mirror of
https://github.com/trimstray/the-practical-linux-hardening-guide.git
synced 2025-12-06 01:02:49 +01:00
updated 'How to hardening Linux?'
- signed-off-by: trimstray <trimstray@gmail.com>
This commit is contained in:
@@ -206,7 +206,7 @@ You need to harden your system to protect your assets as much as possible. Why i
|
||||
|
||||
In my opinion you should definitely drop all non-industry policies, articles, manuals and other especially on your production environments. This stuff exist to give false sense of security.
|
||||
|
||||
We have a lot of great GNU/Linux hardening policies to provide safer operating systems compatible with security protocols.
|
||||
We have a lot of great GNU/Linux hardening policies to provide safer operating systems compatible with security protocols. For me, CIS and the various NSA STIGs are about the best actual prescriptive guides.
|
||||
|
||||
> Most of all you should use [Security Benchmarks/Policies](#policy-compliance) which describe consensus best practices for the secure configuration of target systems because configuring your systems in compliance with e.g. CIS has been shown to eliminate 80-95% of known security vulnerabilities.
|
||||
|
||||
|
||||
Reference in New Issue
Block a user