cyber-security-resources/linux-hardening/README.md
2022-08-30 12:57:37 -04:00

33 lines
1.9 KiB
Markdown

# Linux Hardening Tips
The following are a few resources related to hardening Linux implementations.
## Linux Basics
- [Null-byte Linux Basics](https://null-byte.wonderhowto.com/how-to/linux-basics/).
- [Kali Linux Revealed Free Course](https://kali.training/)
### Cool Ways to Test Your Linux Knowledge
- [Overthewire: Bandit](https://overthewire.org/wargames/bandit/)
- [Tryhackme: Linux Modules](https://tryhackme.com/room/linuxmodules)
## Benchmarks and Hardening Guides
- [CIS Benchmarks](https://www.cisecurity.org/cis-benchmarks/)
- [DoD Security Technical Implementation Guides (STIGs)](https://public.cyber.mil/stigs/downloads/?_dl_facet_stigs=operating-systems)
- [Quickly build STIG-compliant Amazon Machine Images using Amazon EC2 Image Builder](https://aws.amazon.com/blogs/security/quickly-build-stig-compliant-amazon-machine-images-using-amazon-ec2-image-builder/)
- [How to Secure and Harden Cloud VM (Ubuntu & CentOS)?](https://geekflare.com/cloud-vm-security-guide/)
- [How To Harden OpenSSH on Ubuntu 20.04](https://www.digitalocean.com/community/tutorials/how-to-harden-openssh-on-ubuntu-20-04)
- [Digital Ocean Security Hardening and General Security Blog Posts](https://www.digitalocean.com/community/tags/security)
## Linux Security Modules
- [SELinux](https://selinuxproject.org)
- [AppArmor](https://apparmor.net/)
- [Smack](https://en.wikipedia.org/wiki/Smack_(software))
- [Tomoyo Linux](https://en.wikipedia.org/wiki/Tomoyo_Linux)
## Additional Resources
- [Linux Kernel Exploitation](https://github.com/xairy/linux-kernel-exploitation)
- [The Linux Auditing Framework](https://github.com/linux-audit/audit-userspace)
- [DevSec Linux Baseline](https://github.com/dev-sec/linux-baseline)
- [Security Content Automation Protocol (SCAP)](https://www.open-scap.org/security-policies/)
- [Linux Privilege Checker](https://github.com/sleventyeleven/linuxprivchecker)