Skip to content
This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).
Branch: master
Clone or download
trimstray minor update
- signed-off-by: trimstray <trimstray@gmail.com>
Latest commit d4af2de Jul 19, 2019
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
docs gh-page: updated url to wiki Mar 4, 2019
lib fixed typos; updated 'How to read this guide?' Feb 25, 2019
static/img minor updates Jun 3, 2019
CODE_OF_CONDUCT.md init commit Oct 6, 2018
CONTRIBUTING.md minor update Jul 19, 2019
LICENSE.md updated CONTRIBUTING.md; fixed typos Jan 22, 2019
README.md minor updates Jun 3, 2019

README.md

The Practical Linux Hardening Guide


Master


"Did you know all your doors were locked?" - Riddick (The Chronicles of Riddick)


Pull Requests License

Created by trimstray and contributors


Table of Contents

Introduction

General Disclaimer

The Practical Linux Hardening Guide provides a high-level overview of hardening GNU/Linux systems. It is not an official standard or handbook but it touches and uses industry standards.

This guide also provides you with practical step-by-step instructions for building your own hardened systems and services. One of the main goals is to create a single document covering internal and external threats.

A few rules for this project:

  • useful, simple, and not tiring
  • include a lot of security tips from the C2S/CIS
  • contains also non-related rules with C2S/CIS
  • based on a minimal RHEL7 and CentOS 7 installations
  • it's not exhaustive about Linux hardening
  • some hardening rules/descriptions can be done better
  • you can think of it as a checklist

The Practical Linux Hardening Guide use following OpenSCAP configurations:

Please also remember:

This guide contains my comments that may differ from certain industry principles. If you are not sure what to do please see Policy Compliance.

The Importance of Hardening Linux

Simply speaking, hardening is the process of making a system more secure. Out of the box, Linux servers don’t come "hardened" (e.g. with the attack surface minimized). It’s up to you to prepare for each eventuality and set up systems to notify you of any suspicious activity in the future.

The process of hardening servers involves both IT ops. and security teams and require changes to the default configuration according to industry benchmarks.

Also for me, hardening is the fine art of doing the right things, even if they don't always look to have a big impact. It's always a balance between ease of use and protection.

You need to harden your system to protect your assets as much as possible. Why is it important? Please read a great, short article that explains the hardening process step by step by Michael Boelen.

How to Harden Linux

In my opinion, you should drop all non-industry policies, articles, manuals, and others especially on production environments and standalone home servers. These lists exist to give a false sense of security and aren't based on authority standards.

Master

There are a lot of great GNU/Linux hardening policies available to provide safer operating systems compatible with security protocols. For me, CIS and the STIGs compliances are about the best prescriptive guides - but of course you can choose a different one (e.g. PCI-DSS, DISA).

Most of all you should use Security Benchmarks/Policies which describe consensus best practices for the secure configuration of target systems.

Configuring your systems in compliance eliminates the most common vulnerabilities. For example, CIS has been shown to eliminate 80-95% of known vulnerabilities.

On the other hand, these standards are complicated checklists (often for newbies, difficult to implement). In my opinion, ideally, real world implementation is automated via something like OpenSCAP.

You should use a rational approach because more is not better. Each environment is different, so even though security rules should all work in theory, sometimes things will not work as expected.

Hardening is not a simple process. Here are general rules following common best practices:

  • never use root account for anything that does not require it
  • only sudo individual commands
  • never set a server to run as root (except for initialization time) and ensure that it exits all unnecessary privileges before accepting requests
  • secure your firewall the best you can and forbid all unnecessary access
  • do not install unnecessary or unstable software

Which Distribution Should be Used

This guide is tested on Red Hat Enterprise Linux 7 and CentOS 7 distributions because these are:

  • free (CentOS) and open source
  • enterprise-class
  • stable and reliable
  • with great community support
  • built on coherent snapshots of old packages

Both distributions allow the use of certified tools which can parse and evaluate each component of the SCAP standard.

If you use another distribution - no problem, this guide is also for you.

How to Read This Guide

Here is the structure of the chapters:

 Chapter - e.g. Core Layer
    |
    |-- Subsection - e.g. Maintaining Software
    |       \
    |        |-- Rationale
    |        |-- Solution (+ policies)
    |        |-- Comments
    |        |-- Useful resources
    |
    |-- Subsection - e.g. Accounts and Access
    |       \
    |        |-- Rationale
    |        |-- Solution (+ policies)
    |        |-- Comments
    |        |-- Useful resources

Levels of understanding:

  • Chapter and subsection offers a general overview
  • Rationale tells you the reasoning behind the changes
  • Solution and policies are always compliant with the standard and on this basis, make changes
  • Comments helps you figure out what you can change or add to the solution
  • Useful resources provide deeper understanding

Okay. Let's start, 3, 2, 1... STOP!

