Wednesday, December 23, 2020

Linux Security Hardening Checklist

Nowadays, the vast majority of database servers are running on Linux platform, it's crucial to follow the security guidelines in order to harden the security on Linux.

In this post, I'm sharing the most common recommended security settings for securing Linux OS:

These settings are categorized under the following main points:

- General

- Accounts

- Access Controls

- Oracle Files Permissions

- Auditing

- Networking

Snapshots from the sheet:



To download the complete sheet please click the link below:

https://www.dropbox.com/scl/fi/7t2pypl50ubloud1lu1u5/Linux-Security-Recommendations.xlsx?dl=0&rlkey=j2ev1dx61o13ttcaqo0571x0j

Please note that the following important points before implementing security recommendations:

- As a rule of thumb, never ever implement a security recommendation before testing it first on a test environment; if you apply all the security standards as recommended; most probably your applications may not work! Why? Because every environment has its own specifications, there is no security standard guide fits all environments, you are the one who shall decide what security rules to be applied and what should be excluded.

- Another rule of thumb, it's undeniable that the higher the security the slower the system, you should test and evaluate the performance impact of each setting before implementing it on production.

- Lastly, It's more likely that your system get crash after applying a security recommendation, rather than get attacked by a hacker!

No comments:

Post a Comment