Essential Do's and Don'ts for Hardening Your Linux System
Linux is a popular operating system used by individuals and businesses alike. While it is often considered more secure than other operating systems due to its open-source nature, it still requires proper hardening to ensure the safety of the system and the data it holds. In this article, we will go over some general hardening do's and don'ts that can help keep your Linux system secure.
Do's:
Keep your system updated
Keeping your Linux system up-to-date is crucial for maintaining its security. Regular updates help fix security vulnerabilities and bugs, ensuring that your system remains secure against potential attacks. Here are some examples of how to update your Linux system using the apt-get or yum package manager:
Updating Ubuntu using apt-get
To update your Ubuntu system using apt-get, open a terminal window and type:
This will download the latest package lists from the Ubuntu package repositories. Once this command completes, you can install any available updates using the following command:
This will download and install any available updates for your system.
Updating CentOS using yum
To update your CentOS system using yum, open a terminal window and type:
This will download and install any available updates for your system. You may also want to use the following command to clean up any old or unused packages:
This will remove any packages that are no longer needed on your system.
Remember to regularly check for and install updates on your Linux system to ensure its security and stability.
Use a firewall
A firewall is an essential security measure for any Linux system, as it helps protect against unauthorized access and other cyber threats. Here's how to use the ufw firewall on your Linux system:
Installing and enabling ufw for Ubuntu Based Systems
To install and enable ufw, open a terminal window and type:
To allow incoming HTTP traffic (port 80):
To block incoming traffic from a specific IP address:
To delete a rule:
You can view the current ufw rules by typing:
This will display the current rules and their status.
Remember to regularly review and update your ufw rules to ensure that your system is protected against potential threats.
Installing and enabling firewalld for CentOS Based Systems
To install and enable the default firewall on CentOS, which is firewalld, you can use the following commands:
This will install firewalld and enable it on your system.
Configuring firewalld rules for CentOS Based Systems
Once firewalld is enabled, you can configure its rules to allow or block incoming and outgoing traffic. Here are some examples:
To allow incoming SSH traffic (port 22):
To allow incoming HTTP traffic (port 80):
To block incoming traffic from a specific IP address:
To delete a rule:
You can view the current firewalld rules by typing:
This will display the current rules and their status.
Remember to regularly review and update your firewalld rules to ensure that your system
Enable SELinux or AppArmor
SELinux (Security-Enhanced Linux) and AppArmor are two security modules that can be used to enforce mandatory access control policies in Linux systems. By default, most modern Linux distributions come with SELinux or AppArmor installed, and they can be enabled and configured to enhance the security of your system.
Enabling SELinux for CentOS Based Systems
To check if SELinux is enabled on your system, run the following command:
If SELinux is not installed, you can install it using the following command:
To enable SELinux, you need to edit the /etc/selinux/config file and set the SELINUX variable to enforcing:
Change SELINUX=enforcing
Save and exit the file, using CTRL+X and Y then enter, then reboot your system.
Enabling AppArmor for Ubuntu Based Systems
To check if AppArmor is enabled on your system, run the following command:
If AppArmor is not installed, you can install it using the following command:
To enable AppArmor, you need to edit the /etc/default/grub file and add the security=apparmor parameter to the GRUB_CMDLINE_LINUX variable:
Add security=apparmor
Save and exit the file, using CTRL+X and Y then enter, then run the following command to update your system's bootloader configuration:
Finally, reboot your system.
Once SELinux or AppArmor is enabled, you can configure their policies to restrict the privileges of processes and limit their access to system resources. This can help minimize the potential impact of a successful attack and enhance the overall security of your system.
Configure password policies
Configuring password policies is an important step in hardening your Linux system's security. By enforcing strong password requirements, you can ensure that user accounts are secure and protected against potential attacks. Here's how to configure password policies on your Linux system:
Configuring password policies on Ubuntu
To configure password policies on Ubuntu, you can use the pam_pwquality module. This module provides a set of password strength checks that can be used to enforce password policies. To install the pam_pwquality module, open a terminal window and type:
Once the module is installed, you can configure its settings by editing the /etc/pam.d/common-password file. For example, to enforce a minimum password length of 8 characters and require at least one uppercase letter, one lowercase letter, one digit, and one special character, you can add the following line to the file:
You can also configure other settings, such as the maximum password age, by adding lines to the file.
