diff --git a/linux-hardening/README.md b/linux-hardening/README.md new file mode 100644 index 0000000..ed7e0de --- /dev/null +++ b/linux-hardening/README.md @@ -0,0 +1,31 @@ +# Linux Hardening Tips +The following are a few resources related to hardening Linux implementations. + +## Linux Basics +- [Null-byte Linux Basics](https://null-byte.wonderhowto.com/how-to/linux-basics/). +- [Kali Linux Revealed Free Course](https://kali.training/) + +### Cool Ways to Test Your Linux Knowledge +- [Overthewire: Bandit](https://overthewire.org/wargames/bandit/) +- [Tryhackme: Linux Modules](https://tryhackme.com/room/linuxmodules) + +## Benchmarks and Hardening Guides +- [CIS Benchmarks](https://www.cisecurity.org/cis-benchmarks/) +- [DoD Security Technical Implementation Guides (STIGs)](https://public.cyber.mil/stigs/downloads/?_dl_facet_stigs=operating-systems) +- [Quickly build STIG-compliant Amazon Machine Images using Amazon EC2 Image Builder](https://aws.amazon.com/blogs/security/quickly-build-stig-compliant-amazon-machine-images-using-amazon-ec2-image-builder/) +- [How to Secure and Harden Cloud VM (Ubuntu & CentOS)?](https://geekflare.com/cloud-vm-security-guide/) +- [How To Harden OpenSSH on Ubuntu 20.04](https://www.digitalocean.com/community/tutorials/how-to-harden-openssh-on-ubuntu-20-04) +- [Digital Ocean Security Hardening and General Security Blog Posts](https://www.digitalocean.com/community/tags/security) + +## Linux Security Modules +- [SELinux](https://selinuxproject.org) +- [AppArmor](https://apparmor.net/) +- [Smack](https://en.wikipedia.org/wiki/Smack_(software)) +- [Tomoyo Linux](https://en.wikipedia.org/wiki/Tomoyo_Linux) + +## Additional Resources +- [The Linux Auditing Framework](https://github.com/linux-audit/audit-userspace) +- [DevSec Linux Baseline](https://github.com/dev-sec/linux-baseline) +- [Security Content Automation Protocol (SCAP)](https://www.open-scap.org/security-policies/) +- [Linux Privilege Checker](https://github.com/sleventyeleven/linuxprivchecker) +