minor updates

- signed-off-by: trimstray <trimstray@gmail.com>
This commit is contained in:
trimstray
2019-06-03 22:25:29 +02:00
parent 36cf6a10eb
commit e79f691a21
2 changed files with 6 additions and 0 deletions

View File

@@ -101,6 +101,12 @@ You need to harden your system to protect your assets as much as possible. Why i
In my opinion, you should drop all non-industry policies, articles, manuals, and others especially on production environments and standalone home servers. These lists exist to give a false sense of security and aren't based on authority standards.
<p align="center">
<a href="https://github.com/trimstray/the-practical-linux-hardening-guide">
<img src="https://github.com/trimstray/the-practical-linux-hardening-guide/blob/master/static/img/meme_01.png" alt="Master">
</a>
</p>
There are a lot of great GNU/Linux hardening policies available to provide safer operating systems compatible with security protocols. For me, CIS and the STIGs compliances are about the best prescriptive guides - but of course you can choose a different one (e.g. PCI-DSS, DISA).
> Most of all you should use [Security Benchmarks/Policies](#policy-compliance) which describe consensus best practices for the secure configuration of target systems.