Server Guides: Difference between revisions
cats |
formatting |
||
Line 1: | Line 1: | ||
= Server Guides = | = Server Guides = | ||
== Community Server Guides == | == Community Server Guides == | ||
Line 12: | Line 10: | ||
* Proxmox | * Proxmox | ||
== Best Practices to Secure Servers in 2024 == | == Best Practices to Secure Servers in 2024 == | ||
Line 20: | Line 17: | ||
* [https://www.cyberciti.biz/tips/linux-security.html Cyberciti Linux Security Tips] | * [https://www.cyberciti.biz/tips/linux-security.html Cyberciti Linux Security Tips] | ||
=== General Security Practices === | === General Security Practices === | ||
Line 35: | Line 31: | ||
* '''Open Ports''': Only open necessary ports (e.g., 80, 443, 22). | * '''Open Ports''': Only open necessary ports (e.g., 80, 443, 22). | ||
=== Detailed Security Measures === | === Detailed Security Measures === | ||
* '''Data Encryption''': Encrypt all data communication. | * '''Data Encryption''': Encrypt all data communication. | ||
## Use <code>scp</code>, <code>ssh</code>, <code>rsync</code>, or <code>sftp</code> for file transfer. | |||
## Consider VPNs like OpenVPN or tinc for secure connections. | |||
* '''Service Management''': | * '''Service Management''': | ||
## Avoid using insecure services like FTP, Telnet, and Rsh. | |||
## Minimize installed software to reduce vulnerability. | |||
* '''Kernel and Software Updates''': | * '''Kernel and Software Updates''': | ||
## Apply all security patches promptly. | |||
## Consider using tools like <code>apticron</code> for Debian-based systems. | |||
* '''Linux Security Extensions''': | * '''Linux Security Extensions''': | ||
## Enable SELinux or other security extensions to enforce limitations on applications. | |||
* '''User Accounts and Password Policies''': | * '''User Accounts and Password Policies''': | ||
## Enforce strong password policies. | |||
## Use tools like <code>pam_cracklib</code> to enforce password strength. | |||
## Set up password aging policies using <code>chage</code>. | |||
* '''Fail2ban''': | * '''Fail2ban''': | ||
## Install and configure Fail2ban to block IP addresses after failed login attempts. | |||
* '''Disable Unwanted Services''': | * '''Disable Unwanted Services''': | ||
## Disable unnecessary services and daemons. | |||
## Use <code>systemctl</code> to manage services on modern Linux distributions. | |||
* '''Network Security''': | * '''Network Security''': | ||
## Use <code>iptables</code> or <code>firewalld</code> to manage firewall rules. | |||
## Use tools like <code>nmap</code> to scan open ports. | |||
* '''File System Security''': | * '''File System Security''': | ||
## Separate critical file systems into different partitions with appropriate mount options (<code>noexec</code>, <code>nodev</code>, <code>nosuid</code>). | |||
* '''Regular Backups''': | * '''Regular Backups''': | ||
## Implement regular, encrypted backups to an offsite location. | |||
* '''Intrusion Detection Systems (IDS)''': | * '''Intrusion Detection Systems (IDS)''': | ||
## Use tools like AIDE and RKHunter for host-based intrusion detection. | |||
* '''Secure SSH Configuration''': | * '''Secure SSH Configuration''': | ||
## Configure SSH for maximum security (e.g., disabling root login, using SSH keys, configuring Fail2ban). | |||
[[Category:Self-hosting]] | [[Category:Self-hosting]] | ||
[[Category:Guides]] | [[Category:Guides]] | ||
[[Category:Server]] | [[Category:Server]] | ||
[[Category:Network]] | [[Category:Network]] |