Making major changes to your systems can be risky.

The most important rule of system hardening that reasonable admins follow is:

A production environment is the real instance of the app so make your changes on the dev/test!

The second most important rule is:

Don’t do anything that will affect the availability of the service or your system.

The third rule is:

Make backups of the entire virtual machine and important components.

And the last rule is:

Think about what you actually do with your server.

Policy Compliance

Center of Internet Security (CIS)

The Center of Internet Security (CIS) is a nonprofit organization focused on improving public and private sector cybersecurity readiness and response.

Please see CIS Benchmarks.

Security Technical Implementation Guide (STIG)

A Security Technical Implementation Guide (STIG) is a cybersecurity methodology for standardizing security protocols within networks, servers, computers, and logical designs to enhance overall security.

Please see Stigviewer to explore all stigs.

National Institute of Standards and Technology (NIST)

The National Institute of Standards and Technology (NIST) is a physical sciences laboratory and a non-regulatory agency of the United States Department of Commerce.

Please see National Checklist Program (NCP).

Payment Card Industry Data Security Standard (PCI-DSS)

Payment Card Industry Data Security Standard (PCI-DSS) compliance is a requirement for any business that stores, processes, or transmits cardholder data.

In accordance with PCI-DSS requirements, establish a formal policy and supporting procedures for developing configuration standards for system components that are consistent with industry-accepted hardening standards like:

  • Center of Internet Security (CIS)
  • International Organization for Standardization (ISO)
  • SysAdmin, Audit, Network, and Security (SANS) Institute
  • National Institute of Standards and Technology (NIST)

Security Content Automation Protocol (SCAP)

Security Content Automation Protocol (SCAP) provides a mechanism to check configurations, vulnerability management and evaluate policy compliance for a variety of systems.

One of the most popular implementations of SCAP is OpenSCAP and it is very helpful for vulnerability assessment and as a hardening helper. OpenSCAP can easily handle the SCAP standards and generate neat, HTML-based reports.

Please see SCAP Security Policies, OpenSCAP User Manual, and OpenSCAP Static.

SCAP Security Guide

The auditing system settings with SCAP Security Guide project contains guidance for settings for Red Hat/CentOS and it's validated by NIST.

You should inspect the security content of your system with oscap info module:

# For RHEL:
oscap info /usr/share/xml/scap/ssg/content/ssg-rhel7-ds.xml

# For CentOS:
oscap info /usr/share/xml/scap/ssg/content/ssg-centos7-ds.xml

OpenSCAP Base

The OpenSCAP scanner will only provide meaningful results if the content you want it to process is correct and up to date. The oscap tool scans your system, validates security compliance content, and generates reports and guides based on these scans.

Official OpenSCAP Base documentation says:

The command-line tool, called oscap, offers a multi-purpose tool designed to format content into documents or scan the system based on this content. Whether you want to evaluate DISA STIGs, NIST‘s USGCB, or Red Hat’s Security Response Team’s content, all are supported by OpenSCAP.

Before use, please read Using OSCAP documentation.

# Installation:
yum install openscap-scanner

# Make a RHEL7 machine e.g. PCI-DSS compliant:
oscap xccdf eval --report report.html --profile xccdf_org.ssgproject.content_profile_pci-dss /usr/share/xml/scap/ssg/content/ssg-rhel7-ds.xml

# Make a CentOS machine e.g. PCI-DSS compliant:
oscap xccdf eval --report report.html --profile xccdf_org.ssgproject.content_profile_pci-dss /usr/share/xml/scap/ssg/content/ssg-centos7-ds.xml

SCAP Workbench

SCAP Workbench is a utility that offers an easy way to perform common oscap tasks on local or remote systems.

Before use, please read Using SCAP Workbench documentation.

# Installation:
yum install scap-security-guide scap-workbench

DevSec Hardening Framework

Security + DevOps: Automatic Server Hardening.

This project covers some of the things in this guide which can be automated (e.g. setting of grub password or enforcing the permissions of the common directories). Its a good start if you want to make changes and see how it works from the level of automation tools.

Project: DevSec Hardening Framework and :octocat: GitHub repository: dev-sec.

Thanks @artem-sidorenko!

Contributing & Support

If you find something which doesn't make sense, or something doesn't seem right, please make a pull request and please add valid and well-reasoned explanations about your changes or comments.

Before adding a pull request, please see the contributing guidelines.

If this project is useful and important for you or if you really like The Practical Linux Hardening Guide, you can bring positive energy by giving some good words or supporting this project. Thank you!

License

For license information, please see LICENSE.


🔰 To start please go to the Wiki.

You can’t perform that action at this time.