- Panic settings
- Module loading restrictions
- Signing requirements
- Blacklisting
- seccomp profiles
- Audit subsystem
- SELinux/AppArmor
- umask settings
- Sticky bits
- SUID/SGID auditing
- ACL implementation
- noexec
- nosuid
- nodev
- read-only mounts
- LUKS configuration
- dm-crypt
- ecryptfs
- fscrypt
- iptables/nftables
- Default deny
- Logging
- Rate limiting
- SSH configuration
- Network services
- Listening ports
- Password policies
- Account lockout
- Two-factor auth
- Key-based auth
- Allowed users
- Protocol settings
- auditd rules
- Log management
- AIDE/Tripwire
For authorized system administration.