Hardening Linux: a 10 step approach to a secure server

The Internet has become a far more dangerous place than it was 20 years ago. Nowadays, Operating System and application security is an integral part of a server configuration and, while firewalls are very important, they are not the panacea. This list of steps is intended as a guideline with a practical approach. We’ll try to provide a complete picture without getting into unnecesary details. This list won’t replace a good book on secure systems administration, but it will be useful as a quick guide.

Before we get started it’s worth to mention that security is not a status: it’s just a process. The correct initial setup of the server only provides a good start and helps you get half the way through. But you actually need to walk the other half of the road, by providing proper security vigilance, monitoring and updating.

Read more


  1. 2005-06-16 10:54 am
  2. 2005-06-16 11:08 am
  3. 2005-06-16 12:03 pm
  4. 2005-06-16 1:05 pm
  5. 2005-06-16 1:12 pm
  6. 2005-06-16 6:04 pm
  7. 2005-06-16 8:12 pm
  8. 2005-06-17 3:36 am
  9. 2005-06-17 4:01 am
  10. 2005-06-17 8:46 am
  11. 2005-06-17 11:44 am
  12. 2005-06-21 1:30 pm