Configuring password policies on CentOS
To configure password policies on CentOS, you can use the authconfig tool. This tool provides a set of options that can be used to configure password policies. For example, to enforce a minimum password length of 8 characters and require at least one uppercase letter, one lowercase letter, one digit, and one special character, you can use the following command:
This will update the system's /etc/pam.d/system-auth and /etc/pam.d/password-auth files to enforce the specified password policies.
Remember to regularly review and update your password policies to ensure that they remain effective against potential attacks.
Monitor your system logs
Monitoring your system logs is an important aspect of maintaining the security of your Linux system. System logs record system activity, such as failed login attempts, errors, and other important events, and can provide valuable insights into potential security threats or other issues that require attention. Here's how to monitor your system logs:
Using the journalctl command
On most modern Linux distributions, you can use the journalctl command to view system logs. This command provides a variety of options that can be used to filter and search log entries.
To view all log entries, simply run the following command:
This will display all log entries, with the most recent entries at the bottom.
To filter log entries by a specific unit, such as a service or a process, you can use the -u option followed by the unit name. For example, to view log entries for the sshd service, you can run the following command:
To filter log entries by a specific time range, you can use the --since and --until options followed by a timestamp or time range. For example, to view log entries from the last hour, you can run the following command:
Using a log management tool
For larger or more complex systems, it may be useful to use a log management tool to collect and analyze system logs. Log management tools can provide advanced features, such as real-time log monitoring, log aggregation, and log analysis, and can help you identify and respond to potential security threats more efficiently.
Examples of log management tools for Linux include:
Logwatch: a simple log analysis tool that provides daily email summaries of system logs
Logrotate: a tool that automatically rotates and compresses log files to conserve disk space
ELK stack: a popular open-source log management tool that combines Elasticsearch, Logstash, and Kibana to provide real-time log monitoring and analysis capabilities
Remember to regularly review and analyze your system logs to detect and respond to potential security threats in a timely manner.
Don'ts:
Use weak passwords
Using weak passwords is a common mistake that can leave your Linux system vulnerable to attacks. Attackers can use tools to guess passwords that are based on common words, names, or dates. It is important to use strong and unique passwords that are not easily guessable.
You can create strong passwords by using a combination of uppercase and lowercase letters, numbers, and special characters. It is also a good practice to use a password manager to generate and store complex passwords securely. Password managers can also help you to remember your passwords and avoid using the same password for multiple accounts.
Allow root SSH access
Allowing root SSH access is a security risk that can give attackers complete control over your Linux system. Instead, you should use a non-root user account to log in to your system and then elevate privileges using the sudo command. This helps to limit the potential impact of an attack by restricting the privileges of user accounts.
Install unnecessary software
Installing unnecessary software can increase the attack surface of your Linux system, making it more vulnerable to attacks. It is important to only install software that is necessary for your system and remove any unnecessary software. This helps to reduce the number of potential vulnerabilities on your system and minimize the risk of a successful attack.
Use outdated software
Using outdated software can leave your system vulnerable to attacks that exploit known vulnerabilities. It is important to always use the latest version of software and regularly update it to ensure security. This helps to patch known vulnerabilities and protect your system against potential attacks.
Conclusion
In conclusion, hardening your Linux system is critical to ensure its security and protect the data it holds. By following the do's and don'ts outlined in this article, you can take important steps to secure your system and reduce the risk of cyber threats. Remember to always keep your system up-to-date, use a firewall, configure password policies, and monitor system logs. Avoid using weak passwords, disabling automatic updates, allowing root SSH access, installing unnecessary software, and using outdated software. With these best practices in mind, you can ensure that your Linux system remains secure and protected.